Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
XWe8H4gRPb.exe

Overview

General Information

Sample name:XWe8H4gRPb.exe
renamed because original name is a hash value
Original sample name:7693e44d877f22b963348c44f6a20110.exe
Analysis ID:1543564
MD5:7693e44d877f22b963348c44f6a20110
SHA1:95bb436cedfa9f132c7bf62e4590c51190d66ecf
SHA256:c652c39afdf675042c1ebc539169db5e198276463ee8b6d16380d45374884110
Tags:32exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • XWe8H4gRPb.exe (PID: 964 cmdline: "C:\Users\user\Desktop\XWe8H4gRPb.exe" MD5: 7693E44D877F22B963348C44F6A20110)
    • cmd.exe (PID: 6416 cmdline: "cmd.exe" /c sc query "GoodbyeDPI" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 3080 cmdline: sc query "GoodbyeDPI" MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: frack113: Data: Command: sc query "GoodbyeDPI", CommandLine: sc query "GoodbyeDPI", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\sc.exe, NewProcessName: C:\Windows\SysWOW64\sc.exe, OriginalFileName: C:\Windows\SysWOW64\sc.exe, ParentCommandLine: "cmd.exe" /c sc query "GoodbyeDPI", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6416, ParentProcessName: cmd.exe, ProcessCommandLine: sc query "GoodbyeDPI", ProcessId: 3080, ProcessName: sc.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: uebki.oneVirustotal: Detection: 15%Perma Link
Source: https://uebki.one/api/not_working.php?0=Virustotal: Detection: 9%Perma Link
Source: https://uebki.one/api/zapret_readyconfigs.txtVirustotal: Detection: 12%Perma Link
Source: https://uebki.one/api/InfoAboutVPN.phpVirustotal: Detection: 13%Perma Link
Source: XWe8H4gRPb.exeReversingLabs: Detection: 18%
Source: XWe8H4gRPb.exeVirustotal: Detection: 10%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49709 version: TLS 1.2
Source: XWe8H4gRPb.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\swordily\source\repos\GoodbyeDPIConfigs\GoodbyeDPIConfigs\obj\Release\GoodbyeDPIConfigs.pdb source: XWe8H4gRPb.exe
Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /version.txt HTTP/1.1User-Agent: GoodbyeDPI Configs 1.5.6Host: uebki.oneConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: uebki.one
Source: XWe8H4gRPb.exe, 00000000.00000002.3341182711.0000000002FC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: XWe8H4gRPb.exe, 00000000.00000002.3341182711.0000000002FD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://uebki.one
Source: XWe8H4gRPb.exe, 00000000.00000002.3341182711.0000000002FD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://uebki.oned
Source: XWe8H4gRPb.exeString found in binary or memory: https://cdn.uebki.one/Coprer.conf
Source: XWe8H4gRPb.exeString found in binary or memory: https://cdn.uebki.one/awg.exe?https://cdn.uebki.one/magic.exeAhttps://cdn.uebki.one/wintun.dll
Source: XWe8H4gRPb.exeString found in binary or memory: https://rr1---sn-4g5lznek.googlevideo.com
Source: XWe8H4gRPb.exe, 00000000.00000002.3343230059.0000000006F3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rr1---sn-4g5lznek.googlevideo.com4
Source: XWe8H4gRPb.exe, 00000000.00000002.3341182711.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, XWe8H4gRPb.exe, 00000000.00000002.3341182711.0000000002F51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uebki.one
Source: XWe8H4gRPb.exeString found in binary or memory: https://uebki.one/
Source: XWe8H4gRPb.exeString found in binary or memory: https://uebki.one/GoodbyeDPIConfigs.exe
Source: XWe8H4gRPb.exeString found in binary or memory: https://uebki.one/antizapret/antizapret.zip
Source: XWe8H4gRPb.exeString found in binary or memory: https://uebki.one/antizapret/domains-export.txt
Source: XWe8H4gRPb.exeString found in binary or memory: https://uebki.one/api/InfoAboutVPN.php
Source: XWe8H4gRPb.exeString found in binary or memory: https://uebki.one/api/SendConfigRequest.php?0=0
Source: XWe8H4gRPb.exeString found in binary or memory: https://uebki.one/api/SendConfigRequest.php?0=;.
Source: XWe8H4gRPb.exeString found in binary or memory: https://uebki.one/api/gdpi_strateg.txt-_strategyCurlExtraKeys%_strategyExtraKeys
Source: XWe8H4gRPb.exeString found in binary or memory: https://uebki.one/api/not_working.php?0=
Source: XWe8H4gRPb.exeString found in binary or memory: https://uebki.one/api/zapret_readyconfigs.txt
Source: XWe8H4gRPb.exeString found in binary or memory: https://uebki.one/api/zapret_strateg.txt
Source: XWe8H4gRPb.exeString found in binary or memory: https://uebki.one/goodbyedpi_configs/
Source: XWe8H4gRPb.exeString found in binary or memory: https://uebki.one/version.txt
Source: XWe8H4gRPb.exeString found in binary or memory: https://uebki.one9https://uebki.one/donate.php
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49709 version: TLS 1.2
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_02DD4E400_2_02DD4E40
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_02DD94980_2_02DD9498
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_02DD948B0_2_02DD948B
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_071337040_2_07133704
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_0713AD980_2_0713AD98
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_071356520_2_07135652
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_071334540_2_07133454
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_0713AD8A0_2_0713AD8A
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_072DD5F00_2_072DD5F0
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_072D22C40_2_072D22C4
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_089529080_2_08952908
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_08954ED10_2_08954ED1
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_08951E500_2_08951E50
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_089528F80_2_089528F8
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_08951E500_2_08951E50
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_08954ED10_2_08954ED1
Source: XWe8H4gRPb.exe, 00000000.00000000.2098737315.0000000000CF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameGoodbyeDPIConfigs.exe" vs XWe8H4gRPb.exe
Source: XWe8H4gRPb.exe, 00000000.00000002.3340281508.000000000129E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs XWe8H4gRPb.exe
Source: XWe8H4gRPb.exeBinary or memory string: OriginalFilenameGoodbyeDPIConfigs.exe" vs XWe8H4gRPb.exe
Source: classification engineClassification label: mal60.winEXE@6/0@1/1
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1060:120:WilError_03
Source: XWe8H4gRPb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: XWe8H4gRPb.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: XWe8H4gRPb.exeReversingLabs: Detection: 18%
Source: XWe8H4gRPb.exeVirustotal: Detection: 10%
Source: unknownProcess created: C:\Users\user\Desktop\XWe8H4gRPb.exe "C:\Users\user\Desktop\XWe8H4gRPb.exe"
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c sc query "GoodbyeDPI"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc query "GoodbyeDPI"
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c sc query "GoodbyeDPI"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc query "GoodbyeDPI"Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeSection loaded: dwrite.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: XWe8H4gRPb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: XWe8H4gRPb.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: XWe8H4gRPb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\swordily\source\repos\GoodbyeDPIConfigs\GoodbyeDPIConfigs\obj\Release\GoodbyeDPIConfigs.pdb source: XWe8H4gRPb.exe
Source: XWe8H4gRPb.exeStatic PE information: 0x83F6D5B1 [Mon Feb 27 21:44:17 2040 UTC]
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_02DDA281 pushad ; retf 0_2_02DDA282
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_02DDA25D pushad ; retf 0_2_02DDA25E
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_02DD0A85 push edi; retf 0_2_02DD0A82
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_02DD0A6D push edi; retf 0_2_02DD0A82
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_072C7248 pushfd ; retf 0_2_072C7255
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeCode function: 0_2_089599C0 push eax; retf 0_2_089599C1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc query "GoodbyeDPI"
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeMemory allocated: 2DD0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeMemory allocated: 2F50000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeMemory allocated: 4F50000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeWindow / User API: threadDelayed 2634Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeWindow / User API: threadDelayed 7167Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -33204139332677172s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -99859s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -99750s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -99640s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -99531s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -99421s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -99312s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -99203s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -99091s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -98984s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -98875s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -98753s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -98625s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -98471s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -98340s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -98207s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -98078s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -97968s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -97859s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -97749s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -97640s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -97531s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -97421s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -97312s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -97203s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -97093s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -96984s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -96874s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -96764s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -96656s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -96546s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -96437s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -96328s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -96218s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -96108s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -95999s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -95890s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -95764s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -95655s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -95546s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -95435s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -95327s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -95218s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -95105s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -94996s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -94889s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -94781s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -94668s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exe TID: 5176Thread sleep time: -94561s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 99859Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 99750Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 99640Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 99531Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 99421Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 99312Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 99203Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 99091Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 98984Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 98875Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 98753Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 98625Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 98471Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 98340Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 98207Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 98078Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 97968Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 97859Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 97749Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 97640Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 97531Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 97421Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 97312Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 97203Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 97093Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 96984Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 96874Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 96764Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 96656Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 96546Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 96437Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 96328Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 96218Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 96108Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 95999Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 95890Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 95764Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 95655Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 95546Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 95435Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 95327Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 95218Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 95105Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 94996Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 94889Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 94781Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 94668Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeThread delayed: delay time: 94561Jump to behavior
Source: XWe8H4gRPb.exe, 00000000.00000002.3340281508.00000000012D3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c sc query "GoodbyeDPI"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc query "GoodbyeDPI"Jump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeQueries volume information: C:\Users\user\Desktop\XWe8H4gRPb.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\XWe8H4gRPb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Service Execution
1
Windows Service
1
Windows Service
1
Disable or Modify Tools
OS Credential Dumping1
Query Registry
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
11
Process Injection
31
Virtualization/Sandbox Evasion
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA Secrets12
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1543564 Sample: XWe8H4gRPb.exe Startdate: 28/10/2024 Architecture: WINDOWS Score: 60 17 uebki.one 2->17 21 Multi AV Scanner detection for domain / URL 2->21 23 Multi AV Scanner detection for submitted file 2->23 25 AI detected suspicious sample 2->25 8 XWe8H4gRPb.exe 15 2 2->8         started        signatures3 process4 dnsIp5 19 uebki.one 188.114.96.3, 443, 49709 CLOUDFLARENETUS European Union 8->19 11 cmd.exe 1 8->11         started        process6 process7 13 conhost.exe 11->13         started        15 sc.exe 1 11->15         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
XWe8H4gRPb.exe18%ReversingLabsWin32.Trojan.MalUri
XWe8H4gRPb.exe11%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
uebki.one16%VirustotalBrowse
SourceDetectionScannerLabelLink
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
https://uebki.one/api/not_working.php?0=9%VirustotalBrowse
https://uebki.one/api/zapret_readyconfigs.txt12%VirustotalBrowse
https://uebki.one/api/InfoAboutVPN.php14%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
uebki.one
188.114.96.3
truefalseunknown
NameMaliciousAntivirus DetectionReputation
https://uebki.one/version.txttrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://uebki.one/api/InfoAboutVPN.phpXWe8H4gRPb.exetrueunknown
    https://cdn.uebki.one/Coprer.confXWe8H4gRPb.exetrue
      unknown
      https://uebki.one/api/not_working.php?0=XWe8H4gRPb.exetrueunknown
      https://uebki.one/api/zapret_readyconfigs.txtXWe8H4gRPb.exetrueunknown
      https://uebki.one/api/SendConfigRequest.php?0=;.XWe8H4gRPb.exetrue
        unknown
        https://rr1---sn-4g5lznek.googlevideo.com4XWe8H4gRPb.exe, 00000000.00000002.3343230059.0000000006F3E000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://uebki.one/GoodbyeDPIConfigs.exeXWe8H4gRPb.exetrue
            unknown
            http://uebki.onedXWe8H4gRPb.exe, 00000000.00000002.3341182711.0000000002FD6000.00000004.00000800.00020000.00000000.sdmptrue
              unknown
              https://cdn.uebki.one/awg.exe?https://cdn.uebki.one/magic.exeAhttps://cdn.uebki.one/wintun.dllXWe8H4gRPb.exetrue
                unknown
                https://uebki.oneXWe8H4gRPb.exe, 00000000.00000002.3341182711.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, XWe8H4gRPb.exe, 00000000.00000002.3341182711.0000000002F51000.00000004.00000800.00020000.00000000.sdmptrue
                  unknown
                  https://uebki.one/XWe8H4gRPb.exetrue
                    unknown
                    https://uebki.one/api/zapret_strateg.txtXWe8H4gRPb.exetrue
                      unknown
                      https://rr1---sn-4g5lznek.googlevideo.comXWe8H4gRPb.exefalse
                        unknown
                        https://uebki.one/api/gdpi_strateg.txt-_strategyCurlExtraKeys%_strategyExtraKeysXWe8H4gRPb.exetrue
                          unknown
                          https://uebki.one9https://uebki.one/donate.phpXWe8H4gRPb.exetrue
                            unknown
                            https://uebki.one/api/SendConfigRequest.php?0=0XWe8H4gRPb.exetrue
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameXWe8H4gRPb.exe, 00000000.00000002.3341182711.0000000002FC1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://uebki.oneXWe8H4gRPb.exe, 00000000.00000002.3341182711.0000000002FD6000.00000004.00000800.00020000.00000000.sdmptrue
                                unknown
                                https://uebki.one/antizapret/antizapret.zipXWe8H4gRPb.exetrue
                                  unknown
                                  https://uebki.one/goodbyedpi_configs/XWe8H4gRPb.exetrue
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    188.114.96.3
                                    uebki.oneEuropean Union
                                    13335CLOUDFLARENETUSfalse
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1543564
                                    Start date and time:2024-10-28 06:28:06 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 4m 56s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:9
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:XWe8H4gRPb.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:7693e44d877f22b963348c44f6a20110.exe
                                    Detection:MAL
                                    Classification:mal60.winEXE@6/0@1/1
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 99%
                                    • Number of executed functions: 62
                                    • Number of non-executed functions: 3
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    TimeTypeDescription
                                    01:28:54API Interceptor545253x Sleep call for process: XWe8H4gRPb.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    188.114.96.39D7RwuJrth.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                    • 304773cm.n9shteam.in/jscpuGamegeneratorprivate.php
                                    DBUfLVzZhf.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                    • xilloolli.com/api.php?status=1&wallets=0&av=1
                                    R5AREmpD4S.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                    • xilloolli.com/api.php?status=1&wallets=0&av=1
                                    7950COPY.exeGet hashmaliciousFormBookBrowse
                                    • www.globaltrend.xyz/b2h2/
                                    transferencia interbancaria_667553466579.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                    • paste.ee/d/Gitmx
                                    19387759999PO-RFQ-INVOICE-doc.exeGet hashmaliciousFormBookBrowse
                                    • www.zonguldakescortg.xyz/483l/
                                    PO 4800040256.exeGet hashmaliciousFormBookBrowse
                                    • www.rtpngk.xyz/876i/
                                    yGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                    • www.fnsds.org/
                                    rPedidodecompra__PO20441__ARIMComponentes.exeGet hashmaliciousLokibot, PureLog Stealer, zgRATBrowse
                                    • dddotx.shop/Mine/PWS/fre.php
                                    Orden de Compra No. 78986756565344657.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                    • paste.ee/d/nwtkd
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    uebki.one6VTskjqyxX.exeGet hashmaliciousUnknownBrowse
                                    • 188.114.97.3
                                    6VTskjqyxX.exeGet hashmaliciousUnknownBrowse
                                    • 188.114.97.3
                                    ECChG5eWfZ.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                    • 188.114.97.3
                                    dmhu7oz5yP.exeGet hashmaliciousDCRatBrowse
                                    • 188.114.97.3
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    CLOUDFLARENETUSz1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                    • 188.114.96.3
                                    file.exeGet hashmaliciousLummaCBrowse
                                    • 172.67.170.64
                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                    • 172.67.170.64
                                    file.exeGet hashmaliciousLummaCBrowse
                                    • 172.67.170.64
                                    AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 188.114.96.3
                                    file.exeGet hashmaliciousLummaCBrowse
                                    • 172.67.170.64
                                    z45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                    • 188.114.97.3
                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                    • 162.159.61.3
                                    file.exeGet hashmaliciousLummaCBrowse
                                    • 172.67.170.64
                                    rFa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • 188.114.96.3
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    3b5074b1b5d032e5620f69f9f700ff0eAWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 188.114.96.3
                                    z45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                    • 188.114.96.3
                                    file.exeGet hashmaliciousStealc, VidarBrowse
                                    • 188.114.96.3
                                    rFa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • 188.114.96.3
                                    Remittance Receipt.exeGet hashmaliciousAgentTeslaBrowse
                                    • 188.114.96.3
                                    PbfYaIvR5B.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                    • 188.114.96.3
                                    SecuriteInfo.com.Win32.Agent-BDOJ.1516.18040.exeGet hashmaliciousBlank GrabberBrowse
                                    • 188.114.96.3
                                    SecuriteInfo.com.Win64.Trojan.Agent.2S9FJA.25494.32016.exeGet hashmaliciousUnknownBrowse
                                    • 188.114.96.3
                                    SecuriteInfo.com.Win64.Trojan.Agent.2S9FJA.25494.32016.exeGet hashmaliciousUnknownBrowse
                                    • 188.114.96.3
                                    sheisverynicegirlwithgreatworkingskillwithgereatniceworkign.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                    • 188.114.96.3
                                    No context
                                    No created / dropped files found
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):5.634024070549135
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:XWe8H4gRPb.exe
                                    File size:66'560 bytes
                                    MD5:7693e44d877f22b963348c44f6a20110
                                    SHA1:95bb436cedfa9f132c7bf62e4590c51190d66ecf
                                    SHA256:c652c39afdf675042c1ebc539169db5e198276463ee8b6d16380d45374884110
                                    SHA512:f687b1a973b1e0e775cc3bd12af6a9f1ef7deebebd2830cc1afa17a4dd9ab0c71e40aaab415370f5a7cdaae1d343bb9feca745a17d0e71481fd3aceb8e0802b8
                                    SSDEEP:1536:XlVAlGP7Pp5RoAKoAydsBj635m2VO6fqA:XlE8aAbdsB05m8O6yA
                                    TLSH:3853084533F84317D33D86FA15A165830BB27217BA21E2C86CCF65ED22E2B609360F97
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.................. ... ....@.. .......................`............`................................
                                    Icon Hash:00928e8e8686b000
                                    Entrypoint:0x4106b6
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x83F6D5B1 [Mon Feb 27 21:44:17 2040 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x106610x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x1618.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x105ac0x38.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xe6bc0xe800dd6ff33ec74906e65578e5d8b29cdcd3False0.3776939655172414OpenPGP Secret Key5.5792527302202455IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0x120000x16180x1800b4a77d8deac1e4bbf67cf4765e03879fFalse0.3732096354166667data5.264091198960547IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x140000xc0x2000a570bed3c34634a4f79f3d889f94370False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0x120900x388data0.43694690265486724
                                    RT_MANIFEST0x124280x11ebXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.4022236756049706
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSource PortDest PortSource IPDest IP
                                    Oct 28, 2024 06:28:56.039335012 CET49709443192.168.2.6188.114.96.3
                                    Oct 28, 2024 06:28:56.039374113 CET44349709188.114.96.3192.168.2.6
                                    Oct 28, 2024 06:28:56.039494038 CET49709443192.168.2.6188.114.96.3
                                    Oct 28, 2024 06:28:56.052210093 CET49709443192.168.2.6188.114.96.3
                                    Oct 28, 2024 06:28:56.052227974 CET44349709188.114.96.3192.168.2.6
                                    Oct 28, 2024 06:28:56.805668116 CET44349709188.114.96.3192.168.2.6
                                    Oct 28, 2024 06:28:56.805845022 CET49709443192.168.2.6188.114.96.3
                                    Oct 28, 2024 06:28:56.810245991 CET49709443192.168.2.6188.114.96.3
                                    Oct 28, 2024 06:28:56.810255051 CET44349709188.114.96.3192.168.2.6
                                    Oct 28, 2024 06:28:56.810564995 CET44349709188.114.96.3192.168.2.6
                                    Oct 28, 2024 06:28:56.856971979 CET49709443192.168.2.6188.114.96.3
                                    Oct 28, 2024 06:28:56.899333954 CET44349709188.114.96.3192.168.2.6
                                    Oct 28, 2024 06:28:57.267663002 CET44349709188.114.96.3192.168.2.6
                                    Oct 28, 2024 06:28:57.267904043 CET44349709188.114.96.3192.168.2.6
                                    Oct 28, 2024 06:28:57.267978907 CET49709443192.168.2.6188.114.96.3
                                    Oct 28, 2024 06:28:57.274171114 CET49709443192.168.2.6188.114.96.3
                                    TimestampSource PortDest PortSource IPDest IP
                                    Oct 28, 2024 06:28:56.017426014 CET5909253192.168.2.61.1.1.1
                                    Oct 28, 2024 06:28:56.030255079 CET53590921.1.1.1192.168.2.6
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Oct 28, 2024 06:28:56.017426014 CET192.168.2.61.1.1.10x338cStandard query (0)uebki.oneA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Oct 28, 2024 06:28:56.030255079 CET1.1.1.1192.168.2.60x338cNo error (0)uebki.one188.114.96.3A (IP address)IN (0x0001)false
                                    Oct 28, 2024 06:28:56.030255079 CET1.1.1.1192.168.2.60x338cNo error (0)uebki.one188.114.97.3A (IP address)IN (0x0001)false
                                    • uebki.one
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.649709188.114.96.3443964C:\Users\user\Desktop\XWe8H4gRPb.exe
                                    TimestampBytes transferredDirectionData
                                    2024-10-28 05:28:56 UTC108OUTGET /version.txt HTTP/1.1
                                    User-Agent: GoodbyeDPI Configs 1.5.6
                                    Host: uebki.one
                                    Connection: Keep-Alive
                                    2024-10-28 05:28:57 UTC916INHTTP/1.1 200 OK
                                    Date: Mon, 28 Oct 2024 05:28:57 GMT
                                    Content-Type: text/plain
                                    Content-Length: 31
                                    Connection: close
                                    Last-Modified: Sun, 27 Oct 2024 07:46:41 GMT
                                    ETag: "671defe1-1f"
                                    Accept-Ranges: bytes
                                    cf-cache-status: DYNAMIC
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Dem9eB1FNUUfLEfrh5JR7wX1LKivFsTuMTqNv1rmg1ObmZlywMEXVp%2F59y0qDXF1eE53ZIV1lJSqKWYBQwDMkMZBxWT9InLAFXuQbPS5m9HefIpueBeUjYXFQw8%3D"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Strict-Transport-Security: max-age=0; includeSubDomains; preload
                                    X-Content-Type-Options: nosniff
                                    Server: cloudflare
                                    CF-RAY: 8d98867bcb09478d-DFW
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1077&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2792&recv_bytes=726&delivery_rate=2671586&cwnd=247&unsent_bytes=0&cid=11654e8af4046952&ts=610&x=0"
                                    2024-10-28 05:28:57 UTC31INData Raw: 31 2e 35 2e 35 7c 67 6f 6f 64 62 79 65 64 70 69 2d 30 2e 32 2e 33 72 63 33 2d 32 2e 7a 69 70
                                    Data Ascii: 1.5.5|goodbyedpi-0.2.3rc3-2.zip


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:01:28:54
                                    Start date:28/10/2024
                                    Path:C:\Users\user\Desktop\XWe8H4gRPb.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\XWe8H4gRPb.exe"
                                    Imagebase:0xce0000
                                    File size:66'560 bytes
                                    MD5 hash:7693E44D877F22B963348C44F6A20110
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:false

                                    Target ID:3
                                    Start time:01:29:00
                                    Start date:28/10/2024
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:"cmd.exe" /c sc query "GoodbyeDPI"
                                    Imagebase:0x1c0000
                                    File size:236'544 bytes
                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:01:29:00
                                    Start date:28/10/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff66e660000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:01:29:00
                                    Start date:28/10/2024
                                    Path:C:\Windows\SysWOW64\sc.exe
                                    Wow64 process (32bit):true
                                    Commandline:sc query "GoodbyeDPI"
                                    Imagebase:0x700000
                                    File size:61'440 bytes
                                    MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:13.4%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:7%
                                      Total number of Nodes:961
                                      Total number of Limit Nodes:51
                                      execution_graph 69132 71321b0 69133 71321b5 69132->69133 69135 7132200 69133->69135 69136 7130ae0 69133->69136 69137 7130aeb 69136->69137 69138 713227e 69137->69138 69144 71322d8 12 API calls 69137->69144 69145 71322e8 12 API calls 69137->69145 69148 7130af0 69138->69148 69140 7132298 69141 7130b00 12 API calls 69140->69141 69142 713229f 69141->69142 69162 7133f98 69142->69162 69169 7133f80 69142->69169 69143 71322a9 69143->69135 69144->69138 69145->69138 69149 7130afb 69148->69149 69152 713337f 69149->69152 69153 71333c1 69149->69153 69151 71333bc 69151->69140 69176 7130d9c 69152->69176 69154 713347f 69153->69154 69159 71334ea 69153->69159 69155 7137d80 12 API calls 69154->69155 69156 713ff38 69155->69156 69190 7135568 69156->69190 69158 713ff4a 69158->69140 69160 7137d80 12 API calls 69159->69160 69161 7139a8b 69159->69161 69160->69161 69161->69140 69163 7133f99 69162->69163 69164 7133fd5 69163->69164 69233 7134468 69163->69233 69238 7134458 69163->69238 69164->69143 69170 7133f81 69169->69170 69171 7133fd5 69170->69171 69174 7134458 CreateWindowExW 69170->69174 69175 7134468 CreateWindowExW 69170->69175 69171->69143 69172 71340c9 69255 7133558 12 API calls 69172->69255 69174->69172 69175->69172 69177 7130da7 69176->69177 69178 71338fd 69177->69178 69179 713388d 69177->69179 69184 7133908 69177->69184 69178->69151 69200 7133454 69179->69200 69181 71338e4 69181->69178 69182 7130b00 12 API calls 69181->69182 69182->69178 69183 7133a21 69183->69151 69184->69183 69185 71339c0 69184->69185 69204 7133474 69184->69204 69188 71339d1 69185->69188 69217 7133484 12 API calls 69185->69217 69210 7133494 69188->69210 69191 7135569 69190->69191 69192 713557d 69191->69192 69219 71336ec 69191->69219 69198 7135568 2 API calls 69192->69198 69199 71336ec SetWindowLongW 69192->69199 69223 713555b 69192->69223 69194 7135599 SetWindowLongW 69195 7135604 69194->69195 69195->69158 69196 7135580 69196->69158 69196->69194 69198->69196 69199->69196 69201 713345f 69200->69201 69203 7133c04 69201->69203 69218 71334ec 12 API calls 69201->69218 69203->69181 69205 713347f 69204->69205 69206 7137d80 12 API calls 69205->69206 69207 713ff38 69206->69207 69208 7135568 3 API calls 69207->69208 69209 713ff4a 69208->69209 69209->69185 69211 713349f 69210->69211 69212 713daec 69211->69212 69214 713db18 69211->69214 69216 713daf9 69211->69216 69213 7137d80 12 API calls 69212->69213 69213->69216 69215 7137d80 12 API calls 69214->69215 69215->69216 69216->69183 69217->69188 69218->69203 69220 7135598 SetWindowLongW 69219->69220 69222 7135604 69220->69222 69222->69192 69224 7135564 69223->69224 69225 713557d 69224->69225 69226 71336ec SetWindowLongW 69224->69226 69230 713555b 2 API calls 69225->69230 69231 7135568 2 API calls 69225->69231 69232 71336ec SetWindowLongW 69225->69232 69226->69225 69227 7135599 SetWindowLongW 69228 7135604 69227->69228 69228->69196 69229 7135580 69229->69196 69229->69227 69230->69229 69231->69229 69232->69229 69234 7134469 69233->69234 69235 7134542 69234->69235 69243 7135300 69234->69243 69247 71352f3 69234->69247 69239 713445c 69238->69239 69240 7134542 69239->69240 69241 71352f3 CreateWindowExW 69239->69241 69242 7135300 CreateWindowExW 69239->69242 69241->69240 69242->69240 69244 7135301 69243->69244 69251 71336b0 69244->69251 69248 71352fc 69247->69248 69249 71336b0 CreateWindowExW 69248->69249 69250 7135335 69249->69250 69250->69235 69252 7135350 CreateWindowExW 69251->69252 69254 7135474 69252->69254 69254->69254 69255->69171 69307 72d08e8 69308 72d092d GetClassInfoW 69307->69308 69310 72d0973 69308->69310 69493 72deac8 69494 72deadc 69493->69494 69495 72deaed 69494->69495 69497 72ce7a0 2 API calls 69494->69497 69498 72ce791 2 API calls 69494->69498 69496 72deb10 69497->69496 69498->69496 69256 716e3b0 69257 716e3ee 69256->69257 69259 716e488 69256->69259 69260 716e4b4 69259->69260 69262 716a4b0 2 API calls 69260->69262 69263 716a4aa 2 API calls 69260->69263 69261 716e4ca 69261->69257 69262->69261 69263->69261 69311 72d756b 69312 72d757e 69311->69312 69316 72d7840 69312->69316 69319 72d7848 PostMessageW 69312->69319 69313 72d75a1 69317 72d7848 PostMessageW 69316->69317 69318 72d78b4 69317->69318 69318->69313 69320 72d78b4 69319->69320 69320->69313 68405 713ad98 68406 713ad9d 68405->68406 68413 716f530 68406->68413 68423 716f560 68406->68423 68407 713c2d8 68409 716f530 2 API calls 68407->68409 68410 716f560 2 API calls 68407->68410 68408 713c312 68409->68408 68410->68408 68415 716f560 68413->68415 68414 716f5fb 68419 716f530 2 API calls 68414->68419 68420 716f560 2 API calls 68414->68420 68415->68414 68418 716f630 68415->68418 68416 716f605 68416->68407 68417 716f734 68417->68407 68418->68417 68433 716fc41 68418->68433 68438 716fc50 68418->68438 68419->68416 68420->68416 68425 716f575 68423->68425 68424 716f5fb 68429 716f530 2 API calls 68424->68429 68430 716f560 2 API calls 68424->68430 68425->68424 68428 716f630 68425->68428 68426 716f605 68426->68407 68427 716f734 68427->68407 68428->68427 68431 716fc50 2 API calls 68428->68431 68432 716fc41 2 API calls 68428->68432 68429->68426 68430->68426 68431->68427 68432->68427 68434 716fc71 68433->68434 68435 716fcf3 68434->68435 68443 72c0941 68434->68443 68448 72c0950 68434->68448 68435->68417 68440 716fc71 68438->68440 68439 716fcf3 68439->68417 68440->68439 68441 72c0950 2 API calls 68440->68441 68442 72c0941 2 API calls 68440->68442 68441->68439 68442->68439 68444 72c095d 68443->68444 68445 72c0972 68444->68445 68453 71684ec 68444->68453 68459 716b731 68444->68459 68445->68435 68449 72c095d 68448->68449 68450 72c0972 68449->68450 68451 716b731 2 API calls 68449->68451 68452 71684ec 2 API calls 68449->68452 68450->68435 68451->68450 68452->68450 68455 71684f7 68453->68455 68454 716b76b 68454->68445 68455->68454 68465 716a4b0 68455->68465 68468 716a4aa 68455->68468 68456 716b7f9 68461 716b739 68459->68461 68460 716b76b 68460->68445 68461->68460 68463 716a4b0 2 API calls 68461->68463 68464 716a4aa 2 API calls 68461->68464 68462 716b7f9 68463->68462 68464->68462 68472 7165cc4 68465->68472 68467 716a4c7 68467->68456 68469 716a4b0 68468->68469 68470 7165cc4 2 API calls 68469->68470 68471 716a4c7 68470->68471 68471->68456 68473 7165ccf 68472->68473 68474 71681f8 68473->68474 68483 716ecd8 68473->68483 68491 716b8d0 68473->68491 68495 716b8c0 68473->68495 68499 7168620 68473->68499 68503 716b980 68473->68503 68508 716ece8 68473->68508 68516 7168611 68473->68516 68474->68467 68475 71681c2 68475->68467 68485 716ed0f 68483->68485 68484 716ef4e 68486 7168620 KiUserCallbackDispatcher 68484->68486 68485->68484 68488 716ef2d 68485->68488 68487 716ef61 68486->68487 68487->68475 68489 7168620 KiUserCallbackDispatcher 68488->68489 68490 716ef44 68489->68490 68490->68475 68492 716b8f0 68491->68492 68493 716b949 68492->68493 68494 7168620 KiUserCallbackDispatcher 68492->68494 68493->68475 68494->68493 68498 716b8d0 68495->68498 68496 716b949 68496->68475 68497 7168620 KiUserCallbackDispatcher 68497->68496 68498->68496 68498->68497 68500 716864f 68499->68500 68501 71686d6 68500->68501 68502 7168761 KiUserCallbackDispatcher 68500->68502 68502->68501 68504 716b93a 68503->68504 68506 716b98e 68503->68506 68505 7168620 KiUserCallbackDispatcher 68504->68505 68507 716b949 68504->68507 68505->68507 68506->68475 68507->68475 68510 716ed0f 68508->68510 68509 716ef4e 68511 7168620 KiUserCallbackDispatcher 68509->68511 68510->68509 68513 716ef2d 68510->68513 68512 716ef61 68511->68512 68512->68475 68514 7168620 KiUserCallbackDispatcher 68513->68514 68515 716ef44 68514->68515 68515->68475 68517 716864f 68516->68517 68518 71686d6 68517->68518 68519 7168761 KiUserCallbackDispatcher 68517->68519 68519->68518 68520 72d4fa1 68521 72d4fc2 68520->68521 68524 72d3338 68521->68524 68523 72d4fcb 68526 72d3343 68524->68526 68525 72d519a 68525->68523 68526->68525 68529 7137a9f 68526->68529 68535 7133804 68526->68535 68530 7137ae2 68529->68530 68531 7137b8c 68529->68531 68533 7137b3a CallWindowProcW 68530->68533 68534 7137ae9 68530->68534 68542 71336dc 68531->68542 68533->68534 68534->68525 68536 713380f 68535->68536 68537 7137ae2 68536->68537 68538 7137b8c 68536->68538 68540 7137b3a CallWindowProcW 68537->68540 68541 7137ae9 68537->68541 68539 71336dc CallWindowProcW 68538->68539 68539->68541 68540->68541 68541->68525 68543 71336e7 68542->68543 68544 71362c9 68543->68544 68546 71362b9 68543->68546 68545 7133804 2 API calls 68544->68545 68547 71362c7 68545->68547 68553 71368c4 68546->68553 68559 72d3370 68546->68559 68572 71367ea 68546->68572 68577 71367f8 68546->68577 68582 72d3368 68546->68582 68554 7136882 68553->68554 68555 71368d2 68553->68555 68595 71368b0 68554->68595 68610 713689f 68554->68610 68556 7136898 68556->68547 68560 72d3386 68559->68560 68568 72d3407 68559->68568 68561 72d33a5 68560->68561 68562 72d3392 68560->68562 68569 72d3397 68560->68569 68561->68569 68768 72d22c4 68561->68768 68564 72d34d6 68562->68564 68565 72d34e1 68562->68565 68562->68569 68570 7133804 2 API calls 68564->68570 68571 7137a9f 2 API calls 68564->68571 68566 72d22c4 2 API calls 68565->68566 68565->68569 68566->68569 68567 72d22c4 2 API calls 68567->68562 68568->68567 68568->68569 68569->68547 68570->68569 68571->68569 68574 71367f8 68572->68574 68573 7136898 68573->68547 68575 71368b0 2 API calls 68574->68575 68576 713689f 2 API calls 68574->68576 68575->68573 68576->68573 68579 713680c 68577->68579 68578 7136898 68578->68547 68580 71368b0 2 API calls 68579->68580 68581 713689f 2 API calls 68579->68581 68580->68578 68581->68578 68583 72d3386 68582->68583 68591 72d3407 68582->68591 68584 72d33a5 68583->68584 68585 72d3392 68583->68585 68592 72d3397 68583->68592 68586 72d22c4 2 API calls 68584->68586 68584->68592 68587 72d34d6 68585->68587 68588 72d34e1 68585->68588 68585->68592 68586->68592 68593 7133804 2 API calls 68587->68593 68594 7137a9f 2 API calls 68587->68594 68589 72d22c4 2 API calls 68588->68589 68588->68592 68589->68592 68590 72d22c4 2 API calls 68590->68585 68591->68590 68591->68592 68592->68547 68593->68592 68594->68592 68596 71368b2 68595->68596 68597 71368c1 68596->68597 68625 72d15f3 68596->68625 68629 72d2330 68596->68629 68640 72d09b0 68596->68640 68644 7137a80 68596->68644 68647 72d15f8 68596->68647 68652 72d14a0 68596->68652 68658 72d09a0 68596->68658 68662 72ce160 68596->68662 68679 72d2320 68596->68679 68691 72ce14f 68596->68691 68708 72d14c8 68596->68708 68715 72d0a13 68596->68715 68597->68556 68611 71368aa 68610->68611 68612 72ce14f 2 API calls 68611->68612 68613 72d14c8 2 API calls 68611->68613 68614 72ce160 2 API calls 68611->68614 68615 72d2320 2 API calls 68611->68615 68616 72d14a0 2 API calls 68611->68616 68617 72d09a0 2 API calls 68611->68617 68618 71368c1 68611->68618 68619 7137a80 2 API calls 68611->68619 68620 72d15f8 2 API calls 68611->68620 68621 72d2330 2 API calls 68611->68621 68622 72d09b0 2 API calls 68611->68622 68623 72d0a13 2 API calls 68611->68623 68624 72d15f3 2 API calls 68611->68624 68612->68618 68613->68618 68614->68618 68615->68618 68616->68618 68617->68618 68618->68556 68619->68618 68620->68618 68621->68618 68622->68618 68623->68618 68624->68618 68626 72d15f8 68625->68626 68627 72d161e 68626->68627 68724 72d16a0 68626->68724 68627->68597 68630 72d2362 68629->68630 68634 72d236c 68629->68634 68631 72d239a 68630->68631 68632 72d2367 68630->68632 68633 72d2d5c 68631->68633 68631->68634 68635 72d246b 68631->68635 68632->68634 68636 72d2826 68632->68636 68638 7137a80 2 API calls 68633->68638 68634->68635 68637 7137a80 2 API calls 68634->68637 68635->68597 68639 7137a80 2 API calls 68636->68639 68637->68635 68638->68635 68639->68635 68641 72d09b4 68640->68641 68642 72d09c5 68641->68642 68643 72d0a13 2 API calls 68641->68643 68642->68597 68643->68642 68645 7133804 2 API calls 68644->68645 68646 7137a8a 68645->68646 68646->68597 68648 72d160e 68647->68648 68650 72d161e 68647->68650 68649 72d166b 68648->68649 68651 72d16a0 2 API calls 68648->68651 68649->68597 68650->68597 68651->68650 68653 72d14a5 68652->68653 68654 72d1449 68653->68654 68655 7137a80 2 API calls 68653->68655 68728 7136e68 68653->68728 68733 7136e5a 68653->68733 68654->68597 68655->68654 68659 72d09b4 68658->68659 68660 72d09c5 68659->68660 68661 72d0a13 2 API calls 68659->68661 68660->68597 68661->68660 68663 72ce165 68662->68663 68664 72ce1c0 68663->68664 68665 72ce18c 68663->68665 68666 72ce19a 68663->68666 68667 72ce183 68663->68667 68664->68665 68668 72ce30e 68664->68668 68672 72ce2c6 68664->68672 68665->68668 68675 72ce700 2 API calls 68665->68675 68676 72ce6f0 2 API calls 68665->68676 68666->68665 68666->68668 68671 72ce3b8 68666->68671 68666->68672 68667->68665 68669 72ce3aa 68667->68669 68668->68597 68758 72cd81c 68669->68758 68673 72ce700 2 API calls 68671->68673 68674 72ce6f0 2 API calls 68671->68674 68748 72ce700 68672->68748 68753 72ce6f0 68672->68753 68673->68668 68674->68668 68675->68668 68676->68668 68680 72d22fe 68679->68680 68681 72d2326 68679->68681 68680->68597 68682 72d239a 68681->68682 68683 72d2367 68681->68683 68685 72d236c 68681->68685 68684 72d2d5c 68682->68684 68682->68685 68686 72d246b 68682->68686 68683->68685 68687 72d2826 68683->68687 68688 7137a80 2 API calls 68684->68688 68685->68686 68690 7137a80 2 API calls 68685->68690 68686->68597 68689 7137a80 2 API calls 68687->68689 68688->68686 68689->68686 68690->68686 68692 72ce160 68691->68692 68693 72ce1c0 68692->68693 68694 72ce19a 68692->68694 68695 72ce183 68692->68695 68696 72ce18c 68692->68696 68693->68696 68699 72ce30e 68693->68699 68701 72ce2c6 68693->68701 68694->68696 68694->68699 68700 72ce3b8 68694->68700 68694->68701 68695->68696 68697 72ce3aa 68695->68697 68696->68699 68704 72ce700 2 API calls 68696->68704 68705 72ce6f0 2 API calls 68696->68705 68698 72cd81c 2 API calls 68697->68698 68698->68699 68699->68597 68702 72ce700 2 API calls 68700->68702 68703 72ce6f0 2 API calls 68700->68703 68706 72ce700 2 API calls 68701->68706 68707 72ce6f0 2 API calls 68701->68707 68702->68699 68703->68699 68704->68699 68705->68699 68706->68699 68707->68699 68709 72d1549 68708->68709 68710 72d14ea 68708->68710 68711 7137a80 2 API calls 68709->68711 68712 72d1550 68709->68712 68713 7136e5a 2 API calls 68709->68713 68714 7136e68 2 API calls 68709->68714 68710->68597 68711->68712 68712->68597 68713->68712 68714->68712 68716 72d09b4 68715->68716 68719 72d0a16 68715->68719 68718 72d09c5 68716->68718 68723 72d0a13 2 API calls 68716->68723 68717 72d0a3e 68717->68597 68718->68597 68719->68717 68720 7137a80 2 API calls 68719->68720 68721 7136e5a 2 API calls 68719->68721 68722 7136e68 2 API calls 68719->68722 68720->68717 68721->68717 68722->68717 68723->68718 68725 72d16c1 68724->68725 68726 72d16e4 68725->68726 68727 7137a80 2 API calls 68725->68727 68726->68627 68727->68726 68729 7136eb4 68728->68729 68730 7136f05 68729->68730 68738 72ce7a0 68729->68738 68743 72ce791 68729->68743 68730->68654 68730->68730 68735 7136eb4 68733->68735 68734 7136f05 68734->68654 68735->68734 68736 72ce7a0 2 API calls 68735->68736 68737 72ce791 2 API calls 68735->68737 68736->68734 68737->68734 68739 72ce7a5 68738->68739 68740 72ce809 68739->68740 68741 7133804 2 API calls 68739->68741 68742 7137a9f 2 API calls 68739->68742 68740->68730 68741->68740 68742->68740 68744 72ce7a0 68743->68744 68745 72ce809 68744->68745 68746 7133804 2 API calls 68744->68746 68747 7137a9f 2 API calls 68744->68747 68745->68730 68746->68745 68747->68745 68749 72ce70b 68748->68749 68750 72ce712 68748->68750 68749->68668 68762 72ce729 68750->68762 68751 72ce718 68751->68668 68754 72ce70b 68753->68754 68755 72ce712 68753->68755 68754->68668 68757 72ce729 2 API calls 68755->68757 68756 72ce718 68756->68668 68757->68756 68759 72cd827 68758->68759 68760 72ce700 2 API calls 68759->68760 68761 72ce916 68760->68761 68761->68668 68763 72ce73e 68762->68763 68765 72ce760 68762->68765 68764 72ce74c 68763->68764 68766 7136e5a 2 API calls 68763->68766 68767 7136e68 2 API calls 68763->68767 68764->68751 68765->68751 68766->68764 68767->68764 68769 72d22cf 68768->68769 68770 72d44e6 68769->68770 68771 72d44b3 68769->68771 68774 72d44eb 68770->68774 68775 72d4502 68770->68775 68772 72d44cf 68771->68772 68773 72d44b8 68771->68773 68777 72d44d8 68772->68777 68806 72d5020 68772->68806 68776 72d44c1 68773->68776 68814 72d47c9 68773->68814 68778 72d46d9 68774->68778 68779 72d44f4 68774->68779 68780 72d4514 68775->68780 68791 72d4537 68775->68791 68792 72d46e7 68775->68792 68807 72d4601 68775->68807 68782 72d44ca 68776->68782 68789 72d4779 68776->68789 68777->68782 68783 72d48ab 68777->68783 68781 72d3338 2 API calls 68778->68781 68779->68782 68793 72d4f32 68779->68793 68784 72d4526 68780->68784 68780->68792 68796 72d459c 68780->68796 68780->68807 68817 72d455f 68781->68817 68788 72d3338 2 API calls 68782->68788 68785 72d3338 2 API calls 68783->68785 68784->68782 68786 72d5097 68784->68786 68785->68817 68787 72d3338 2 API calls 68786->68787 68787->68817 68788->68817 68790 72d3338 2 API calls 68789->68790 68790->68817 68794 72d4556 68791->68794 68802 72d4564 68791->68802 68801 72d471a 68792->68801 68804 72d470f 68792->68804 68797 72d3338 2 API calls 68793->68797 68793->68817 68798 72d3338 2 API calls 68794->68798 68795 72d3338 2 API calls 68795->68817 68799 72d45bb 68796->68799 68805 72d45c9 68796->68805 68797->68817 68798->68817 68803 72d3338 2 API calls 68799->68803 68800 72d3338 2 API calls 68800->68817 68810 72d3338 2 API calls 68801->68810 68801->68817 68811 72d3338 2 API calls 68802->68811 68802->68817 68803->68817 68808 72d3338 2 API calls 68804->68808 68812 72d3338 2 API calls 68805->68812 68805->68817 68806->68800 68806->68817 68809 72d4693 68807->68809 68815 72d46a1 68807->68815 68808->68817 68813 72d3338 2 API calls 68809->68813 68810->68817 68811->68817 68812->68817 68813->68817 68814->68795 68814->68817 68816 72d3338 2 API calls 68815->68816 68815->68817 68816->68817 68817->68569 68818 72d18a0 68819 72d18ad 68818->68819 68823 72d18c0 68819->68823 68828 72d18d0 68819->68828 68820 72d18bc 68824 72d18e0 68823->68824 68833 72d0e93 SendMessageW 68824->68833 68835 72d0e98 SendMessageW 68824->68835 68825 72d18f1 68825->68820 68829 72d18e0 68828->68829 68831 72d0e98 SendMessageW 68829->68831 68832 72d0e93 SendMessageW 68829->68832 68830 72d18f1 68830->68820 68831->68830 68832->68830 68834 72d0f04 68833->68834 68834->68825 68836 72d0f04 68835->68836 68836->68825 69264 2ddfef0 69268 713003b 69264->69268 69276 7130040 69264->69276 69265 2ddfeff 69269 7130040 69268->69269 69270 7130074 69269->69270 69274 7130040 GetModuleHandleW 69269->69274 69275 713003b GetModuleHandleW 69269->69275 69270->69265 69271 713005c 69271->69270 69272 7130278 GetModuleHandleW 69271->69272 69273 71302a5 69272->69273 69273->69265 69274->69271 69275->69271 69277 7130051 69276->69277 69278 7130074 69276->69278 69281 7130040 GetModuleHandleW 69277->69281 69282 713003b GetModuleHandleW 69277->69282 69278->69265 69279 7130278 GetModuleHandleW 69280 71302a5 69279->69280 69280->69265 69283 713005c 69281->69283 69282->69283 69283->69278 69283->69279 69321 713e0c0 69322 713e19a 69321->69322 69323 713e0e8 69321->69323 69327 7164ae8 69323->69327 69332 7164ad9 69323->69332 69324 713e12d 69329 7164b09 69327->69329 69328 7164b1e 69328->69324 69329->69328 69337 7163844 69329->69337 69331 7164b89 69331->69324 69334 7164aaf 69332->69334 69333 7164b1e 69333->69324 69334->69332 69334->69333 69335 7163844 DrawTextExW 69334->69335 69336 7164b89 69335->69336 69336->69324 69339 716384f 69337->69339 69338 7166759 69338->69331 69339->69338 69344 71672bb 69339->69344 69348 71672c8 69339->69348 69351 71672b9 69339->69351 69340 716686c 69340->69331 69345 71672c8 69344->69345 69355 7165c3c 69345->69355 69349 7165c3c DrawTextExW 69348->69349 69350 71672e5 69349->69350 69350->69340 69352 71672cd 69351->69352 69353 71672e5 69352->69353 69354 7165c3c DrawTextExW 69352->69354 69353->69340 69354->69353 69356 7167300 DrawTextExW 69355->69356 69358 71672e5 69356->69358 69358->69340 68837 2dd0848 68840 2dd0878 68837->68840 68841 2dd08c5 68840->68841 68845 2dd08f8 68841->68845 68849 2dd0908 68841->68849 68846 2dd0902 68845->68846 68853 2dd4e40 68846->68853 68847 2dd094b 68847->68847 68850 2dd0922 68849->68850 68852 2dd4e40 17 API calls 68850->68852 68851 2dd094b 68851->68851 68852->68851 68855 2dd4e44 68853->68855 68854 2dd4f3c 68854->68847 68855->68854 68856 2dd51d6 68855->68856 68870 2dd77c7 68855->68870 68874 2dd77e9 68855->68874 68878 2dd77f5 68855->68878 68882 2dd77ed 68855->68882 68886 2dd77f9 68855->68886 68890 2dd7805 68855->68890 68894 2dd77f1 68855->68894 68898 2dd77fd 68855->68898 68902 2dd7830 68855->68902 68906 2dd7820 68855->68906 68910 2dd7801 68855->68910 68914 72cd0c8 68856->68914 68918 72cd0b8 68856->68918 68871 2dd77d6 68870->68871 68873 2dd7a75 68871->68873 68922 2dd7400 68871->68922 68873->68856 68876 2dd7809 68874->68876 68875 2dd7400 MessageBoxW 68877 2dd7a75 68875->68877 68876->68875 68876->68877 68877->68856 68879 2dd7809 68878->68879 68880 2dd7a75 68879->68880 68881 2dd7400 MessageBoxW 68879->68881 68880->68856 68881->68880 68884 2dd7809 68882->68884 68883 2dd7a75 68883->68856 68884->68883 68885 2dd7400 MessageBoxW 68884->68885 68885->68883 68888 2dd7809 68886->68888 68887 2dd7400 MessageBoxW 68889 2dd7a75 68887->68889 68888->68887 68888->68889 68889->68856 68891 2dd7809 68890->68891 68892 2dd7a75 68891->68892 68893 2dd7400 MessageBoxW 68891->68893 68892->68856 68893->68892 68896 2dd7809 68894->68896 68895 2dd7400 MessageBoxW 68897 2dd7a75 68895->68897 68896->68895 68896->68897 68897->68856 68900 2dd7809 68898->68900 68899 2dd7400 MessageBoxW 68901 2dd7a75 68899->68901 68900->68899 68900->68901 68901->68856 68904 2dd7834 68902->68904 68903 2dd7a75 68903->68856 68904->68903 68905 2dd7400 MessageBoxW 68904->68905 68905->68903 68907 2dd7830 68906->68907 68908 2dd7400 MessageBoxW 68907->68908 68909 2dd7a75 68907->68909 68908->68909 68909->68856 68911 2dd7809 68910->68911 68912 2dd7400 MessageBoxW 68911->68912 68913 2dd7a75 68911->68913 68912->68913 68913->68856 68915 72cd0da 68914->68915 68926 72caaf0 68915->68926 68919 72cd0da 68918->68919 68920 72caaf0 16 API calls 68919->68920 68921 72cd0fa 68920->68921 68921->68854 68923 2ddaa40 MessageBoxW 68922->68923 68925 2ddaacc 68923->68925 68925->68873 68927 72caafb 68926->68927 68930 72cab2c 68927->68930 68929 72cd20c 68929->68929 68932 72cab37 68930->68932 68931 72cd477 68936 72cd4b1 68931->68936 68946 72dd5e2 68931->68946 68953 72ddf32 68931->68953 68958 72dd5f0 68931->68958 68935 72cd31d 68932->68935 68932->68936 68940 72cab4c 68932->68940 68933 72cab4c 12 API calls 68933->68931 68935->68931 68935->68933 68936->68929 68941 72cab57 68940->68941 68964 72cdab2 68941->68964 68969 72cda6c 68941->68969 68974 72cdac8 68941->68974 68942 72cd6ac 68942->68935 68947 72dd57f 68946->68947 68952 72dd5eb 68946->68952 68947->68936 68948 72da778 PeekMessageW 68948->68952 68950 72dd6a2 68950->68936 68952->68948 68952->68950 69013 72dcee8 68952->69013 69016 72dcf1c 68952->69016 68954 72ddecf KiUserCallbackDispatcher 68953->68954 68955 72ddf3b 68953->68955 68957 72ddefc 68954->68957 68955->68936 68957->68936 68963 72dd5f5 68958->68963 68959 72da778 PeekMessageW 68959->68963 68960 72dcee8 KiUserCallbackDispatcher 68960->68963 68961 72dd6a2 68961->68936 68962 72dcf1c DispatchMessageW 68962->68963 68963->68959 68963->68960 68963->68961 68963->68962 68965 72cda71 68964->68965 68965->68964 68966 72cdb02 68965->68966 68979 71322d8 68965->68979 68989 71322e8 68965->68989 68966->68942 68970 72cda71 68969->68970 68971 72cdb02 68970->68971 68972 71322d8 12 API calls 68970->68972 68973 71322e8 12 API calls 68970->68973 68971->68942 68972->68971 68973->68971 68975 72cdaee 68974->68975 68976 72cdb02 68975->68976 68977 71322d8 12 API calls 68975->68977 68978 71322e8 12 API calls 68975->68978 68976->68942 68977->68976 68978->68976 68980 71322e0 68979->68980 68981 7132357 68980->68981 68982 71323e7 68980->68982 68986 71322c5 68980->68986 68981->68986 68999 7137d71 68981->68999 69004 7137d80 68981->69004 68982->68986 69009 7130b00 68982->69009 68984 713238e 68985 71323e2 KiUserCallbackDispatcher 68984->68985 68985->68986 68986->68966 68990 71322e9 68989->68990 68991 7132357 68990->68991 68992 71323e7 68990->68992 68996 7132453 68990->68996 68991->68996 68997 7137d71 11 API calls 68991->68997 68998 7137d80 11 API calls 68991->68998 68993 7130b00 11 API calls 68992->68993 68992->68996 68993->68996 68994 713238e 68995 71323e2 KiUserCallbackDispatcher 68994->68995 68995->68996 68997->68994 68998->68994 69000 7137d90 68999->69000 69001 7137dcd 69000->69001 69002 72cde68 12 API calls 69000->69002 69003 72cde57 12 API calls 69000->69003 69001->68984 69002->69001 69003->69001 69005 7137d90 69004->69005 69006 7137dcd 69005->69006 69007 72cde68 12 API calls 69005->69007 69008 72cde57 12 API calls 69005->69008 69006->68984 69007->69006 69008->69006 69010 7130b0b 69009->69010 69011 7133528 12 API calls 69010->69011 69012 7133dc7 69011->69012 69012->68986 69014 72dde88 KiUserCallbackDispatcher 69013->69014 69015 72ddefc 69014->69015 69015->68952 69017 72de360 DispatchMessageW 69016->69017 69019 72de3cc 69017->69019 69019->68952 69499 8959860 DispatchMessageA 69500 89598cc 69499->69500 69501 7133f65 69502 7133f70 69501->69502 69503 72d519f 4 API calls 69501->69503 69504 72d51b0 4 API calls 69501->69504 69503->69502 69504->69502 69284 2dd8fe7 69287 2dd8808 69284->69287 69288 2dd8813 69287->69288 69292 2dda5b0 69288->69292 69296 2dda5c0 69288->69296 69289 2dd8ff4 69293 2dda5bc 69292->69293 69300 2dd8944 69293->69300 69297 2dda5c1 69296->69297 69298 2dd8944 EnumThreadWindows 69297->69298 69299 2dda690 69298->69299 69299->69289 69303 2dda6b0 EnumThreadWindows 69300->69303 69302 2dda690 69302->69289 69303->69302 69020 7137c08 69021 7137c18 69020->69021 69033 72d34f9 69021->69033 69041 72d34fd 69021->69041 69049 72d3503 69021->69049 69057 72d1e00 69021->69057 69060 72d1df0 69021->69060 69064 71394f4 69021->69064 69070 72ce977 69021->69070 69074 72ce988 69021->69074 69078 72d3508 69021->69078 69086 72d34ff 69021->69086 69022 7137c41 69034 72d351c 69033->69034 69094 7139238 69034->69094 69106 7139248 69034->69106 69035 72d3679 69036 72d352c 69036->69035 69118 2ddae58 69036->69118 69121 2ddae51 69036->69121 69042 72d3520 69041->69042 69045 7139238 12 API calls 69042->69045 69046 7139248 12 API calls 69042->69046 69043 72d3679 69044 72d352c 69044->69043 69047 2ddae58 SendMessageW 69044->69047 69048 2ddae51 SendMessageW 69044->69048 69045->69044 69046->69044 69047->69043 69048->69043 69050 72d3508 69049->69050 69053 7139238 12 API calls 69050->69053 69054 7139248 12 API calls 69050->69054 69051 72d3679 69052 72d352c 69052->69051 69055 2ddae58 SendMessageW 69052->69055 69056 2ddae51 SendMessageW 69052->69056 69053->69052 69054->69052 69055->69051 69056->69051 69059 71394f4 12 API calls 69057->69059 69058 72d1e0d 69058->69022 69059->69058 69061 72d1e00 69060->69061 69063 71394f4 12 API calls 69061->69063 69062 72d1e0d 69062->69022 69063->69062 69065 71394fd 69064->69065 69067 713951b 69064->69067 69066 7137d80 12 API calls 69065->69066 69065->69067 69066->69067 69068 7137d80 12 API calls 69067->69068 69069 7139654 69067->69069 69068->69069 69069->69022 69071 72ce988 69070->69071 69073 71394f4 12 API calls 69071->69073 69072 72cea12 69072->69022 69073->69072 69075 72ce98d 69074->69075 69077 71394f4 12 API calls 69075->69077 69076 72cea12 69076->69022 69077->69076 69079 72d3524 69078->69079 69082 7139238 12 API calls 69079->69082 69083 7139248 12 API calls 69079->69083 69080 72d3679 69081 72d352c 69081->69080 69084 2ddae58 SendMessageW 69081->69084 69085 2ddae51 SendMessageW 69081->69085 69082->69081 69083->69081 69084->69080 69085->69080 69087 72d3524 69086->69087 69090 7139238 12 API calls 69087->69090 69091 7139248 12 API calls 69087->69091 69088 72d352c 69089 72d3679 69088->69089 69092 2ddae58 SendMessageW 69088->69092 69093 2ddae51 SendMessageW 69088->69093 69090->69088 69091->69088 69092->69089 69093->69089 69098 7139274 69094->69098 69096 7137d80 12 API calls 69097 7139654 69096->69097 69097->69036 69105 71394ac 69098->69105 69125 7138c4c 12 API calls 69098->69125 69099 713932d 69100 7137d80 12 API calls 69099->69100 69104 71393d5 69099->69104 69101 713939f 69100->69101 69102 7137d80 12 API calls 69101->69102 69102->69104 69103 7137d80 12 API calls 69103->69105 69104->69103 69105->69096 69105->69097 69110 7139274 69106->69110 69108 7137d80 12 API calls 69109 7139654 69108->69109 69109->69036 69117 71394ac 69110->69117 69126 7138c4c 12 API calls 69110->69126 69111 713932d 69112 7137d80 12 API calls 69111->69112 69114 71393d5 69111->69114 69113 713939f 69112->69113 69115 7137d80 12 API calls 69113->69115 69116 7137d80 12 API calls 69114->69116 69115->69114 69116->69117 69117->69108 69117->69109 69119 2ddae59 SendMessageW 69118->69119 69120 2ddaec4 69119->69120 69120->69035 69122 2ddae59 SendMessageW 69121->69122 69123 2ddae54 69121->69123 69124 2ddaec4 69122->69124 69123->69122 69124->69035 69125->69099 69126->69111 69127 72d0730 69128 72d0735 69127->69128 69130 72ce700 2 API calls 69128->69130 69131 72ce6f0 2 API calls 69128->69131 69129 72d075c 69130->69129 69131->69129 69359 72d0770 69360 72d0797 69359->69360 69361 72d07f8 69360->69361 69362 7130b00 12 API calls 69360->69362 69364 7133d8f 69360->69364 69362->69361 69365 7133d94 69364->69365 69368 7133528 69365->69368 69369 7133533 69368->69369 69370 7133dc7 69369->69370 69371 7133e9a 69369->69371 69376 7133f80 12 API calls 69369->69376 69380 7133f98 12 API calls 69369->69380 69383 72d1568 69369->69383 69387 72d1e38 69369->69387 69393 72d155f 69369->69393 69398 72d1e48 69369->69398 69370->69361 69372 7133f39 69371->69372 69373 7133528 12 API calls 69371->69373 69374 7133454 12 API calls 69371->69374 69403 72d519f 69372->69403 69408 72d51b0 69372->69408 69373->69371 69374->69371 69376->69371 69380->69371 69385 7133f80 12 API calls 69383->69385 69386 7133f98 12 API calls 69383->69386 69384 72d1595 69385->69384 69386->69384 69388 72d1e16 69387->69388 69389 72d1e42 69387->69389 69388->69371 69391 7133f80 12 API calls 69389->69391 69392 7133f98 12 API calls 69389->69392 69390 72d1ee3 69390->69390 69391->69390 69392->69390 69394 72d1568 69393->69394 69396 7133f80 12 API calls 69394->69396 69397 7133f98 12 API calls 69394->69397 69395 72d1595 69396->69395 69397->69395 69399 72d1e6d 69398->69399 69401 7133f80 12 API calls 69399->69401 69402 7133f98 12 API calls 69399->69402 69400 72d1ee3 69400->69400 69401->69400 69402->69400 69405 72d51d5 69403->69405 69404 72d51e2 69404->69370 69405->69404 69413 72d63ea 69405->69413 69417 72d63f8 69405->69417 69410 72d51d5 69408->69410 69409 72d51e2 69409->69370 69410->69409 69411 72d63f8 4 API calls 69410->69411 69412 72d63ea 4 API calls 69410->69412 69411->69409 69412->69409 69414 72d63f8 69413->69414 69415 72d6550 69414->69415 69421 716b96d 69414->69421 69415->69404 69418 72d641b 69417->69418 69419 72d6550 69418->69419 69420 716b96d 4 API calls 69418->69420 69419->69404 69420->69419 69424 716b0a8 69421->69424 69423 716b975 69423->69415 69425 716b0bb 69424->69425 69426 716b0d8 69425->69426 69435 72c31b8 69425->69435 69440 716b1a8 69425->69440 69446 716b199 69425->69446 69452 72c31a9 69425->69452 69426->69423 69427 716b0fc 69428 716b10c 69427->69428 69457 716b998 69427->69457 69461 716b9a8 69427->69461 69428->69423 69436 72c31cc 69435->69436 69437 72c31e7 69436->69437 69438 716b1a8 2 API calls 69436->69438 69439 716b199 2 API calls 69436->69439 69437->69427 69438->69437 69439->69437 69441 716b1b6 69440->69441 69442 716b1fe 69441->69442 69465 72cea30 69441->69465 69469 72cea38 69441->69469 69442->69427 69443 716b1f9 69443->69427 69447 716b1a8 69446->69447 69448 716b1fe 69447->69448 69450 72cea38 SetWindowTextW 69447->69450 69451 72cea30 SetWindowTextW 69447->69451 69448->69427 69449 716b1f9 69449->69427 69450->69449 69451->69449 69453 72c31cc 69452->69453 69454 72c31e7 69453->69454 69455 716b1a8 2 API calls 69453->69455 69456 716b199 2 API calls 69453->69456 69454->69427 69455->69454 69456->69454 69458 716b9d0 69457->69458 69459 71684ec 2 API calls 69458->69459 69460 716ba3a 69459->69460 69462 716b9d0 69461->69462 69463 71684ec 2 API calls 69462->69463 69464 716ba3a 69463->69464 69466 72cea38 SetWindowTextW 69465->69466 69468 72ceab1 69466->69468 69468->69443 69470 72cea7a 69469->69470 69471 72cea80 SetWindowTextW 69469->69471 69470->69471 69472 72ceab1 69471->69472 69472->69443 69473 2dd8380 69474 2dd8385 69473->69474 69479 2dd8908 69474->69479 69483 2dd8923 69474->69483 69487 2dd8968 69474->69487 69475 2dd84b3 69480 2dd890d 69479->69480 69482 2dd8996 69480->69482 69490 2dd857c 69480->69490 69482->69475 69484 2dd892d 69483->69484 69485 2dd857c DuplicateHandle 69484->69485 69486 2dd8996 69485->69486 69486->69475 69488 2dd857c DuplicateHandle 69487->69488 69489 2dd8996 69488->69489 69489->69475 69491 2dd89d0 DuplicateHandle 69490->69491 69492 2dd8a66 69491->69492 69492->69482 69505 14dd130 69506 14dd148 69505->69506 69507 14dd1a2 69506->69507 69512 71336dc 2 API calls 69506->69512 69514 71354fb 69506->69514 69520 71336cc 69506->69520 69524 7136258 69506->69524 69535 7135508 69506->69535 69541 713563b 69506->69541 69512->69507 69515 7135504 69514->69515 69516 71336cc 3 API calls 69515->69516 69517 713553a 69516->69517 69518 71336dc 2 API calls 69517->69518 69519 713554f 69518->69519 69519->69507 69521 71336d7 69520->69521 69545 7133704 69521->69545 69523 7135647 69523->69507 69525 7136268 69524->69525 69526 71362c9 69525->69526 69528 71362b9 69525->69528 69527 7133804 2 API calls 69526->69527 69529 71362c7 69527->69529 69530 72d3368 2 API calls 69528->69530 69531 71368c4 2 API calls 69528->69531 69532 71367ea 2 API calls 69528->69532 69533 71367f8 2 API calls 69528->69533 69534 72d3370 2 API calls 69528->69534 69530->69529 69531->69529 69532->69529 69533->69529 69534->69529 69536 7135509 69535->69536 69537 71336cc 3 API calls 69536->69537 69538 713553a 69537->69538 69539 71336dc 2 API calls 69538->69539 69540 713554f 69539->69540 69540->69507 69542 7135640 69541->69542 69543 7133704 3 API calls 69542->69543 69544 7135647 69543->69544 69544->69507 69547 713370f 69545->69547 69546 71358d6 69547->69546 69548 7135568 3 API calls 69547->69548 69548->69546 69549 2ddb020 69550 2ddb021 69549->69550 69551 2ddb124 69550->69551 69553 2dda32c 69550->69553 69554 2ddb4a0 CreateActCtxA 69553->69554 69556 2ddb563 69554->69556 69304 7168128 69305 7165cc4 2 API calls 69304->69305 69306 716813e 69305->69306

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 713ad8a-713ad96 1 713ad98-713ad9c 0->1 2 713ad9d-713adb9 0->2 1->2 3 713adc3-713adc7 call 713a954 2->3 5 713adcc-713ae13 call 713a954 * 2 3->5 15 713ae1d-713ae21 call 713a964 5->15 17 713ae26-713af3f call 713a954 * 3 call 713a984 call 713a964 call 713a954 * 3 call 713a964 15->17 55 713af49-713af4d call 713a994 17->55 57 713af52-713aff5 call 713a984 call 713a9a4 call 713a964 call 713a954 * 2 call 7130bb0 55->57 80 713affa-713b02f call 713a9b4 57->80 82 713b034-713b042 call 713a9c4 80->82 84 713b047-713b08b call 713a9d4 call 713a9e4 82->84 88 713b090-713b6b7 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 84->88 180 713b6bc-713b6c9 88->180 436 713b6cc call 716ccd7 180->436 437 713b6cc call 716cce8 180->437 181 713b6cf-713bcc0 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713aa04 265 713bcc5-713bcd2 call 713aa14 181->265 267 713bcd7-713c250 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713aa24 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa34 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713aa44 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 265->267 348 713c25c-713c270 call 713aa54 267->348 350 713c275-713c2bd call 713aa64 call 713aa74 call 713aa84 348->350 356 713c2c2-713c2d2 350->356 432 713c2d5 call 716f530 356->432 433 713c2d5 call 716f560 356->433 357 713c2d8-713c2f7 call 713aa84 * 2 362 713c2fc-713c30c 357->362 434 713c30f call 716f530 362->434 435 713c30f call 716f560 362->435 363 713c312-713c4dc call 713aa84 * 16 411 713c4e2-713c4e9 call 713aa94 363->411 413 713c4ee-713c553 call 713aaa4 call 713a9c4 call 713aab4 call 713aac4 call 7138f3c 411->413 427 713c55a-713c565 call 7130d6c call 713aad4 413->427 431 713c56a-713c571 427->431 432->357 433->357 434->363 435->363 436->181 437->181
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343432039.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $!$!$%$&$&$&$&$&$-$-$-$2$6$8$D$F$I$_$`$a$a$e$l
                                      • API String ID: 0-146802345
                                      • Opcode ID: 40907606586cfb92532c11d3eeb372e3faea797193f39580a9480f1f6a7e9298
                                      • Instruction ID: f8719c94bb818d39ae6550b0fb14a1fcae2cd3c0e1beda99df66c8ed41d6cda0
                                      • Opcode Fuzzy Hash: 40907606586cfb92532c11d3eeb372e3faea797193f39580a9480f1f6a7e9298
                                      • Instruction Fuzzy Hash: 64E23870A10705CFCB25EF34C8506AEB7B2BF99304F5186ADD09A6B390DB75A985CF81

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 438 713ad98-713b6c9 call 713a954 * 3 call 713a964 call 713a954 * 3 call 713a984 call 713a964 call 713a954 * 3 call 713a964 call 713a994 call 713a984 call 713a9a4 call 713a964 call 713a954 * 2 call 7130bb0 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 871 713b6cc call 716ccd7 438->871 872 713b6cc call 716cce8 438->872 618 713b6cf-713c2d2 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713aa04 call 713aa14 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713aa24 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa34 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713aa44 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713a9b4 call 713a9c4 call 713a9d4 call 713a9e4 call 713a9f4 call 713aa04 call 713aa54 call 713aa64 call 713aa74 call 713aa84 873 713c2d5 call 716f530 618->873 874 713c2d5 call 716f560 618->874 794 713c2d8-713c30c call 713aa84 * 2 869 713c30f call 716f530 794->869 870 713c30f call 716f560 794->870 800 713c312-713c565 call 713aa84 * 16 call 713aa94 call 713aaa4 call 713a9c4 call 713aab4 call 713aac4 call 7138f3c call 7130d6c call 713aad4 868 713c56a-713c571 800->868 869->800 870->800 871->618 872->618 873->794 874->794
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343432039.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $!$!$%$&$&$&$&$&$-$-$-$2$6$8$D$F$I$_$`$a$a$e$l
                                      • API String ID: 0-146802345
                                      • Opcode ID: 3c9e2fc128e420e71c87f5dfa761323d3aaea601845e5beb887c73062d981d2e
                                      • Instruction ID: df1edc6510a8ec44c6299bf39db2bd0fb47917147c0ae9d3387187b205eaed37
                                      • Opcode Fuzzy Hash: 3c9e2fc128e420e71c87f5dfa761323d3aaea601845e5beb887c73062d981d2e
                                      • Instruction Fuzzy Hash: 95E23870A10705CFCB25EF34C8506AEB7B2BF99304F5186ADD09A6B390DB75A985CF81

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 875 8952908-895292d 876 8952937-8952a1f 875->876 880 8952a25-8952af1 876->880 881 8952af6-8952b00 876->881 893 8952e2f-8952e3b 880->893 882 8952b06-8952c98 881->882 883 8952c9d-8952e23 881->883 882->893 883->893 894 8952e70-8952e99 893->894 895 8952e3d-8952e44 893->895 900 8952f0c-8952f61 894->900 898 8952e46-8952e4b 895->898 899 8952e4d-8952e54 895->899 901 8952e6c-8952e6e 898->901 902 8952e56-8952e58 899->902 903 8952e5a-8952e69 899->903 911 8952f63 900->911 912 8952f6c-8952fff 900->912 901->894 907 8952e9b-8952f05 901->907 902->901 903->901 907->900 911->912 913 8952f65 911->913 922 8953001 912->922 923 895300a-895307e 912->923 913->912 922->923 924 8953003 922->924 932 8953084-8953129 923->932 933 8953139-895316f 923->933 924->923 932->933 936 895312b-8953138 932->936 938 8953171 933->938 939 8953183-8953190 933->939 936->933 938->939 941 8953173-8953181 938->941 944 8953191-895319b 939->944 941->944 945 895319d-89531b5 944->945 946 895320b-895321b 944->946 949 89531b7-89531be 945->949 950 895321c-895337c 945->950 946->950 951 89531c7-89531ce 949->951 952 89531c0-89531c5 949->952 973 895337e 950->973 974 895338a 950->974 953 89531d4-89531e3 951->953 954 89531d0-89531d2 951->954 956 89531e6-89531e8 952->956 953->956 954->956 956->950 957 89531ea-8953209 956->957 957->950 973->974 975 895338b 974->975 975->975
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343869907.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8950000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: fff?
                                      • API String ID: 0-4136771917
                                      • Opcode ID: 4c65f71cb7ed11e656f4717d7c8432188d3b36fbe6fd9d8ef048071a7658dfa2
                                      • Instruction ID: eeac38507e70e59da1cd085a8111c0659fc39d8f6adb5fa6ba4740d00e4fa865
                                      • Opcode Fuzzy Hash: 4c65f71cb7ed11e656f4717d7c8432188d3b36fbe6fd9d8ef048071a7658dfa2
                                      • Instruction Fuzzy Hash: 84622B3581061ADFCF11DF60C884AD9B7B2FF99304F1586D9E9086B261EB71AAD5CF80

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 976 89528f8-895292d 977 8952937-8952a1f 976->977 981 8952a25-8952af1 977->981 982 8952af6-8952b00 977->982 994 8952e2f-8952e3b 981->994 983 8952b06-8952c98 982->983 984 8952c9d-8952e23 982->984 983->994 984->994 995 8952e70-8952e99 994->995 996 8952e3d-8952e44 994->996 1001 8952f0c-8952f61 995->1001 999 8952e46-8952e4b 996->999 1000 8952e4d-8952e54 996->1000 1002 8952e6c-8952e6e 999->1002 1003 8952e56-8952e58 1000->1003 1004 8952e5a-8952e69 1000->1004 1012 8952f63 1001->1012 1013 8952f6c-8952fff 1001->1013 1002->995 1008 8952e9b-8952f05 1002->1008 1003->1002 1004->1002 1008->1001 1012->1013 1014 8952f65 1012->1014 1023 8953001 1013->1023 1024 895300a-895307e 1013->1024 1014->1013 1023->1024 1025 8953003 1023->1025 1033 8953084-8953129 1024->1033 1034 8953139-895316f 1024->1034 1025->1024 1033->1034 1037 895312b-8953138 1033->1037 1039 8953171 1034->1039 1040 8953183-8953190 1034->1040 1037->1034 1039->1040 1042 8953173-8953181 1039->1042 1045 8953191-895319b 1040->1045 1042->1045 1046 895319d-89531b5 1045->1046 1047 895320b-895321b 1045->1047 1050 89531b7-89531be 1046->1050 1051 895321c-895337c 1046->1051 1047->1051 1052 89531c7-89531ce 1050->1052 1053 89531c0-89531c5 1050->1053 1074 895337e 1051->1074 1075 895338a 1051->1075 1054 89531d4-89531e3 1052->1054 1055 89531d0-89531d2 1052->1055 1057 89531e6-89531e8 1053->1057 1054->1057 1055->1057 1057->1051 1058 89531ea-8953209 1057->1058 1058->1051 1074->1075 1076 895338b 1075->1076 1076->1076
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343869907.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8950000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: fff?
                                      • API String ID: 0-4136771917
                                      • Opcode ID: be3a1232ccbc6fc071db50ad9c4387a168600df80d0a8441e6e324d382a13a80
                                      • Instruction ID: c8fb80487a964339b3d768ae45d151b403ff4463591e3b6fdcd9bfddfe8693a0
                                      • Opcode Fuzzy Hash: be3a1232ccbc6fc071db50ad9c4387a168600df80d0a8441e6e324d382a13a80
                                      • Instruction Fuzzy Hash: 9E124B35800619DFCF11DF50C888AD9BBB2FF49304F158599E9086F266DB72AE96DF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343869907.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8950000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5d7705e75f972c948f6321a7eb54ac2c37372576d637806eb1a971e949e87108
                                      • Instruction ID: 2a14f754ff624e63a48508976744c07e776cf0ef07228e9f16a2e07ac3594959
                                      • Opcode Fuzzy Hash: 5d7705e75f972c948f6321a7eb54ac2c37372576d637806eb1a971e949e87108
                                      • Instruction Fuzzy Hash: 6D524B35A11619CFCB25EF64C844BE9B7B1FF49305F1486D9E909AB261EB31EA81CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343869907.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8950000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fbbe48c687f865d5598ffec672ddff49b3ded5b4f28eeb4ac84ec3f0f0237b3d
                                      • Instruction ID: e14160b877f90cdfba3ebe5e6487248891dd04ab8f69e60287058a78e57faf43
                                      • Opcode Fuzzy Hash: fbbe48c687f865d5598ffec672ddff49b3ded5b4f28eeb4ac84ec3f0f0237b3d
                                      • Instruction Fuzzy Hash: FE324831A10619CFDB21EF64C944BD9B7B2FF89305F1185E9E809AB261DB71EA85CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d8790676fffe0e2a78a48edeb08e6aa160a515089e3d07ba51055a7dbf3b8f5c
                                      • Instruction ID: 8b38753f12efa667b44b97bcc770cab4c52691d6ff1e3b368196d0f78754c5fd
                                      • Opcode Fuzzy Hash: d8790676fffe0e2a78a48edeb08e6aa160a515089e3d07ba51055a7dbf3b8f5c
                                      • Instruction Fuzzy Hash: 14F191B4730652CFDB18AB35C594A2D33A6AF8A601F54806DD906CB3A5EFB4DC45CB83
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: DispatchMessage
                                      • String ID:
                                      • API String ID: 2061451462-0
                                      • Opcode ID: 8a55665696d5a371ad73551b57de78bb8849c3e3a9197b29cead50a9d1562a90
                                      • Instruction ID: 2a3d38fb4b8c47622af62fb532acce2f48bc700899cba25e52207740ad01af1c
                                      • Opcode Fuzzy Hash: 8a55665696d5a371ad73551b57de78bb8849c3e3a9197b29cead50a9d1562a90
                                      • Instruction Fuzzy Hash: 06F14DB0A1060ACFEB14DFA9C944B9DBBF1BF88714F15C159E405AB395DBB0AD45CB80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3341035445.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2dd0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f0f530d2106be77be56279cf0ef9a0713b10a4f256a32800bf24a5a0f1485843
                                      • Instruction ID: 9ae76911398cc7a9a8accca264521f8f503eefe6de7a7d934c24f9d628addce2
                                      • Opcode Fuzzy Hash: f0f530d2106be77be56279cf0ef9a0713b10a4f256a32800bf24a5a0f1485843
                                      • Instruction Fuzzy Hash: 1EE190307007499FEB19EF64D850BAD7BB2BF89310F548569E602AB395DB71EC42CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343432039.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 49fb61b0045cd0c037928a8c32e20a465a96ae8a71830d0d7969026bbad32bd7
                                      • Instruction ID: 7e388ecb431673532274387824d2f8093e871eab123de49035472793364f24f8
                                      • Opcode Fuzzy Hash: 49fb61b0045cd0c037928a8c32e20a465a96ae8a71830d0d7969026bbad32bd7
                                      • Instruction Fuzzy Hash: D1A19FB5E1031ADFDB05DFB0D8949DDBBBAFF89310F158215E416AB2A0EB30A941CB50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343432039.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ba049fde0c5eb13a1286aec1b5c0d009cbae3920ab7eaa1ca8da601f146d72f1
                                      • Instruction ID: cbcef1cae76b17e016a68fa14d1582ae298accbf1aec197fdf6c1a3704f42ee8
                                      • Opcode Fuzzy Hash: ba049fde0c5eb13a1286aec1b5c0d009cbae3920ab7eaa1ca8da601f146d72f1
                                      • Instruction Fuzzy Hash: 5B9191B5E1035ADFCB05DFB0D8449DDFBBAFF99310B158215E416AB2A0EB30A981CB50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1077 7130040-713004f 1078 7130051 1077->1078 1079 713007b-713007f 1077->1079 1129 7130057 call 7130040 1078->1129 1130 7130057 call 713003b 1078->1130 1080 7130093-71300d4 1079->1080 1081 7130081-713008b 1079->1081 1087 71300e1-71300ef 1080->1087 1088 71300d6-71300de 1080->1088 1081->1080 1082 713005c-713005e 1083 7130060 1082->1083 1084 7130074 1082->1084 1131 7130066 call 71302d8 1083->1131 1132 7130066 call 71302c8 1083->1132 1084->1079 1090 7130113-7130115 1087->1090 1091 71300f1-71300f6 1087->1091 1088->1087 1089 713006c-713006e 1089->1084 1094 71301b0-713022a 1089->1094 1095 7130118-713011f 1090->1095 1092 7130101 1091->1092 1093 71300f8-71300ff 1091->1093 1096 7130103-7130111 1092->1096 1093->1096 1122 7130231-7130270 1094->1122 1123 713022c 1094->1123 1097 7130121-7130129 1095->1097 1098 713012c-7130133 1095->1098 1096->1095 1097->1098 1100 7130140-7130149 1098->1100 1101 7130135-713013d 1098->1101 1105 7130156-713015b 1100->1105 1106 713014b-7130153 1100->1106 1101->1100 1107 7130179-7130186 1105->1107 1108 713015d-7130164 1105->1108 1106->1105 1114 71301a9-71301af 1107->1114 1115 7130188-71301a6 1107->1115 1108->1107 1110 7130166-7130176 1108->1110 1110->1107 1115->1114 1124 7130272-7130275 1122->1124 1125 7130278-71302a3 GetModuleHandleW 1122->1125 1123->1122 1124->1125 1126 71302a5-71302ab 1125->1126 1127 71302ac-71302c0 1125->1127 1126->1127 1129->1082 1130->1082 1131->1089 1132->1089
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,?,?,?,?,?,?,00000000,00000000), ref: 07130296
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343432039.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: b4771140d9c472f1d69d7628cefbcf84ee7f27b73024e6918060802bdeae5243
                                      • Instruction ID: 1fd33d3b6bab2480dd66d712e65b74a951c05fad1fbb8227586556b5a8625d9e
                                      • Opcode Fuzzy Hash: b4771140d9c472f1d69d7628cefbcf84ee7f27b73024e6918060802bdeae5243
                                      • Instruction Fuzzy Hash: DC7139B0A00B068FDB25DF69D45075ABBF2FF88740F00892DD486DBA90EB75E945CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1133 7168620-7168651 1135 7168667-716866d 1133->1135 1136 7168653-7168660 1133->1136 1137 716868e-71686d4 1135->1137 1138 716866f-7168675 1135->1138 1136->1135 1149 71686d6-71686e0 call 7165ce4 1137->1149 1150 71686fd-7168707 1137->1150 1138->1137 1140 7168677-7168680 1138->1140 1140->1137 1141 7168682-7168688 1140->1141 1141->1137 1143 7168783-7168796 1141->1143 1144 7168798-71687b0 call 7165cd4 1143->1144 1155 71687b2-71687fa 1144->1155 1156 7168801 1144->1156 1154 71686e5-71686f8 1149->1154 1150->1143 1153 7168709-7168716 1150->1153 1157 7168724-716872d 1153->1157 1158 7168718-716871e 1153->1158 1154->1144 1155->1156 1163 7168802 1156->1163 1160 716872f-7168735 1157->1160 1161 716873b-716877e KiUserCallbackDispatcher 1157->1161 1158->1157 1159 7168720 1158->1159 1159->1157 1160->1161 1162 7168737 1160->1162 1161->1143 1162->1161 1163->1163
                                      APIs
                                      • KiUserCallbackDispatcher.NTDLL(00000014,?,?,03F561D0,030093B8,?,00000000), ref: 0716877E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343478380.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7160000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: CallbackDispatcherUser
                                      • String ID:
                                      • API String ID: 2492992576-0
                                      • Opcode ID: 96a2d8fc710a8bbd0f7d9895b31064e67ba6abb73f10c25c5dcadf19e2b446bf
                                      • Instruction ID: c6527c196068d58cf8d6e6f3d79aba3d6d60a42c610036750f5b3b232181220c
                                      • Opcode Fuzzy Hash: 96a2d8fc710a8bbd0f7d9895b31064e67ba6abb73f10c25c5dcadf19e2b446bf
                                      • Instruction Fuzzy Hash: 01718EB4A11209EFCB15DF69D498DAEBBB6BF48724F114098F901AB361DB31E891CB50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1172 7135347-71353b6 1174 71353c1-71353c8 1172->1174 1175 71353b8-71353be 1172->1175 1176 71353d3-713540b 1174->1176 1177 71353ca-71353d0 1174->1177 1175->1174 1178 7135413-7135472 CreateWindowExW 1176->1178 1177->1176 1179 7135474-713547a 1178->1179 1180 713547b-71354b3 1178->1180 1179->1180 1184 71354c0 1180->1184 1185 71354b5-71354b8 1180->1185 1186 71354c1 1184->1186 1185->1184 1186->1186
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 07135462
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343432039.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: 2f7f14f4cdd1b7bd09ea590f8ea27608e5b7d87b9fc4b0f9f8fb909c3ced08bb
                                      • Instruction ID: c1a8b9e1f6762f11cc4bdf84db951334c212bc95c5960c6cbb97125abafa9f18
                                      • Opcode Fuzzy Hash: 2f7f14f4cdd1b7bd09ea590f8ea27608e5b7d87b9fc4b0f9f8fb909c3ced08bb
                                      • Instruction Fuzzy Hash: 0951A1B1D00349DFDB14CFA9C984ADEBBB6FF48710F24812AE819AB250D7759855CF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1187 71336b0-71353b6 1189 71353c1-71353c8 1187->1189 1190 71353b8-71353be 1187->1190 1191 71353d3-7135472 CreateWindowExW 1189->1191 1192 71353ca-71353d0 1189->1192 1190->1189 1194 7135474-713547a 1191->1194 1195 713547b-71354b3 1191->1195 1192->1191 1194->1195 1199 71354c0 1195->1199 1200 71354b5-71354b8 1195->1200 1201 71354c1 1199->1201 1200->1199 1201->1201
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 07135462
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343432039.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: 04f9065520d3297b60f816859fc354f4ab74d5e548352b3a8c719373fde7d8bb
                                      • Instruction ID: 732b77b8fc5675c7e2a22a1b74a4330fcf907e78eb2cbd5ddaee85f7917ad4a4
                                      • Opcode Fuzzy Hash: 04f9065520d3297b60f816859fc354f4ab74d5e548352b3a8c719373fde7d8bb
                                      • Instruction Fuzzy Hash: 9A51B1B1D00349DFDF14CFA9C984ADEBBB6BF48710F24812AE819AB250D7759855CF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1202 72de3e8-72de3e9 1203 72de37f-72de3ca DispatchMessageW 1202->1203 1204 72de3eb-72de428 1202->1204 1205 72de3cc-72de3d2 1203->1205 1206 72de3d3-72de3e7 1203->1206 1208 72de42f-72de44a 1204->1208 1209 72de42a 1204->1209 1205->1206 1213 72de44c-72de45c 1208->1213 1214 72de477-72de492 1208->1214 1209->1208 1219 72de45e-72de464 1213->1219 1220 72de474 1213->1220 1217 72de49c 1214->1217 1218 72de494 1214->1218 1221 72de49d 1217->1221 1218->1217 1222 72de468-72de46a 1219->1222 1223 72de466 1219->1223 1220->1214 1221->1221 1222->1220 1223->1220
                                      APIs
                                      • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,072DD917), ref: 072DE3BD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: DispatchMessage
                                      • String ID:
                                      • API String ID: 2061451462-0
                                      • Opcode ID: a3bb8704761706a53e3089d47a34f235e7987add87185dab5f71b28b6f7626a1
                                      • Instruction ID: b1329d1878f5eda34fa05a4c086273560e1d2a565755282505926bf6a25b44d6
                                      • Opcode Fuzzy Hash: a3bb8704761706a53e3089d47a34f235e7987add87185dab5f71b28b6f7626a1
                                      • Instruction Fuzzy Hash: F14156B5E1025ACFDB14DFA9D884AEDBBF0BF49310F0581AAD415AB361C774A844CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1224 2ddb494-2ddb496 1225 2ddb49d-2ddb49e 1224->1225 1226 2ddb498 1224->1226 1227 2ddb4a5-2ddb51b 1225->1227 1228 2ddb4a0-2ddb4a4 1225->1228 1226->1225 1229 2ddb523-2ddb561 CreateActCtxA 1227->1229 1228->1227 1230 2ddb56a-2ddb5c4 1229->1230 1231 2ddb563-2ddb569 1229->1231 1238 2ddb5c6-2ddb5c9 1230->1238 1239 2ddb5d3-2ddb5d7 1230->1239 1231->1230 1238->1239 1240 2ddb5d9-2ddb5e5 1239->1240 1241 2ddb5e8 1239->1241 1240->1241 1243 2ddb5e9 1241->1243 1243->1243
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 02DDB551
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3341035445.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2dd0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 4a6c2dab918397ac0ef72566f8dcd870b1b67929e47d8bdc3d7d999c26a917b9
                                      • Instruction ID: 255655188163406764653dd850bb985b140570eced751a730697301f4ffb65cd
                                      • Opcode Fuzzy Hash: 4a6c2dab918397ac0ef72566f8dcd870b1b67929e47d8bdc3d7d999c26a917b9
                                      • Instruction Fuzzy Hash: B341CFB0C00719CBEB24CFA9C944BDEBBB5BF48708F20816AD508AB255DBB56945CF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1244 7133804-7137adc 1247 7137ae2-7137ae7 1244->1247 1248 7137b8c-7137bac call 71336dc 1244->1248 1250 7137b3a-7137b72 CallWindowProcW 1247->1250 1251 7137ae9-7137b20 1247->1251 1255 7137baf-7137bbc 1248->1255 1252 7137b74-7137b7a 1250->1252 1253 7137b7b-7137b8a 1250->1253 1258 7137b22-7137b28 1251->1258 1259 7137b29-7137b38 1251->1259 1252->1253 1253->1255 1258->1259 1259->1255
                                      APIs
                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 07137B61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343432039.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: CallProcWindow
                                      • String ID:
                                      • API String ID: 2714655100-0
                                      • Opcode ID: af52b1d897269cfac281d656f0d73129f11db8c924b0a47f27974cd0da9203b6
                                      • Instruction ID: f6f16202c0a4ac0e7ab66aa393cec1c35e226d63b8bda68e844a9ea7dc2e2909
                                      • Opcode Fuzzy Hash: af52b1d897269cfac281d656f0d73129f11db8c924b0a47f27974cd0da9203b6
                                      • Instruction Fuzzy Hash: 154138F4900209CFDB14CF99C488BAABBF6FF88314F248458D519AB3A1D774A941CBA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1261 2dda32c-2ddb561 CreateActCtxA 1265 2ddb56a-2ddb5c4 1261->1265 1266 2ddb563-2ddb569 1261->1266 1273 2ddb5c6-2ddb5c9 1265->1273 1274 2ddb5d3-2ddb5d7 1265->1274 1266->1265 1273->1274 1275 2ddb5d9-2ddb5e5 1274->1275 1276 2ddb5e8 1274->1276 1275->1276 1278 2ddb5e9 1276->1278 1278->1278
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 02DDB551
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3341035445.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2dd0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: d06bfd72bfcb275621d395e278227fa4870411f92b025c9159bd05a2dc3ac033
                                      • Instruction ID: 39fbe165b7c1461293b7e9674d1b2c4b07eb46bbf6d0d324e8014c8129b754ef
                                      • Opcode Fuzzy Hash: d06bfd72bfcb275621d395e278227fa4870411f92b025c9159bd05a2dc3ac033
                                      • Instruction Fuzzy Hash: 8241CFB0C0071DCBEB24CFA9C944B9EBBB5BF48308F20816AD518AB251DBB56945CF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1413 7165c48-7165c50 1415 7165c52 1413->1415 1416 7165c3d-7165c43 1413->1416 1417 7167300-716734c 1415->1417 1416->1417 1418 7167357-7167366 1417->1418 1419 716734e-7167354 1417->1419 1420 716736b-71673a4 DrawTextExW 1418->1420 1421 7167368 1418->1421 1419->1418 1422 71673a6-71673ac 1420->1422 1423 71673ad-71673ca 1420->1423 1421->1420 1422->1423
                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,071672E5,?,?), ref: 07167397
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343478380.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7160000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: ac79fadd3f625a410f5eee7c3d20e454fe3a73e805a921b6a27fbb2e48aee594
                                      • Instruction ID: 95b232350761d868f29a224969d51f8169ed701396fec95144d6bb128bda301c
                                      • Opcode Fuzzy Hash: ac79fadd3f625a410f5eee7c3d20e454fe3a73e805a921b6a27fbb2e48aee594
                                      • Instruction Fuzzy Hash: 0C31E2B190030A9FDB11CF9AD884ADEBBF5BF48224F14842AE919A7250D774A954CFA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1392 713555b-7135562 1393 7135564-7135566 1392->1393 1394 7135569-713556b 1392->1394 1395 7135568 1393->1395 1396 713556d-713556f 1393->1396 1394->1396 1395->1394 1397 7135571-7135573 1396->1397 1398 7135575-7135577 1396->1398 1397->1398 1399 7135579-713557b call 71336ec 1398->1399 1400 713557d-713557f 1398->1400 1399->1400 1410 713557f call 713555b 1400->1410 1411 713557f call 7135568 1400->1411 1412 713557f call 71336ec 1400->1412 1403 7135580-7135592 1404 7135594-7135598 1403->1404 1405 7135599-7135602 SetWindowLongW 1403->1405 1404->1405 1406 7135604-713560a 1405->1406 1407 713560b-713561f 1405->1407 1406->1407 1410->1403 1411->1403 1412->1403
                                      APIs
                                      • SetWindowLongW.USER32(?,-00000014,?), ref: 071355F5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343432039.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: LongWindow
                                      • String ID:
                                      • API String ID: 1378638983-0
                                      • Opcode ID: 8dc38a180cf8bc352320fe9e472605dbb8e45cdd97186f95ead291427c75454c
                                      • Instruction ID: 6b2ac84e74a5c8bb65041e8cb0de81977372c50fcd74fbb48c3d660349210ebf
                                      • Opcode Fuzzy Hash: 8dc38a180cf8bc352320fe9e472605dbb8e45cdd97186f95ead291427c75454c
                                      • Instruction Fuzzy Hash: 982168B1800249EFCB10CFA9E945B8ABBFAFB48714F19845AE804A7251D375A914CFA0
                                      APIs
                                      • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,072DD7D2,00000000,00000000,03F561D0,030093B8), ref: 072DDC20
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: MessagePeek
                                      • String ID:
                                      • API String ID: 2222842502-0
                                      • Opcode ID: 4f8990c3a8715ab3503e42ca9350054e93c107985898bcffdcb4a231052fc931
                                      • Instruction ID: b44268a53a4b49c00794aa45246886a21516683df9bc5b655690c493152603e2
                                      • Opcode Fuzzy Hash: 4f8990c3a8715ab3503e42ca9350054e93c107985898bcffdcb4a231052fc931
                                      • Instruction Fuzzy Hash: 7B2187B29046499FDB20CF99C580BEEBBF4EF48320F14806AD554A7252C3B8A944CFA1
                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,071672E5,?,?), ref: 07167397
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343478380.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7160000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: b1a42297b1f0a166a7eef271b91a3fdfd5f168cd15119588a686670b21dbfcce
                                      • Instruction ID: ca8cdcf380f7a7182a3ded28afa7944ccab955815bc2680f6f260b9da24c0848
                                      • Opcode Fuzzy Hash: b1a42297b1f0a166a7eef271b91a3fdfd5f168cd15119588a686670b21dbfcce
                                      • Instruction Fuzzy Hash: 8E31E5B5D003099FDB10CF9AD984A9EFBF4FB48314F14842AE919A7350D774A950CFA0
                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,071672E5,?,?), ref: 07167397
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343478380.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7160000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: 8a146cefdab16b7190fe52c492333c2e4d1c998b6dc9b216436dc7ebaff60315
                                      • Instruction ID: b834796585682c93e62c7ac67861df40a481feff79346d92cefe6f9cd03f261b
                                      • Opcode Fuzzy Hash: 8a146cefdab16b7190fe52c492333c2e4d1c998b6dc9b216436dc7ebaff60315
                                      • Instruction Fuzzy Hash: 9231E4B59003099FDB10CF9AD884ADEFBF4FB48314F14842AE919A7350D774A550CFA0
                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,071672E5,?,?), ref: 07167397
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343478380.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7160000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: 17c67db18ab3760f43d5278da34379ae62ef80724a0ff5f97041c6293bf267b4
                                      • Instruction ID: 4b2c1d6bea1e385ef226f853723f26131a94d455851e78d10d0ba45a10658f19
                                      • Opcode Fuzzy Hash: 17c67db18ab3760f43d5278da34379ae62ef80724a0ff5f97041c6293bf267b4
                                      • Instruction Fuzzy Hash: 5221C2B590020A9FDB10CF9AD884ADEFBF5BB48224F14842AE919A7250D774A554CFA0
                                      APIs
                                      • GetClassInfoW.USER32(?,00000000), ref: 072D0964
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: ClassInfo
                                      • String ID:
                                      • API String ID: 3534257612-0
                                      • Opcode ID: b72fd2c0614b089bc3b38e6f5b035662d52dce3bdf8ae7633faa1c8e003daa0c
                                      • Instruction ID: f248dcdf4b0b8948a0e47b4de9e32e9aabc0f4eb547419bc72dbfe65db875ef5
                                      • Opcode Fuzzy Hash: b72fd2c0614b089bc3b38e6f5b035662d52dce3bdf8ae7633faa1c8e003daa0c
                                      • Instruction Fuzzy Hash: CA2128B2D0070A9FDB10CFAAC984ADEFBF5FF48720F14842AD458A3210D374AA44CB64
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02DD8996,?,?,?,?,?), ref: 02DD8A57
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3341035445.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2dd0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: c4ba7959457bb793b53cb6bc612991542b7e3e07b09dff5c13e583e1c64a9f00
                                      • Instruction ID: dd4b1a3688f11ffce3c400e549a77c34ccef0ae644fa044a9cbfc943b0075616
                                      • Opcode Fuzzy Hash: c4ba7959457bb793b53cb6bc612991542b7e3e07b09dff5c13e583e1c64a9f00
                                      • Instruction Fuzzy Hash: 902103B5900608DFDB10CF9AD984AEEBBF4FB48320F14846AE918A3310D374A950CFA4
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02DD8996,?,?,?,?,?), ref: 02DD8A57
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3341035445.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2dd0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 7276599a7543f54c444aaa433675706eb117285a26fd30de20965a5f7b95b432
                                      • Instruction ID: 28926ab9b98e4e0e04451f33fe5b4ba3c4ee722b3000839324953e8d869dde7a
                                      • Opcode Fuzzy Hash: 7276599a7543f54c444aaa433675706eb117285a26fd30de20965a5f7b95b432
                                      • Instruction Fuzzy Hash: CF21E3B5900249DFDB10CFAAD984ADEBFF5FB48320F14845AE918A3310D378A950CFA5
                                      APIs
                                      • EnumThreadWindows.USER32(?,00000000,?,?,?,?,00000E20,?,?,02DDA690,03F561D0,030093B8), ref: 02DDA721
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3341035445.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2dd0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: EnumThreadWindows
                                      • String ID:
                                      • API String ID: 2941952884-0
                                      • Opcode ID: 82d2ea5d6082dadf434de66f43a312cbf1ac73d615806d7454ff75bb5e8f7fa2
                                      • Instruction ID: 5ba688eafa5b0cae98b15cea47559db38bbded26a50bac565236548744050fb6
                                      • Opcode Fuzzy Hash: 82d2ea5d6082dadf434de66f43a312cbf1ac73d615806d7454ff75bb5e8f7fa2
                                      • Instruction Fuzzy Hash: 3E2135B190064A9FDB10CF9AC844BEEFBF9FB88324F14842AD455A7350D778A944CFA1
                                      APIs
                                      • EnumThreadWindows.USER32(?,00000000,?,?,?,?,00000E20,?,?,02DDA690,03F561D0,030093B8), ref: 02DDA721
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3341035445.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2dd0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: EnumThreadWindows
                                      • String ID:
                                      • API String ID: 2941952884-0
                                      • Opcode ID: f50057c8dd469c3f0289662d041de5b31947fbab774378f6b0aca78a0de1ddef
                                      • Instruction ID: 263394bca179bb87669cf4a8867a40b0cb4bca0b3b1725ebd4d6ed1e022b8058
                                      • Opcode Fuzzy Hash: f50057c8dd469c3f0289662d041de5b31947fbab774378f6b0aca78a0de1ddef
                                      • Instruction Fuzzy Hash: 022118759006499FDB10CF9AC884BEEFBF5EB88320F14842AD454A7350D778A944CFA5
                                      APIs
                                      • KiUserCallbackDispatcher.NTDLL(?,?,00000000,00000000,?,?,?,072DD85F,00000000,03F561D0,030093B8,00000000,?), ref: 072DDEED
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: CallbackDispatcherUser
                                      • String ID:
                                      • API String ID: 2492992576-0
                                      • Opcode ID: c7f3d54bb66e4a10b4c8f60b31fe9217445a1a8f3a55c5b02e952c374b13e9ca
                                      • Instruction ID: c2efa1c2e38db39dcce80840c6c1e4dd65ec25b3a6499c57fb76b942f2d58aaf
                                      • Opcode Fuzzy Hash: c7f3d54bb66e4a10b4c8f60b31fe9217445a1a8f3a55c5b02e952c374b13e9ca
                                      • Instruction Fuzzy Hash: 6111E5B6A143599FDB14DBA9D8047DDBBB4EF88320F04803BE544E3251CB389855CBA1
                                      APIs
                                      • GetClassInfoW.USER32(?,00000000), ref: 072D0964
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: ClassInfo
                                      • String ID:
                                      • API String ID: 3534257612-0
                                      • Opcode ID: 14b9d0aba012def9a652c1d12bf5a756488c3108048a4b7859148bd8782a95c5
                                      • Instruction ID: 46bbe64d7bbfa03812829001bb4d8f646ffa583ab9cbe01d0f3c5e3ddcde200d
                                      • Opcode Fuzzy Hash: 14b9d0aba012def9a652c1d12bf5a756488c3108048a4b7859148bd8782a95c5
                                      • Instruction Fuzzy Hash: D92115B2D0174A9FDB20CF9AC984BDEFBF5FB48720F14842AD458A3250D374AA44CB64
                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,071672E5,?,?), ref: 07167397
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343478380.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7160000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: 7ae7a599139bcfbebfda00508772ec5f6481d6d250a025b69740efd082781354
                                      • Instruction ID: cd47c2864b84a213bedcd3b213d996d0e112287c191a0ac58c868492ad42630b
                                      • Opcode Fuzzy Hash: 7ae7a599139bcfbebfda00508772ec5f6481d6d250a025b69740efd082781354
                                      • Instruction Fuzzy Hash: 882134B690030ADFDB10CF99D884ADEBBF1BF48324F24841AE815A7350C774A951CF60
                                      APIs
                                      • MessageBoxW.USER32(?,00000000,00000000,?,?,?,?,?,?,?,02DD7A75,?,?,?), ref: 02DDAABD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3341035445.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2dd0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: Message
                                      • String ID:
                                      • API String ID: 2030045667-0
                                      • Opcode ID: 25074b72e3980aca67aa11e76c8f66525251362e11d5be35d7208ece236fde06
                                      • Instruction ID: 56510ee9590231fe09dc4c3256a2c9299ab35efedfbf7e81500b20d875eaa7cb
                                      • Opcode Fuzzy Hash: 25074b72e3980aca67aa11e76c8f66525251362e11d5be35d7208ece236fde06
                                      • Instruction Fuzzy Hash: 9C2104B69047099FDB10CF9AD984ADEFBB5FB48314F14852EE919A7300D3B5A944CBA0
                                      APIs
                                      • MessageBoxW.USER32(?,00000000,00000000,?,?,?,?,?,?,?,02DD7A75,?,?,?), ref: 02DDAABD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3341035445.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2dd0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: Message
                                      • String ID:
                                      • API String ID: 2030045667-0
                                      • Opcode ID: 7db23105e3f245c05ee43dcee1e998d18450adde1e32bf4f72e242cc2b960d1c
                                      • Instruction ID: bdcf619e6d83842640d7033b3b43e43a88c156861254985b7c4d0cebd3558607
                                      • Opcode Fuzzy Hash: 7db23105e3f245c05ee43dcee1e998d18450adde1e32bf4f72e242cc2b960d1c
                                      • Instruction Fuzzy Hash: 012113B680070A9FDB10CF9AD984ADEFBB5FB48314F14852EE419A7300C375A944CBA0
                                      APIs
                                      • SetWindowTextW.USER32(?,00000000), ref: 072CEAA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343655712.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72c0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: TextWindow
                                      • String ID:
                                      • API String ID: 530164218-0
                                      • Opcode ID: e38ca9efcdb95c7d4f1b00c6e819fd6ed9341088995677f0914a01de6e6070cf
                                      • Instruction ID: 69fd0f3cba5712a8e2ed8cfe13f7db8c0ef7e5a882805bfe69ab68af0f458bd6
                                      • Opcode Fuzzy Hash: e38ca9efcdb95c7d4f1b00c6e819fd6ed9341088995677f0914a01de6e6070cf
                                      • Instruction Fuzzy Hash: 9B2113B2C0024A8FDB14CF9AC544ADEFBF5FF88320F14842AD858A3240D378A545CFA1
                                      APIs
                                      • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,072DD7D2,00000000,00000000,03F561D0,030093B8), ref: 072DDC20
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: MessagePeek
                                      • String ID:
                                      • API String ID: 2222842502-0
                                      • Opcode ID: ccd46d1374222d73f7b46310d848d4279ba492d0fd73292c98c8ec3fbe444922
                                      • Instruction ID: 350d958e1a59650cdd9c6425ef12c8664fe7b2d45a51d942422eab28a80ddb42
                                      • Opcode Fuzzy Hash: ccd46d1374222d73f7b46310d848d4279ba492d0fd73292c98c8ec3fbe444922
                                      • Instruction Fuzzy Hash: 2A1117B59106499FDB10CF9AD584BDEFBF4FB48320F10842AE954A3241C3B8A944CFA5
                                      APIs
                                      • KiUserCallbackDispatcher.NTDLL(?,?,00000000,00000000,?,?,?,072DD85F,00000000,03F561D0,030093B8,00000000,?), ref: 072DDEED
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: CallbackDispatcherUser
                                      • String ID:
                                      • API String ID: 2492992576-0
                                      • Opcode ID: a2e78c7ebd9a48f015b08f6e7d75c09b0170c036a069939cf715e6d3eac1543e
                                      • Instruction ID: f1a09312f254104ff733dcb5bce71a9676188e2be1e382699eb65bb80c1110c0
                                      • Opcode Fuzzy Hash: a2e78c7ebd9a48f015b08f6e7d75c09b0170c036a069939cf715e6d3eac1543e
                                      • Instruction Fuzzy Hash: 0B11E7B19147499FDB10DF9AD584BDEFBF4EB58310F10842AE558A3240D378A944CFA5
                                      APIs
                                      • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,072DD7D2,00000000,00000000,03F561D0,030093B8), ref: 072DDC20
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: MessagePeek
                                      • String ID:
                                      • API String ID: 2222842502-0
                                      • Opcode ID: 9e9e4137890e4e75ca192de5c4e9a2dda0d1e0907724c43d5897eab8cb7eb2bc
                                      • Instruction ID: 6ecd26f0cd5b268c4020a8239fccc783eeeb828d3284675c23b22b0e94da32b8
                                      • Opcode Fuzzy Hash: 9e9e4137890e4e75ca192de5c4e9a2dda0d1e0907724c43d5897eab8cb7eb2bc
                                      • Instruction Fuzzy Hash: 3E1114B6800649DFDB20CF9AD584BDEBBF4FB48320F10842AE558A7251C378A944CFA5
                                      APIs
                                      • SetWindowTextW.USER32(?,00000000), ref: 072CEAA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343655712.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72c0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: TextWindow
                                      • String ID:
                                      • API String ID: 530164218-0
                                      • Opcode ID: 67d5d5cbe4c59e3e9a91b313c92bcdecfb258343fc19b35ca3a2a8cf6061e087
                                      • Instruction ID: 5118bee52ec40e9d01716f626204ca9923377a1085ea75b054d2708785f86004
                                      • Opcode Fuzzy Hash: 67d5d5cbe4c59e3e9a91b313c92bcdecfb258343fc19b35ca3a2a8cf6061e087
                                      • Instruction Fuzzy Hash: 2C11C2B6C0064A8FDB14CF9AC544A9EBBF5AB88220F14842AD859A7640D778A545CFA1
                                      APIs
                                      • KiUserCallbackDispatcher.NTDLL(?,?,00000000,00000000,?,?,?,072DD85F,00000000,03F561D0,030093B8,00000000,?), ref: 072DDEED
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: CallbackDispatcherUser
                                      • String ID:
                                      • API String ID: 2492992576-0
                                      • Opcode ID: 484cb557de07a2cda9ec04799b7fc65bba54b04714f7a05d67a15ad2801401f8
                                      • Instruction ID: 43f0a6cd252020c3d9565af188798380b10c06ac9e4aec61764b864e9654399b
                                      • Opcode Fuzzy Hash: 484cb557de07a2cda9ec04799b7fc65bba54b04714f7a05d67a15ad2801401f8
                                      • Instruction Fuzzy Hash: 291126B590074A9FDB10CF9AD984BDEFBF4FB48310F14846AE458A3241C378A544CFA1
                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 072D78A5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 503a005d4273caad3d890e862bd56179aea8807514cf09ffa2487d198c75a74a
                                      • Instruction ID: 86f9ed224b5603413bd75bb16009b9e1033db2059a3cc57a139e4210d959408f
                                      • Opcode Fuzzy Hash: 503a005d4273caad3d890e862bd56179aea8807514cf09ffa2487d198c75a74a
                                      • Instruction Fuzzy Hash: A21126B180034A9FDB10CF99C585BDEBFF4EF48320F148459D554A3241D378A544CFA1
                                      APIs
                                      • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,072DD917), ref: 072DE3BD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: DispatchMessage
                                      • String ID:
                                      • API String ID: 2061451462-0
                                      • Opcode ID: 07c7abde367091dd00db8524cd3471958f02e2d33bf8beddb7f825374517d392
                                      • Instruction ID: 2049303203ead020d7eca8306ca95e534e78cfbc8ff989a61b2a9ff3d1206414
                                      • Opcode Fuzzy Hash: 07c7abde367091dd00db8524cd3471958f02e2d33bf8beddb7f825374517d392
                                      • Instruction Fuzzy Hash: C41129B5C087899FCB11CFAAD844ADEBFF0AF49210F1480AAD459E7652C3789545CFA1
                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 072D78A5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 4631d8d162b7526586baaa9aea9ce85c627fdcaa26155c0f9c625f6141c6da43
                                      • Instruction ID: ffa255d6b02c52908308c5a68b82bd341c21e27cb04c5d61480c9b7b6f999404
                                      • Opcode Fuzzy Hash: 4631d8d162b7526586baaa9aea9ce85c627fdcaa26155c0f9c625f6141c6da43
                                      • Instruction Fuzzy Hash: 7411F5B58003499FDB10CF9AC985BDEFBF8EB48324F148469E554A3650D378A944CFA5
                                      APIs
                                      • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,072DD917), ref: 072DE3BD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: DispatchMessage
                                      • String ID:
                                      • API String ID: 2061451462-0
                                      • Opcode ID: c846ea618734c2639df5ec3bb3c3087c17f5c1a380c6903444faba32d8c127ab
                                      • Instruction ID: b208605efa47d7b000cf3c30974919e1d892684660f3dffd78eda202379c8f02
                                      • Opcode Fuzzy Hash: c846ea618734c2639df5ec3bb3c3087c17f5c1a380c6903444faba32d8c127ab
                                      • Instruction Fuzzy Hash: 0D1113B5C047499ECB20CF9AD584BDEFBF4AF48320F10846AD459A7751C3B8A545CFA1
                                      APIs
                                      • SendMessageW.USER32(?,?,?,?), ref: 02DDAEB5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3341035445.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2dd0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 1cadebad1b5b4be29b10ab671f7ad91d189338cff004f494a52b58e02df917f0
                                      • Instruction ID: 6323e011079d234972fc47d4a10206d92d7ea2756b466300f31a3b4a3ecb9361
                                      • Opcode Fuzzy Hash: 1cadebad1b5b4be29b10ab671f7ad91d189338cff004f494a52b58e02df917f0
                                      • Instruction Fuzzy Hash: D91113B59007499FDB10CF99C984BDEBBF8EB48324F108459D558A3300D375A944CFA1
                                      APIs
                                      • SetWindowLongW.USER32(?,-00000014,?), ref: 071355F5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343432039.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: LongWindow
                                      • String ID:
                                      • API String ID: 1378638983-0
                                      • Opcode ID: 92d5fccdd96b47dc840fd2be4bcdc28b1e2f774d38abe8626c2fba4d39acf875
                                      • Instruction ID: ba5c05d125fc52676d016c97ade96462e78797887aa494d22e11b770a5bb225e
                                      • Opcode Fuzzy Hash: 92d5fccdd96b47dc840fd2be4bcdc28b1e2f774d38abe8626c2fba4d39acf875
                                      • Instruction Fuzzy Hash: D41125B5800349DFDB20CF99D584BDEBBF8EB48720F10841AE918A7340C3B4A954CFA1
                                      APIs
                                      • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,072DD917), ref: 072DE3BD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: DispatchMessage
                                      • String ID:
                                      • API String ID: 2061451462-0
                                      • Opcode ID: d6305d9cbd602eb05c92ef25b4be37d4c917b4c8296e27e87037639a8b3da802
                                      • Instruction ID: 9afbb58209fd11aa71fc29e4e1ae114645ba03f9bcd921d1cdf384f2a7242cb6
                                      • Opcode Fuzzy Hash: d6305d9cbd602eb05c92ef25b4be37d4c917b4c8296e27e87037639a8b3da802
                                      • Instruction Fuzzy Hash: 9A1102B5C046498FCB20DF9AD444BAEBBF4EB48210F108469E519A7200D3B8A940CFA5
                                      APIs
                                      • SendMessageW.USER32(?,?,?,?), ref: 072D0EF5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 9ddb40e8eb0e5390067fb4e94602278cd7caeb5b28098debeea94320a9927bb5
                                      • Instruction ID: a41a33b41ea7545c7281ba246aaa97adb34cc1b1a242a7200053643ef1b3d6b0
                                      • Opcode Fuzzy Hash: 9ddb40e8eb0e5390067fb4e94602278cd7caeb5b28098debeea94320a9927bb5
                                      • Instruction Fuzzy Hash: 9211F2B58003499FDB20CF99C585BDEBBF8EB48320F20845AD958A7610C375A944CFA1
                                      APIs
                                      • SendMessageW.USER32(?,?,?,?), ref: 072D0EF5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 762458827db6c9930a72d46d4468747eb3482b1c20c2c41a544371a996428a7d
                                      • Instruction ID: 687277d3ba3c012478e886167d15f2907fa3ce3683503f76abd1847a2619f497
                                      • Opcode Fuzzy Hash: 762458827db6c9930a72d46d4468747eb3482b1c20c2c41a544371a996428a7d
                                      • Instruction Fuzzy Hash: BB11C2B58003499FDB20CF9AC585BDEBBF8EB48324F208459D558A7650C375A944CFA5
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343869907.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8950000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: DispatchMessage
                                      • String ID:
                                      • API String ID: 2061451462-0
                                      • Opcode ID: 38e4416a08a7a4cb6741a483768709c837417b0688fb2c462e3cdbfcd907d7ef
                                      • Instruction ID: 5557a64fb0dbf12d9e3607f08b16195c58631ad383f03f51ee06577eb9d6d981
                                      • Opcode Fuzzy Hash: 38e4416a08a7a4cb6741a483768709c837417b0688fb2c462e3cdbfcd907d7ef
                                      • Instruction Fuzzy Hash: 9B111DB1C007498FDB20DF9AE444B8EBBF4EB48324F10846AD919A7210D378A544CFA5
                                      APIs
                                      • SendMessageW.USER32(?,?,?,?), ref: 02DDAEB5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3341035445.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2dd0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 928b3432f0d55f66be5e83d0043791e960274ba6a2c17d2482f782d1b24a3741
                                      • Instruction ID: 992c4d0b0419be3336bb2c589875eac003fa29b76ba9af9ffc42c4e390507134
                                      • Opcode Fuzzy Hash: 928b3432f0d55f66be5e83d0043791e960274ba6a2c17d2482f782d1b24a3741
                                      • Instruction Fuzzy Hash: 8511C2B59007499FDB20CF9AC985BDEBBF8EB48324F10845AD558A7700C375A954CFA1
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343869907.0000000008950000.00000040.00000800.00020000.00000000.sdmp, Offset: 08950000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8950000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: DispatchMessage
                                      • String ID:
                                      • API String ID: 2061451462-0
                                      • Opcode ID: 7070d2442486d98df717abb4d16de7bc3f1b5ed4389be8fbdd3e10aa992bd1f4
                                      • Instruction ID: a039a9c8b1e7bf7924b3241a1ccf126f3c8bb3369c7f461ea022f92164598fae
                                      • Opcode Fuzzy Hash: 7070d2442486d98df717abb4d16de7bc3f1b5ed4389be8fbdd3e10aa992bd1f4
                                      • Instruction Fuzzy Hash: 7C11FBB1C00749CFDB20DF9AE584B8EFBF8EB48324F10842AD919A3200D378A544CFA5
                                      APIs
                                      • KiUserCallbackDispatcher.NTDLL(?,?,00000000,00000000,?,?,?,072DD85F,00000000,03F561D0,030093B8,00000000,?), ref: 072DDEED
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343680750.00000000072D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72d0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID: CallbackDispatcherUser
                                      • String ID:
                                      • API String ID: 2492992576-0
                                      • Opcode ID: 26317dd9082eddd043e9d9c8b690fff79e8f54682513ffa1242cbf3e39a72e79
                                      • Instruction ID: 8744c2698c904cac2fa4858f6ebd2b88428d04de8ad67e50b32fb9a441bb4f97
                                      • Opcode Fuzzy Hash: 26317dd9082eddd043e9d9c8b690fff79e8f54682513ffa1242cbf3e39a72e79
                                      • Instruction Fuzzy Hash: 3D01F4B292478A8EDB119BA9D8043EDFFF49F59224F14848BD04497192C37C4949CF62
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3340256989.000000000128D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0128D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_128d000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9b9b621ed6d8330e287deaa87a9ff16b0f90c70d22b4b5fe51293d6641f7e61d
                                      • Instruction ID: b8031ee13c2e180a89571756b95d071ff8863fc88726100ea8cb30241be67f96
                                      • Opcode Fuzzy Hash: 9b9b621ed6d8330e287deaa87a9ff16b0f90c70d22b4b5fe51293d6641f7e61d
                                      • Instruction Fuzzy Hash: 52213871514209DFDB15EF48E5C0B26BF61FB84314F20C16DDA090A2D6C37AD419CAB1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3340766952.00000000014DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014DD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_14dd000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6444b7402089661802b2f8e30bf68962e6e54e6bf991bc92577984a70d1361c8
                                      • Instruction ID: 70901dd16c7c17be9549947fda20da52475b469342e5e3ca77c00e910c8b37d3
                                      • Opcode Fuzzy Hash: 6444b7402089661802b2f8e30bf68962e6e54e6bf991bc92577984a70d1361c8
                                      • Instruction Fuzzy Hash: 852134B5A04300EFDF05CF94D9D0B26BBA5FB84314F20C56ED9094B3A6CB76D446CAA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3340766952.00000000014DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014DD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_14dd000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 605038a8a55faaa6d3b5fd61d69fcb0b42043dcf5294f5b80b983c2655976fe3
                                      • Instruction ID: 8f9e30e0982a2687aab020676c9d16cb0d9a65c070ffb9c239ffa0a0c2c879b4
                                      • Opcode Fuzzy Hash: 605038a8a55faaa6d3b5fd61d69fcb0b42043dcf5294f5b80b983c2655976fe3
                                      • Instruction Fuzzy Hash: B4213775A04204EFDF05DFA4D9D0B2ABB61FB84314F24C56ED90A0B3A2C376D446CA61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3340256989.000000000128D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0128D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_128d000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                      • Instruction ID: 6f2bf1b4b2146e8dbf93eae91b4b46e063f2f96e6b88c39fde8ba3c3586e9c54
                                      • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                      • Instruction Fuzzy Hash: D51103B6404284CFCB12DF44D5C0B16BF72FB84324F24C1AAD9090B2A7C33AD45ACBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3340766952.00000000014DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014DD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_14dd000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                      • Instruction ID: a9f416e04b9a93c51cc33a4647124e94009bc6800ee4f2041d5753b674672f5c
                                      • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                      • Instruction Fuzzy Hash: 1811BE75904284CFDB06CF64D5D4B1ABF61FB44314F24C6AAD8494B7A6C33AD44ACB51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3340766952.00000000014DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014DD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_14dd000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                      • Instruction ID: 3b819374078509913b54556a768f47b8e0a0035056f83687c648401abcc73050
                                      • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                      • Instruction Fuzzy Hash: 4011DD75904280CFCB02CF54D5D4B1ABFA1FB84314F28C6AAD8094B7A7C33AD45ACBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3340256989.000000000128D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0128D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_128d000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bc50980f6bebec272cd19c7b9f7bb8776e0da0721b700fe3094416116ec7a425
                                      • Instruction ID: 45b3b4301c23daf9b9afe7c07a2dd038134cbdafe828d5097173b142aefdf052
                                      • Opcode Fuzzy Hash: bc50980f6bebec272cd19c7b9f7bb8776e0da0721b700fe3094416116ec7a425
                                      • Instruction Fuzzy Hash: A101F7710163C89AF7247EA9CD84B26BF98EF41624F08C45AEF085A1C6C6B89444C671
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3340256989.000000000128D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0128D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_128d000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d880dee8d7abc6cccd59cab89fe2c4c0719669a5ed1d6fcb360cfe960b75a3ae
                                      • Instruction ID: 34e0b431360e8323d9406dc5b547665878dfc716ff7be3c7e0d6f25d83d18352
                                      • Opcode Fuzzy Hash: d880dee8d7abc6cccd59cab89fe2c4c0719669a5ed1d6fcb360cfe960b75a3ae
                                      • Instruction Fuzzy Hash: F3F0F6724053889EE7249E5ACDC4B62FFA8EB81634F18C05AEE084F2C7C3789844CB71
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3341035445.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2dd0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2aa0f143ffe291e45f700d072865feca64f505b527feb6ccd758de277c4690a9
                                      • Instruction ID: 8c187b760f6aae1f65e5d03542616de828149fa9304a0e804ba0ccf453b3a545
                                      • Opcode Fuzzy Hash: 2aa0f143ffe291e45f700d072865feca64f505b527feb6ccd758de277c4690a9
                                      • Instruction Fuzzy Hash: B712A5B05227458BF759DF25E84E1C9BFB6B781318F908709E2616B2E1EFB4114ACF44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3343432039.0000000007130000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7130000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 09abe8ce172e36632b944dc1221dd917022817751ebc4ba08b6bb2cdd56a6505
                                      • Instruction ID: 886ab4ec91769c6f0f0841e8cb83aa20a9e95611daebdd7e2c26427453af200d
                                      • Opcode Fuzzy Hash: 09abe8ce172e36632b944dc1221dd917022817751ebc4ba08b6bb2cdd56a6505
                                      • Instruction Fuzzy Hash: 00A18272E1021ACFCF0ADFB4C8445DEBBB2FF84300B15856AE815AB295DB75E945CB44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3341035445.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2dd0000_XWe8H4gRPb.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8417400c42289a84311591be923d622a1d05ce7974009931faa17f4c2b64ca79
                                      • Instruction ID: bb83e0b8b2a88b5fb6a1355a8785ba8445e236c4e6a0bc69322c883a422c165a
                                      • Opcode Fuzzy Hash: 8417400c42289a84311591be923d622a1d05ce7974009931faa17f4c2b64ca79
                                      • Instruction Fuzzy Hash: 98C127B05227458BF759DF28E84E1C9BFB6BB85324F508709E2616B2E1EFB4144ACF44